University of Hyderabad

Displaying 1-7 of 7 results

  • White Papers // May 2011

    Computation of Multiple Paths in MANETs Using Node Disjoint Method

    A Mobile Ad-hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is also a self-configuring network, where in, mobile nodes are connected through wireless links. The topology of mobile ad-hoc networks is arbitrary and changes due to the consequent movement of the nodes. This causes frequent failures in...

    Provided By University of Hyderabad

  • White Papers // Feb 2011

    Coverage and Deployment Algorithms in Wireless Sensor Networks

    Efficient energy management schemes are essential in a wireless sensor network, since sensor nodes are battery powered. To subdue the energy problem, it is important to have efficient deployment and scheduling mechanisms. A heuristic to solve simple coverage problem, which schedules sensor activity so that all sensor nodes need not...

    Provided By University of Hyderabad

  • White Papers // Oct 2010

    A Practical (Non-Interactive) Publicly Verifiable Secret Sharing Scheme

    (Verifiable) Secret Sharing is one of the most important tools in modern cryptography. The concept and the first realization of secret sharing were presented independently in [Sha79] and in [Bla79]. Since then much work has been put into the investigation of such schemes (see [Sim88,Sti92] for a list of references)....

    Provided By University of Hyderabad

  • White Papers // Jul 2010

    Optimized and Reliable AODV for MANET

    In recent years, mobile and wireless networks have witnessed a tremendous rise in technological advancement. Due to dynamic changing environment of MANET, it is desirable to design effective routing algorithms that can adapt its behavior to rapid and frequent changes in the network. This paper proposes an Optimized Reliable Ad...

    Provided By University of Hyderabad

  • White Papers // Oct 2009

    Malware Detection Using Machine Learning

    The authors propose a versatile framework in which one can employ different machine learning algorithms to successfully distinguish between malware files and clean files, while aiming to minimize the number of false positives. In this paper, they present the ideas behind their framework by working firstly with cascade one-sided perceptrons...

    Provided By University of Hyderabad

  • White Papers // Oct 2009

    A Rigorous Methodology for Specification and Verification of Business Processes

    Both specification and verification of business processes are gaining more and more attention in the field. Most of the existing works in the last years are dealing with important, yet very specialized, issues. Among these, the authors can enumerate compensation constructs to cope with exceptions generated by long running business...

    Provided By University of Hyderabad

  • White Papers // Sep 2009

    Principles of Multimedia News Systems for Business Applications

    In the past few years' considerable demand for business oriented multimedia information system has developed. A multimedia information system is one that can create, import, integrate, store, retrieve, edit, and delete two or more types of media materials in digital form, such as audio, image, full-motion video, and text information....

    Provided By University of Hyderabad

  • White Papers // May 2011

    Computation of Multiple Paths in MANETs Using Node Disjoint Method

    A Mobile Ad-hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is also a self-configuring network, where in, mobile nodes are connected through wireless links. The topology of mobile ad-hoc networks is arbitrary and changes due to the consequent movement of the nodes. This causes frequent failures in...

    Provided By University of Hyderabad

  • White Papers // Jul 2010

    Optimized and Reliable AODV for MANET

    In recent years, mobile and wireless networks have witnessed a tremendous rise in technological advancement. Due to dynamic changing environment of MANET, it is desirable to design effective routing algorithms that can adapt its behavior to rapid and frequent changes in the network. This paper proposes an Optimized Reliable Ad...

    Provided By University of Hyderabad

  • White Papers // Oct 2010

    A Practical (Non-Interactive) Publicly Verifiable Secret Sharing Scheme

    (Verifiable) Secret Sharing is one of the most important tools in modern cryptography. The concept and the first realization of secret sharing were presented independently in [Sha79] and in [Bla79]. Since then much work has been put into the investigation of such schemes (see [Sim88,Sti92] for a list of references)....

    Provided By University of Hyderabad

  • White Papers // Feb 2011

    Coverage and Deployment Algorithms in Wireless Sensor Networks

    Efficient energy management schemes are essential in a wireless sensor network, since sensor nodes are battery powered. To subdue the energy problem, it is important to have efficient deployment and scheduling mechanisms. A heuristic to solve simple coverage problem, which schedules sensor activity so that all sensor nodes need not...

    Provided By University of Hyderabad

  • White Papers // Oct 2009

    A Rigorous Methodology for Specification and Verification of Business Processes

    Both specification and verification of business processes are gaining more and more attention in the field. Most of the existing works in the last years are dealing with important, yet very specialized, issues. Among these, the authors can enumerate compensation constructs to cope with exceptions generated by long running business...

    Provided By University of Hyderabad

  • White Papers // Sep 2009

    Principles of Multimedia News Systems for Business Applications

    In the past few years' considerable demand for business oriented multimedia information system has developed. A multimedia information system is one that can create, import, integrate, store, retrieve, edit, and delete two or more types of media materials in digital form, such as audio, image, full-motion video, and text information....

    Provided By University of Hyderabad

  • White Papers // Oct 2009

    Malware Detection Using Machine Learning

    The authors propose a versatile framework in which one can employ different machine learning algorithms to successfully distinguish between malware files and clean files, while aiming to minimize the number of false positives. In this paper, they present the ideas behind their framework by working firstly with cascade one-sided perceptrons...

    Provided By University of Hyderabad