scispace - formally typeset
N

Niraj K. Jha

Researcher at Princeton University

Publications -  682
Citations -  22369

Niraj K. Jha is an academic researcher from Princeton University. The author has contributed to research in topics: Medicine & Biology. The author has an hindex of 69, co-authored 534 publications receiving 19823 citations. Previous affiliations of Niraj K. Jha include Columbia University & Hong Kong University of Science and Technology.

Papers
More filters
Book

Switching and Finite Automata Theory

TL;DR: Theories are made easier to understand with 200 illustrative examples, and students can test their understanding with over 350 end-of-chapter review questions.
Proceedings ArticleDOI

GARNET: A detailed on-chip network model inside a full-system simulator

TL;DR: In this article, a detailed cycle-accurate interconnection network model (GARNET) is proposed to simulate a CMP architecture with virtual channel (VC) flow control.
Journal ArticleDOI

A Comprehensive Study of Security of Internet-of-Things

TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Proceedings ArticleDOI

Dynamic voltage scaling with links for power optimization of interconnection networks

TL;DR: This paper proposes a history-based DVS policy that judiciously adjusts link frequencies and voltages based on past utilization that realizes up to 6.3/spl times/ power savings and is accompanied by a moderate impact on performance.
Journal ArticleDOI

A study of the energy consumption characteristics of cryptographic algorithms and security protocols

TL;DR: In this article, the authors present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols, and investigate the impact of various parameters at protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions.