Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Krishnamurthy Srinivasan is active.

Publication


Featured researches published by Krishnamurthy Srinivasan.


IEEE Computer | 2002

E-business process modeling: the next big step

Selim Aissi; Pallavi G. Malu; Krishnamurthy Srinivasan

The authors propose a process coordination framework for Web services and outline the building blocks required for e-business automation. Their framework helps in understanding the roles of various standards and in identifying overlaps, gaps, and opportunities for convergence.


IEEE Computer | 1999

The changing role of information technology in manufacturing

Krishnamurthy Srinivasan; Sundaresan Jayaraman

Although its role in manufacturing has keen move to support processes, IT is evolving to become a catalyst for process and product change. In this case study, an apparel manufacturer used an enterprise modeling framework (EMF) developed by Georgia Tech (USA) to implement multiple IT solutions. It was then able to rapidly shift production resources between two separate product lines.


winter simulation conference | 1997

Integration of simulation with enterprise models

Krishnamurthy Srinivasan; Sundaresan Jayaraman

The Enterprise Modeling Framework (EMF) consists of a methodology for modeling the three major facets of an enterprise, viz., function, information and dynamics. Its main goal is to enable integration of enterprise through shared, consistent models. EMF activity (function) and entity (information) models have been designed to include the information needed for discrete-event simulation of the enterprise functions. The EMF-SIMAN model generator automatically generates SIMAN code from these models. This tool has been applied to solve a real-world problem whose solution required the integration of enterprise modeling with discrete-event simulation. This paper discusses how EMF integrates simulation with enterprise modeling, the resulting benefits, and a real-world application of EMF.


IEEE Internet Computing | 2003

Automatic multi-business transactions

Krishnamurthy Srinivasan; Pallavi G. Malu; George P. Moakley

The Tentative Hold Protocol (THP) helps automate the coordination of multi-business interactions, providing cost savings and enabling new business models in the process. Automating the exchange of critical information using this protocol prior to a transaction decreases the effect of outdated data, reduces the potential for cancellations, and improves the odds of successfully completing transactions. This article describes THP, explains how to use it synergistically with other technologies, describes some scenarios from different industries in which it could be applied, and provides greater technical detail about its components and limitations.


international conference on performance engineering | 2011

Dynamic VM migration: assessing its risks & rewards using a benchmark

Krishnamurthy Srinivasan; Sterlan Yuuw; Tom J. Adelmeyer

Dynamic migration of virtual machines (VMs) across physical servers has the potential to increase the utilization of the servers and hence drive down the data center costs. However, IT practitioners are leery of using this capability for increasing resource utilization due to concerns about the impact of such migrations on the performance of the applications, particularly the response times seen by the users of the applications. The relative newness to the industry of many of the tools used to automate VM migrations for resource utilization; data from researchers; as well as the recommendations from some analysts justify such caution and warrant quantifying the risks as well as potential rewards before deciding how aggressively this capability should be adopted. This paper will discuss the requirements for a benchmark to be used for such quantification. We will also discuss adaptations to SPECvirt_sc2010, originally developed as a single server benchmark, to meet these requirements. We will also present risk-reward quantifications obtained using this benchmark for a simple case and the broader use of the benchmark for other cases.


International Journal of Simulation and Process Modelling | 2006

Model-based decision support for supply chains

Subhashini Ganapathy; S. Narayanan; Krishnamurthy Srinivasan

Advances in software algorithms, and operations research methods provide the opportunity for effectively modelling decentralised decision making in large-scale systems operating in dynamic, uncertain environments. Computer models typically contain software abstractions with an excellent mapping to real-world entities that can be rapidly assembled and used for predicting system performance under a variety of alternative situations. This paper outlines fundamental issues in modelling and human-centred decision making and presents an interactive system that follows the philosophy of mixed-initiative collaboration where human decision makers and automated agents work together in achieving high joint performance in the context of a supply chain system.


measurement and modeling of computer systems | 2011

Dynamic VM migration: assessing its risks & rewards using a benchmark (abstracts only)

Krishnamurthy Srinivasan; Sterlan Yuuw; Tom J. Adelmeyer

Dynamic migration of virtual machines (VMs) across physical servers has the potential to increase the utilization of the servers and hence drive down the data center costs. However, IT practitioners are leery of using this capability for increasing resource utilization due to concerns about the impact of such migrations on the performance of the applications, particularly the response times seen by the users of the applications. The relative newness to the industry of many of the tools used to automate VM migrations for resource utilization; data from researchers; as well as the recommendations from some analysts justify such caution and warrant quantifying the risks as well as potential rewards before deciding how aggressively this capability should be adopted. This paper will discuss the requirements for a benchmark to be used for such quantification. We will also discuss adaptations to SPECvirt sc2010, originally developed as a single server benchmark, to meet these requirements. We will also present risk-reward quantifications obtained using this benchmark for a simple case and the broader use of the benchmark for other cases.


Archive | 2003

Multi-authentication for a computing device connecting to a network

Selim Aissi; David Wheeler; Krishnamurthy Srinivasan; Randy E Hall; Ned M. Smith


Archive | 2003

Method for using trusted, hardware-based identity credentials in runtime package signature to secure mobile communications and high-value transaction execution

Selim Aissi; David Wheeler; Krishnamurthy Srinivasan


Archive | 2002

Method and apparatus for automated gathering of network data

Krishnamurthy Srinivasan; Pallavi G. Malu

Collaboration


Dive into the Krishnamurthy Srinivasan's collaboration.

Top Co-Authors

Avatar

Sundaresan Jayaraman

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

S. Narayanan

Wright State University

View shared research outputs
Top Co-Authors

Avatar

Phiroze H. Dastoor

Georgia Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge