Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Vuppalapati, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.00526  [pdf

    cs.HC cs.AI

    The Emotional Impact of Game Duration: A Framework for Understanding Player Emotions in Extended Gameplay Sessions

    Authors: Anoop Kumar, Suresh Dodda, Navin Kamuni, Venkata Sai Mahesh Vuppalapati

    Abstract: Video games have played a crucial role in entertainment since their development in the 1970s, becoming even more prominent during the lockdown period when people were looking for ways to entertain them. However, at that time, players were unaware of the significant impact that playtime could have on their feelings. This has made it challenging for designers and developers to create new games since… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

  2. arXiv:2305.17222  [pdf, other

    cs.OS

    Karma: Resource Allocation for Dynamic Demands

    Authors: Midhul Vuppalapati, Giannis Fikioris, Rachit Agarwal, Asaf Cidon, Anurag Khandelwal, Eva Tardos

    Abstract: We consider the problem of fair resource allocation in a system where user demands are dynamic, that is, where user demands vary over time. Our key observation is that the classical max-min fairness algorithm for resource allocation provides many desirable properties (e.g., Pareto efficiency, strategy-proofness, and fairness), but only under the strong assumption of user demands being static over… ▽ More

    Submitted 7 July, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: Full version of paper accepted to USENIX OSDI 2023 with proofs of theoretical guarantees

  3. arXiv:2205.14281  [pdf, other

    cs.CR cs.DC cs.NI

    SHORTSTACK: Distributed, Fault-tolerant, Oblivious Data Access

    Authors: Midhul Vuppalapati, Kushal Babel, Anurag Khandelwal, Rachit Agarwal

    Abstract: Many applications that benefit from data offload to cloud services operate on private data. A now-long line of work has shown that, even when data is offloaded in an encrypted form, an adversary can learn sensitive information by analyzing data access patterns. Existing techniques for oblivious data access-that protect against access pattern attacks-require a centralized and stateful trusted proxy… ▽ More

    Submitted 8 June, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: Full version of USENIX OSDI'22 paper

    Journal ref: In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), pp. 719-734. 2022