Srini Ramaswamy

Srini Ramaswamy
iWorks Corporation

Ph.D.
Looking for people in AIML, secure cloud / data solutions - preferably in the USA (if interested in work)

About

228
Publications
39,801
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,510
Citations
Introduction
Srini earlier served as Head of Technology at Battelle. Prior to this, he was the Global R&D head for Digital Platforms in Electrification ABB, Inc. At ABB, he also was also the R&D Head for Innovation, Software Tech. and Analytics for Power Generation in its Automation business. Before ABB, he was in academia for 16 years, which included several invite / visiting appointments; at INSA de Rouen (France), the Institute of Software Integrated Systems (ISIS) at Vanderbilt, and at UT-Austin.
Additional affiliations
June 2021 - May 2022
Battelle Memorial Institute
Position
  • Head of Technology
Description
  • Infrastructure, Applications and Architecture Leadership
September 2019 - March 2021
ABB
Position
  • R&D Head Digital Platforms
July 2014 - May 2021
ZED
Position
  • VP Technology and Strategy
Description
  • Advise and support the development of innovative IoT solutions.
Education
August 1990 - May 1994
University of Louisiana at Lafayette
Field of study
  • Computer Science

Publications

Publications (228)
Article
Bug reporting systems, such as Bugzilla are online tools used in software development and maintenance to store and track the status of a bug report. They are widely used by both open-source software projects and commercial software companies and have become a major source to study software evolution, software project management, and software qualit...
Article
User specific information in social media is sensitive and subject to privacy. Continuously changing privacy policies and configuration procedures in social media require users to constantly educate themselves of the changes. A collective intelligence driven approach, known as Collective-Context Based Privacy Model (C-CBPM) has been developed that...
Article
In this paper, we propose two different applications in the area of V2V communications. First, we present a method for better car tracking using GPS information shared through the V2V communication and a vision system in order to support accurate positioning. To accomplish this, we propose to use particle filtering techniques, and when GPS data is...
Conference Paper
Full-text available
Effective communication is an important issue for global software development. Due to geographical limitations and travel challenges, face-to-face meetings are expensive to schedule and run. Web-based communication methods are thus the primary means of communication in global software development efforts. In general, two types of web-based communic...
Article
Full-text available
This paper presents a complete multiagent framework for dynamic job shop scheduling, with an emphasis on robustness and adaptability. It provides both a theoretical basis and some experimental justifications for such a framework: a job dispatching procedure for a completely reactive scheduling approach, combining real-time and predictive decision m...
Article
This investigation presents an Industrial Internet of Things (IIoT) architecture and a Model-Based Engineering (MBE) approach for design, verification, and auto-code generation of control applications in process industries. The IIoT architecture describes the hardware components, communication modules, and software. It emerges as a major enabler fo...
Conference Paper
In this paper, we report our experiences of applying three complementary automated software architecture analysis techniques, supported by a tool suite, called DV8, to 8 industrial projects within a large company. DV8 includes two state-of-the-art architecture-level maintainability metrics—Decoupling Level and Propagation Cost, an architecture flaw...
Conference Paper
Commercial software development projects frequently build code on third-party components. However, depending on third-party code requires that projects keep current with the latest version of each component. When projects do not stay current, they begin to incur a form of technical debt where API calls that have been deprecated remain in the code b...
Article
Full-text available
Design patterns are reusable software design solutions to object-oriented programs. Since the initial introduction of the 23 well-known design patterns in 1995, more and more patterns have been identified and utilized in the software industry. The benefits of applying design patterns include reducing development cost, improving code quality, and st...
Chapter
The engineering of enterprise software systems suffers from an inherent lack of creativity and innovation and is often left to user-centric incremental changes that are not often disruptive enough for business needs. A design-driven approach to systems creates opportunities for transformative evolution of such systems that are both immediate and fu...
Chapter
Design patterns are standardized solutions to commonly encountered problems using the object-oriented programming paradigm. Applying design patterns can speed up software development processes through the reuse of tested, proven templates, or development paradigms. Accordingly, design patterns have been widely used in software industry to build mod...
Chapter
Design patterns are standardized solutions to commonly encountered problems using the object-oriented programming paradigm. Applying design patterns can speed up software development processes through the reuse of tested, proven templates, or development paradigms. Accordingly, design patterns have been widely used in software industry to build mod...
Article
We study the effect of source and type of training data on detecting failures in industrial robots using Principal Component Analysis (PCA). Specifically, using field data across multiple robots performing different tasks, we compare two scenarios: first, where training data obtained from a single robot is used to evaluate multiple robots (one-to-m...
Article
Working collaboratively across time zone differences is an important issue for distributed software development projects. In such work, computer mediated communications, especially mailing lists, have been widely used for global software development. It is commonly agreed on that time zone differences have a negative impact on real time communicati...
Article
Timing imperfections in Cyber-Physical Systems (CPS) components affect their performance and reliability. This investigation presents a methodology to design and verify CPS using multi-objective evolutionary optimization, model checking and supporting software tools. The time-varying delays in CPS are modelled as constant delays plus jitter. It is...
Conference Paper
Full-text available
Software evolutionary stability has become an important issue in software maintenance and evolution. It is directly related to software reusability, maintainability and evolvability. In reported prior research, software evolutionary stability has been measured with architecture-level metrics, including reference points and program-level metrics, su...
Conference Paper
Time-varying delays affect the performance and reliability of networked automation systems (NAS). Recent trend to use wired and wireless networks within NAS induces network delays that vary depending on many factors such as loading, sharing, length of the channel, protocol, and so on. As these factors are inherently time-varying, developing analyti...
Conference Paper
In this paper we simulate, detect, and locate wear in industrial robots operating over long time-periods on repetitive tasks. We simulate wear using the MATLAB robotics toolbox by increasing the Coulomb friction coefficient on select robot axes. Disturbance and measurement noise are included in each axis while computing the inverse and forward kine...
Conference Paper
Full-text available
Hadoop is a progressively indispensable cloud-computing platform that several vendors have been offering as a service. When a consumer submits a job to Hadoop, there is no guarantee that the job will finish in a required amount of time. Given the immediate need to develop a mechanism to serve the Hadoop service with a standardized agreement between...
Article
Full-text available
Networked automation systems (NAS) are characterized by confluence of control, computation, communication and Information (C3I) technologies. Design decisions of one domain are affected by the constraints posed by others. Reliable NAS design should address the requirements of the system, and simultaneously meet the constraints posed by other domain...
Chapter
Big data, with its diversity (voice, video, structured and unstructured), has brought in unique challenges to security and privacy due to its shear scale. They are expected to be distributed, cloud-based and hosted by service providers. Security challenges in terms of cryptography, log/event analysis, intrusion detection/prevention, and access cont...
Article
Full-text available
This paper describes a method for the recovering of software architectures from a set of similar (but unrelated) software products in binary form. One intention is to drive refactoring into software product lines and combine architecture recovery with run time binary analysis and existing clustering methods. Using our runtime binary analysis, we cr...
Article
We present work towards using ontological information to facilitate collaborative tasks during operation, maintenance and service of industrial automation facilities. We use semantic models as an additional layer for a collaboration framework to enable automatic reasoning, decision support and knowledge sharing among multiple parties. Documents suc...
Article
As industrial systems are getting complicated, challenges in coming up with efficient maintenance strategies which include predicting failures in the system become important industry specific research topic. Traditionally, research focuses on developing failure prediction models based on physical understanding of the system. But, development of suc...
Article
Existing research on developing privacy models, although seem persuasive, are essentially based on user, role or service identification. Such models are incapable of automatically adjusting privacy needs of consumers or organizations to the context in which the data is accessed. In this work we present a context based privacy model (CBPM) that leve...
Conference Paper
Full-text available
Networked Automation Systems (NAS) have to meet stringent response time during operation. Verifying response time of automation is an important step during design phase before deployment. Timing discrepancies due to hardware, software and communication components of NAS affect the response time. This investigation uses model templates for verifying...
Conference Paper
Full-text available
In this investigation, we present an Extended Kalman Filter (EKF) based predictive vehicle path-planning algorithm that uses infrastructure-to-vehicle (I2V) communication. The estimation method uses the relative distance of the vehicle from the infrastructure, and the distance from other vehicles or obstacles in the road using on-board vehicle sens...
Conference Paper
Full-text available
Internet, on one hand, is a primary foundation for knowledge acquisition in a child's life. On the other hand, there are many growing exploits over children. Motivated by the rising need to shield children's communication channels from obnoxious sources, this paper proposes a framework named SafeChat. SafeChat is the result of aggregating the conte...
Chapter
The context based privacy model (CBPM) has proved to be successful in strengthening privacy specifications in social media. It allows users to define their own contexts and specify fine-grained policies. Collective-CBPM learns the user policies from community. Our experiments on a sample collection of Facebook data demonstrated the models feasibili...
Conference Paper
In enterprise application development the architectural decisions and rationale are rarely captured with the intention of reuse across projects. This implies that for new projects, the process of collecting requirements, user scenarios, high-level architecture, low-level design and the implementation proposal will be repeated with little reuse of s...
Article
Design patterns are standardized solutions to commonly encountered problems using the object-oriented programming paradigm. Applying design patterns can speed up software development processes through the reuse of tested, proven templates, or development paradigms. Accordingly, design patterns have been widely used in software industry to build mod...
Conference Paper
Our experiences with industrial software development projects have often revealed that requirements change even after their formal approvals. Although the requirements are never stable, proactive identification of potentially changeable or deferrable requirements, and estimation of their impacts early in a project can be useful in minimizing the ri...
Conference Paper
Full-text available
IEC 61131-3 is an open standard that provides guidelines for programmable logic controllers and control systems. The standard defines specifications for control system programming languages, both textual and graphical. A control system application developed using these languages can go through several changes over the course of the project's life-c...
Conference Paper
Full-text available
Control loops integrated with communication channels for information exchange among system components are called Networked Control Systems (NCSs). Introduction of communication channels induce time-varying communication delays and make the controller design complex. In this paper, an adaptive regulator (AR) that varies its gain depending on the del...
Conference Paper
Full-text available
Facing immense challenges for which they have not been originally engineered, current power grids are transitioning into what is increasingly being known as smart grids. In order to make a smarter grid a reality, there is a need to re-engineer some aspects of the conventional grid. Estimation of such re-engineering efforts, therefore, becomes a key...
Conference Paper
Full-text available
Networked Control Systems (NCSs) employ digital network for transmitting control and monitoring information among system components. Control information over digital network may be delayed due to transmission and this can adversely affect the control performance. To achieve desired performance in the presence of delays the controller needs to modif...
Conference Paper
In this paper we present our evolving work on developing an interactive simulation-framework for electricity trading in Smart Grids. This simulation framework is designed to enable real-time pricing, demand-side management, and distributed generation. A modular simulation architecture is proposed to address communication challenges and to allow eff...
Conference Paper
Social networking has evolved as a basic amenity in today’s intercon-nected world. Users of social media tools do not always keep up with privacy poli-cies and its adverse effects. It is very common that even experienced users are often caught unaware of actions that happen behind the interface screens of their inter-connection devices. Many-a-tim...
Conference Paper
The design and functional complexity of medical software has increased during the past 50 years, evolving from the use of a metronome circuit for the initial cardiac pacemaker to functions that include electrocardiogram (EKG) analysis, laser surgery, and networked systems for monitoring patients across various healthcare environments. Software has...
Article
Wireless Sensor Networks (WSNs) are autonomous wireless systems consists of a variety of collaborative sensor nodes forming a self-configuring network with or without any pre-defined infrastructure. The common challenges of a WSN are network connectivity, node mobility, energy consumption, data computation and aggregation at sensor nodes. In this p...
Article
SourceForge is a web-based code repository for open-source projects. It is one of the most successful web sites that promote code sharing, collaboration, and open-source software development. Users of SourceForge are globally distributed and come from every comer of the world. They interact with each other in the virtual space through the formation...
Article
User-centric services and service provisioning has been a strong motivator for modern internet technologies, and, in particular, Web 2.0 technologies. Of particular interest to this study is its ability to have widespread societal impact. Hence in this work we assess the impact of such advancements in how one widespread societal function works, i.e...
Conference Paper
Modularity is an important software design principle. One key point in the design of high quality software products is avoiding code clones, i.e., a portion of source code that is identical or similar to another. During the software evolution process, new code segments are frequently added. It is common to see that code clones accrue with the relea...
Article
Full-text available
Information system security policies have grown in complexity and the emerging collaborative nature of business has created new challenges in creating and managing such policies. These policies address several domains ranging from access control to disaster recovery and depend not only on the business itself but on socio-political/legal requirement...
Conference Paper
Full-text available
Delays and data losses are undesirable from a control system perspective as they tend to adversely affect performance Networked Control Systems (NCSs) are a class of control systems wherein control components exchange information using a shared communication channel. Delays and packet losses in the communication channels are usually random, thereby...
Conference Paper
Every organization strives to provide online support for their customers in an attempt to rapidly provide solutions to customer bug reports. In the automation software industry, wherein software bugs can have significant repercussions for the client, rapid response to reported bugs is a very critical function. Current approaches to such response fo...
Article
Traditional requirements engineering involves analyzing tradeoffs between available alternatives. In the context of Software Product Lines (SPLs) application engineers have to instantiate variability by evaluating a set of options available from the platform. In this position paper, we propose the adoption of multi-criteria decision-making for inst...
Conference Paper
In this paper, the emerging need for a user-driven contextualized approach towards security authentication for today’s emergent mobile e-commerce applications is outlined. The main advantages of contextualizing user-driven authentication is that it can be almost impregnable by malicious users who attempt to get personal details through various...
Article
In some wireless sensor network applications, sensor nodes will be deployed in harsh communication environments. In such environments, the deployment may not be adequately controlled, and nodes may have to communicate with a single destination node. For nodes to alert the destination on critical data that has been sensed, in addition to the harsh c...
Chapter
Human-computer interaction plays an important role in most (if not all) computer applications. It is considered even essential for enabling social networking as dynamic Web 2.0 is becoming an important platform for communication, collaboration, information and knowledge sharing. Compared to static web pages (Web 1.0), Web 2.0 enables more intensive...
Conference Paper
Full-text available
In this paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices, where these new procedures run; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks, as an extension of our previous Protocol Derivation Logic. Both for...
Article
In this paper, we present a faceted search on a dataset of reports having same structure, which consists of both non-narrative and narrative fields. Our approach exploits prop- erties associated with the dataset especially non-narrative fields, and at the same time gets enjoys full semantic lever-ages of the terms present under the narrative fields...
Article
Software security components have become an integral part of large scale projects; and hence they demand greater attention during the development phase. Often security implementations are longer-term processes; this implies that it will become all the more expensive to iterate the software development life cycle along with addressing the needs of s...
Article
Requirements management for globally managed large scale projects is a complex task, primarily due to the involvement of several stakeholders, multiple technologies, enormous information, and frequently changing business needs. Managing requirements communicated through mediums such as emails, chat messages, etc. is difficult due the lack of explic...
Conference Paper
Full-text available
Complex systems feature a large number of interacting components and as a whole exhibit one or more properties which are not entirely obvious from the properties of individual components. One important property of complex systems is self-organization, which is a process of reorganizing its components or functions to adapt to its environment without...
Conference Paper
As HPC (high performance computing) systems are extensively employed for heavy computational problems throughout heterogeneous environments, the scale and complexity of applications raises the issue of capacity planning. A cardinal aspect of efficiency is the job scheduler in any HPC systems. The job scheduling techniques can worsen or mitigate iss...
Article
Full-text available
Coupling measures the degree of dependencies between software modules. Considerable research has been performed to relate software coupling with software understandability, maintainability, and reusability, which are the key properties of software maintenance and evolution. However, only a few research works have been reported that study the relati...
Article
Fast communication technologies coupled with low-cost storage have aided enormous electronic data gathering. Hence, the need to transform such data to business intelligence and value is strong. In this paper, we focus on analysing e-mail corpuses (Enron) informational exchanges, with the intent to discern hidden organisational structure and culture...
Article
Full-text available
A key component needed for researching High Performance Cluster (HPC) Systems can be found through simulation of the HPC system. This paper presents comparative analysis of performance characteristics found from the operations of an "active" HPC system and a "simulated" HPC system.
Article
Full-text available
Bugzilla is an online software bug reporting system. It is widely used by both open-source software projects and commercial software companies and has become a major source to study software evolution, software project management, and software quality control. In some research studies, the number of bug reports has been used as an indicator of soft...
Article
Open-source software project mailing lists are key communication platforms which support collaboration and coordination between various stakeholders such as managers, developers, and users during the various stages of a software development process, namely, software analysis, design, implementation, and testing. A virtual social network is therefor...
Article
In recent years, people have increasingly experienced frauds over public networks, and Internet users demand effective techniques to defend against such attacks on data security. With inspiration from mobile intelligent agents, (i.e., agents that move around a network visiting each host in the network to detect intrusions), we propose Secured Open...
Article
Complex software systems and the huge amounts of data they produce are becoming an integral part of our organizations. We are also becoming increasingly dependent on high quality software products in our everyday lives. These systems 'evolve' as we identify and correct existing defects, provide new functionalities, or increase their nonfunctional q...
Article
Full-text available
Software component interaction is essential for realising proper software system functions. Such interactions between software components induce interdependencies between multiple components. One effect of such a dependency is co-evolution, wherein changes made to one component also requires corresponding changes to other component(s). This study p...
Conference Paper
Information centers in industries are facing privacy concerns in recent years. Though there exists persuasive models, the privacy is not assured for industries that no identifiable information will get into unauthorized entities hands. They are based on user, role or service identification. In this paper we proposed Context Based Privacy Model(CBPM...
Conference Paper
Full-text available
In this paper, we summarize and outline some of the big challenges in addressing performance, scalability, and availability of applications with large and complex backend database systems. We present some of the limitations imposed by the CAP theorem on distributed systems development and identify some approaches that can be used to effectively add...
Article
Full-text available
This paper discusses the problem of decision support systems in the organization. The procedure (linear combination) developed with the aim to combine some predicted results obtained with simulation of linear and nonlinear regression models (experts), multiple regression model, nonparametric regression model, and semi parametric regression model. T...
Article
In last year's conference, we presented a system of systems (SoS) approach for the development of a generalized mathematical model for modeling complex systems with integrated WSNs so that necessary benchmark cases can be derived. Additionally, this will allow for a standardized evaluation of performance measures for the different mobility models o...
Article
Statistical multiplexers have been integral components of packet switches and routers on data networks. They are modeled as queueing systems with a finite buffer space, served by one or more transmission links of fixed or varying capacity. The service structure typically admits packets of multiple sources on a first-come first-serve (FCFS) basis. I...
Conference Paper
With ever growing interests in High Performance Computer (HPC) systems for their inherent capabilities for data consolidation, data modeling, systems simulation, data storage, or intensive computation solutions there will obviously be ever growing needs from researchers within governments, businesses, and academia to determine the right HPC framewo...
Conference Paper
Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics including the interference and collision of signals. However, the sensitivity to physi...
Article
As wireless devices become ubiquitous in society, proper security methodologies must be deployed that are cognizant of the physical limitations inherent in the device design in order to ensure that the information produced in these systems is not abused. One such area of abuse involves an attacker locating and disabling a wireless device that is tr...
Conference Paper
Full-text available
The number of software products available in market is increasing rapidly. Many a time, multiple companies develop software products of similar functionalities. Thus the competition among those owning companies is becoming tougher every day. Moreover, there are many crucial programs whose results should be always accurate without fail. As a consequ...
Conference Paper
In this paper, we present an overview of various current research efforts aimed at improving the analysis, measurement and monitoring of information quality at an enterprise level in the healthcare arena. The main focus is on Data Quality (DQ) and recent advances and improvements in Healthcare Information Systems (HIS) architectures. Although there...
Conference Paper
Model based intrusion detection mechanisms have produced encouraging results for reduced false alarms. This paper extends our earlier work, where we reported for sandboxing Linux 2.6 using code generated from policies. Here we pursue the problem of code generation from a set of policies extracted from a domain model. Such a technique can support th...
Conference Paper
The globalization of the economy has given increase to the number of shipping containers. The large number of shipping containers arriving at major ports makes inspecting every container impractical and therefore bears significant risks. This paper describes a solution that would monitor containers' integrity from the originating port to the destin...
Conference Paper
Current research in autonomous agents and multi-agent systems (MAS) has reached a level of maturity sufficient enough for MAS to be applied as a technology for solving problems in an increasingly wide range of complex applications. Our aim in this paper is to define a simple, extendible, and formal framework for multi-agent cooperation, over which...
Conference Paper
From system security point of view, system calls are vulnerable as they operate in kernel space. Hence monitoring of system call patterns performed by an application has been extensively studied for the development of intrusion detection systems (IDS), which have to respond immediately to abnormal behaviors. However these IDSs have limitations in d...
Conference Paper
Peer-to-peer networks have been used efficiently as building blocks for large-scale distributed network applications in wired networks. With large scale wireless sensor networks becoming even more realistic, it is pertinent to build distributed network applications in WSNs as well. In this paper, we extend the peer-to-peer overlayed network to prov...
Conference Paper
An agent in a cooperative system is convinced that other agents will take actions toward the same goal of maximizing the global utility. In contrast, a self interested agent needs to consider every possible course of action other agents may take. Our aim in this paper is to define a simple, extendible, and formal framework for multi agent cooperati...
Article
Full-text available
Interest in games (online and mobile) is expanding geographically and demographically. Statistics from the US Entertainment Software Association suggest that there are now more women players in the US than there are teenage gamers. Online gaming was up 40 % in 2005 from 2004 and is growing about 22 % a year and is expected to post $24 billion in re...

Questions

Question (1)
Question
I see a increasing tendency to see numbers instead of "content and context" while evaluating real scholarly work!!

Network

Cited By