Follow
Ravi Chandra Jammalamadaka
Ravi Chandra Jammalamadaka
Engineering Manager, Amazon Search
Verified email at a9.com
Title
Cited by
Cited by
Year
Delegate: A proxy based architecture for secure website access from an untrusted machine
RC Jammalamadaka, TW Van Der Horst, S Mehrotra, KE Seamons, ...
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 57-66, 2006
532006
Flexible anonymization for privacy preserving data publishing: A systematic search based approach
B Hore, RC Jammalamadaka, S Mehrotra
Proceedings of the 2007 SIAM International Conference on Data Mining, 497-502, 2007
362007
Querying encrypted XML documents
RC Jammalamadaka, S Mehrotra
2006 10th International Database Engineering and Applications Symposium …, 2006
352006
Analyzing queries to generate product intention rules
RC Jammalamadaka, N Chittar, SP Ghatare
US Patent 8,515,966, 2013
342013
Mining product recommendation from query reformulations
RC Jammalamadaka
US Patent 8,566,339, 2013
262013
Pvault: a client server system providing mobile access to personal data
RC Jammalamadaka, S Mehrotra, N Venkatasubramanian
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
242005
iDataGuard: Middleware providing a secure network drive interface to untrusted internet data storage
RC Jammalamadaka, R Gamboni, S Mehrotra, KE Seamons, ...
Proceedings of the 11th international conference on Extending database …, 2008
202008
Systems and methods for data mining and automated generation of search query rewrites
PS Kumar, P Arasada, RC Jammalamadaka
US Patent 9,626,430, 2017
172017
gVault: A gmail based cryptographic network file system
RC Jammalamadaka, R Gamboni, S Mehrotra, KE Seamons, ...
Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working …, 2007
162007
iDataGuard: an interoperable security middleware for untrusted internet data storage
RC Jammalamadaka, R Gamboni, S Mehrotra, K Seamons, ...
Proceedings of the ACM/IFIP/USENIX Middleware'08 Conference Companion, 36-41, 2008
112008
Venkasubramanian Nalini. Delegate: A Proxy Based Architecture for Secure Web Access from an Untrusted Machine
RC Jammalamadaka, TW van der Horst, S Mehrotra, KE Seamons
22nd Annual Computer Security Applications Conference, 2006
112006
Apparatus, system and method for string disambiguation and entity ranking
GC Langmead, DJ Hughes, MA Gingrich, RC Jammalamadaka, ...
US Patent 10,152,478, 2018
82018
Systems and methods for representing search query rewrites
PS Kumar, P Arasada, RC Jammalamadaka
US Patent 9,727,607, 2017
72017
A middleware approach for outsourcing data securely
RC Jammalamadaka, R Gamboni, S Mehrotra, K Seamons, ...
Computers & security 32, 252-266, 2013
72013
Systems and methods for data mining and automated generation of search query rewrites
PS Kumar, P Arasada, RC Jammalamadaka
US Patent 10,599,733, 2020
62020
Reader application system utilizing article scoring and clustering
DR Beaver, G Sofianatos, K Tu, A Mahapatra, MA Gingrich, P Bhirud, ...
US Patent 10,162,864, 2018
62018
Systems and methods for generating search query rewrites
PS Kumar, P Arasada, RC Jammalamadaka
US Patent 10,108,712, 2018
62018
Query expansion classifier for e-commerce
RC Jammalamadaka, VK Salaka, BS Johnson, TH King
US Patent 9,135,330, 2015
62015
Mining product recommendation from query reformulations
RC Jammalamadaka
US Patent 8,832,137, 2014
52014
A middleware approach for building secure network drives over untrusted internet data storage
RC Jammalamadaka, R Gamboni, S Mehrotra, KE Seamons, ...
Proc. ACM conference on Extending database technology: Advances in database …, 2008
52008
The system can't perform the operation now. Try again later.
Articles 1–20