Sumant Kowshik

498 total citations
14 papers, 361 citations indexed

About

Sumant Kowshik is a scholar working on Artificial Intelligence, Computational Theory and Mathematics and Hardware and Architecture. According to data from OpenAlex, Sumant Kowshik has authored 14 papers receiving a total of 361 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Artificial Intelligence, 8 papers in Computational Theory and Mathematics and 7 papers in Hardware and Architecture. Recurrent topics in Sumant Kowshik's work include Logic, programming, and type systems (7 papers), Security and Verification in Computing (7 papers) and Formal Methods in Verification (7 papers). Sumant Kowshik is often cited by papers focused on Logic, programming, and type systems (7 papers), Security and Verification in Computing (7 papers) and Formal Methods in Verification (7 papers). Sumant Kowshik collaborates with scholars based in United States, India and Jamaica. Sumant Kowshik's co-authors include Vikram Adve, Dinakar Dhurjati, Chris Lattner, Lui Sha, Shobha Vasudevan, Grigore Roşu, Scott Graham, Manimaran Govindarasu, Shivnath Babu and C. Siva Ram Murthy and has published in prestigious journals such as Computer Communications, ACM SIGPLAN Notices and ACM Transactions on Embedded Computing Systems.

In The Last Decade

Sumant Kowshik

12 papers receiving 330 citations

Peers

Sumant Kowshik
Gregory J. Duck Singapore
Rui Qiao United States
Peter Chubb Australia
Nithin Nakka United States
Khilan Gudka United Kingdom
Bart Coppens Belgium
Peter Collingbourne United Kingdom
Gregory J. Duck Singapore
Sumant Kowshik
Citations per year, relative to Sumant Kowshik Sumant Kowshik (= 1×) peers Gregory J. Duck

Countries citing papers authored by Sumant Kowshik

Since Specialization
Citations

This map shows the geographic impact of Sumant Kowshik's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sumant Kowshik with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sumant Kowshik more than expected).

Fields of papers citing papers by Sumant Kowshik

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sumant Kowshik. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sumant Kowshik. The network helps show where Sumant Kowshik may publish in the future.

Co-authorship network of co-authors of Sumant Kowshik

This figure shows the co-authorship network connecting the top 25 collaborators of Sumant Kowshik. A scholar is included among the top collaborators of Sumant Kowshik based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sumant Kowshik. Sumant Kowshik is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

14 of 14 papers shown
1.
2.
Kowshik, Sumant, et al.. (2011). PRECIS: Inferring invariants using program path guided clustering. 532–535. 4 indexed citations
3.
Dhurjati, Dinakar, Sumant Kowshik, & Vikram Adve. (2006). SAFECode. ACM SIGPLAN Notices. 41(6). 144–157. 70 indexed citations
4.
Kowshik, Sumant, Grigore Roşu, & Lui Sha. (2006). Static Analysis to Enforce Safe Value Flow in Embedded Control Systems. 23–34. 3 indexed citations
5.
Dhurjati, Dinakar, Sumant Kowshik, & Vikram Adve. (2006). SAFECode. 144–157. 74 indexed citations
6.
Dhurjati, Dinakar, Sumant Kowshik, & Vikram Adve. (2005). Enforcing Alias Analysis for Weakly Typed Languages. Illinois Digital Environment for Access to Learning and Scholarship (University of Illinois at Urbana-Champaign). 3 indexed citations
7.
Kowshik, Sumant, et al.. (2005). Co-Design Based Approach to Improve Robustness in Networked Control Systems. 454–463. 2 indexed citations
8.
Sha, Lui, et al.. (2005). Prevention of failures due to assumptions made by software components in real-time systems. ACM SIGBED Review. 2(3). 36–39. 7 indexed citations
9.
Dhurjati, Dinakar, Sumant Kowshik, Vikram Adve, & Chris Lattner. (2005). Memory safety without garbage collection for embedded applications. ACM Transactions on Embedded Computing Systems. 4(1). 73–111. 31 indexed citations
10.
Dhurjati, Dinakar, Sumant Kowshik, Vikram Adve, & Chris Lattner. (2003). Memory safety without runtime checks or garbage collection. 69–80. 50 indexed citations
11.
Dhurjati, Dinakar, Sumant Kowshik, Vikram Adve, & Chris Lattner. (2003). Memory safety without runtime checks or garbage collection. ACM SIGPLAN Notices. 38(7). 69–80. 68 indexed citations
12.
Kowshik, Sumant, Dinakar Dhurjati, & Vikram Adve. (2002). Ensuring code safety without runtime checks for real-time control systems. 288–288. 45 indexed citations
13.
Kowshik, Sumant, Dinakar Dhurjati, & Vikram Adve. (2002). Ensuring code safety without runtime checks for real-time control systems.
14.
Kowshik, Sumant, Shivnath Babu, Manimaran Govindarasu, & C. Siva Ram Murthy. (2001). A distributed real-time MAC protocol for WDM-based LANs. Computer Communications. 24(7-8). 654–666.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026