User profiles for Sumeet Singh

Sumeet Singh

- Verified email at cs.ucsd.edu - Cited by 11808

Sumeet Pal Singh

- Verified email at ulb.ac.be - Cited by 1160

Sumeet Singh

- Verified email at eversana.com - Cited by 1081

[PDF][PDF] Automated Worm Fingerprinting.

S Singh, C Estan, G Varghese, S Savage - OSDI, 2004 - usenix.org
Network worms are a clear and growing threat to the security of today’s Internet-connected
hosts and networks. The combination of the Internet’s unrestricted connectivity and …

Packet classification using multidimensional cutting

S Singh, F Baboescu, G Varghese, J Wang - Proceedings of the 2003 …, 2003 - dl.acm.org
This paper introduces a classification algorithm called phHyperCuts. Like the previously best
known algorithm, HiCuts, HyperCuts is based on a decision tree structure. Unlike HiCuts, …

The regenerative capacity of zebrafish reverses cardiac failure caused by genetic cardiomyocyte depletion

…, M Gemberling, JS Burris, SP Singh… - …, 2011 - journals.biologists.com
Natural models of heart regeneration in lower vertebrates such as zebrafish are based on
invasive surgeries causing mechanical injuries that are limited in size. Here, we created a …

Packet classification for core routers: Is there an alternative to CAMs?

F Baboescu, S Singh… - IEEE INFOCOM 2003 …, 2003 - ieeexplore.ieee.org
A classifier consists of a set of rules for classifying packets based on header fields. Because
core routers can have fairly large (eg, 2000 rule) database and must use limited SRAM to …

Efficacy and safety of insulin analogues for the management of diabetes mellitus: a meta-analysis

SR Singh, F Ahmad, A Lal, C Yu, Z Bai, H Bennett - Cmaj, 2009 - Can Med Assoc
Background: Although insulin analogues are commonly prescribed for the management of
diabetes mellitus, there is uncertainty regarding their optimal use. We conducted meta-…

Network monitoring using traffic dispersion graphs (tdgs)

…, M Faloutsos, M Mitzenmacher, S Singh… - Proceedings of the 7th …, 2007 - dl.acm.org
Monitoring network traffic and detecting unwanted applications has become a challenging
problem, since many applications obfuscate their traffic using unregistered port numbers or …

Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications

Y Zhang, S Singh, S Sen, N Duffield… - Proceedings of the 4th …, 2004 - dl.acm.org
In traffic monitoring, accounting, and network anomaly detection, it is often important to be
able to detect high-volume traffic clusters in near real-time. Such heavy-hitter traffic clusters …

[PDF][PDF] Regeneration of amputated zebrafish fin rays from de novo osteoblasts

SP Singh, JE Holdway, KD Poss - Developmental cell, 2012 - cell.com
Determining the cellular source of new skeletal elements is critical for understanding
appendage regeneration in amphibians and fish. Recent lineage-tracing studies indicated that …

Robots that ask for help: Uncertainty alignment for large language model planners

AZ Ren, A Dixit, A Bodrova, S Singh, S Tu… - arXiv preprint arXiv …, 2023 - arxiv.org
Large language models (LLMs) exhibit a wide range of promising capabilities -- from step-by-step
planning to commonsense reasoning -- that may provide utility for robots, but remain …

[HTML][HTML] The 20S as a stand-alone proteasome in cells can degrade the ubiquitin tag

…, A Rozenberg, R Morag, MP Sahoo, SK Singh… - Nature …, 2021 - nature.com
The proteasome, the primary protease for ubiquitin-dependent proteolysis in eukaryotes, is
usually found as a mixture of 30S, 26S, and 20S complexes. These complexes have common …