scispace - formally typeset
Search or ask a question
Author

Dilip Krishnaswamy

Bio: Dilip Krishnaswamy is an academic researcher. The author has contributed to research in topics: Informatics. The author has an hindex of 1, co-authored 1 publications receiving 1127 citations.
Topics: Informatics


Cited by
More filters
Journal ArticleDOI
TL;DR: This colloquium reviews the methods to analyze and model temporal networks and processes taking place on them, focusing mainly on the last three years, which includes the spreading of infectious disease, opinions, rumors, in social networks; information packets in computer networks; various types of signaling in biology, and more.
Abstract: The power of any kind of network approach lies in the ability to simplify a complex system so that one can better understand its function as a whole. Sometimes it is beneficial, however, to include more information than in a simple graph of only nodes and links. Adding information about times of interactions can make predictions and mechanistic understanding more accurate. The drawback, however, is that there are not so many methods available, partly because temporal networks is a relatively young field, partly because it more difficult to develop such methods compared to for static networks. In this colloquium, we review the methods to analyze and model temporal networks and processes taking place on them, focusing mainly on the last three years. This includes the spreading of infectious disease, opinions, rumors, in social networks; information packets in computer networks; various types of signaling in biology, and more. We also discuss future directions.

513 citations

Journal ArticleDOI
TL;DR: Three task scheduling algorithms, called MCC, MEMAX and CMMN for heterogeneous multi-cloud environment, which aim to minimize the makespan and maximize the average cloud utilization are presented.
Abstract: Cloud Computing has grown exponentially in the business and research community over the last few years. It is now an emerging field and becomes more popular due to recent advances in virtualization technology. In Cloud Computing, various applications are submitted to the datacenters to obtain some services on pay-per-use basis. However, due to limited resources, some workloads are transferred to other data centers to handle peak client demands. Therefore, scheduling workloads in heterogeneous multi-cloud environment is a hot topic and very challenging due to heterogeneity of the cloud resources with varying capacities and functionalities. In this paper, we present three task scheduling algorithms, called MCC, MEMAX and CMMN for heterogeneous multi-cloud environment, which aim to minimize the makespan and maximize the average cloud utilization. The proposed MCC algorithm is a single-phase scheduling whereas rests are two-phase scheduling. We perform rigorous experiments on the proposed algorithms using various benchmark as well as synthetic datasets. Their performances are evaluated in terms of makespan and average cloud utilization and experimental results are compared with that of existing single-phase and two-phase scheduling algorithms to demonstrate the efficacy of the proposed algorithms.

170 citations

Journal ArticleDOI
TL;DR: This paper thoroughly presents a comprehensive review of the so-called moth–flame optimization (MFO) and analyzes its main characteristics, focusing on the current work on MFO, highlight its weaknesses, and suggest possible future research directions.
Abstract: This paper thoroughly presents a comprehensive review of the so-called moth–flame optimization (MFO) and analyzes its main characteristics. MFO is considered one of the promising metaheuristic algorithms and successfully applied in various optimization problems in a wide range of fields, such as power and energy systems, economic dispatch, engineering design, image processing and medical applications. This manuscript describes the available literature on MFO, including its variants and hybridization, the growth of MFO publications, MFO application areas, theoretical analysis and comparisons of MFO with other algorithms. Conclusions focus on the current work on MFO, highlight its weaknesses, and suggest possible future research directions. Researchers and practitioners of MFO belonging to different fields, like the domains of optimization, medical, engineering, clustering and data mining, among others will benefit from this study.

155 citations

Proceedings ArticleDOI
01 Dec 2014
TL;DR: This paper presents a detailed study of various task scheduling methods existing for the cloud environment and a brief analysis of various scheduling parameters considered in these methods is discussed.
Abstract: Cloud computing is a novel perspective for large scale distributed computing and parallel processing. It provides computing as a utility service on a pay per use basis. The performance and efficiency of cloud computing services always depends upon the performance of the user tasks submitted to the cloud system. Scheduling of the user tasks plays significant role in improving performance of the cloud services. Task scheduling is one of the main types of scheduling performed. This paper presents a detailed study of various task scheduling methods existing for the cloud environment. A brief analysis of various scheduling parameters considered in these methods is also discussed in this paper.

137 citations

Proceedings ArticleDOI
28 Sep 2015
TL;DR: Methods to detect cyberbullying using supervised learning techniques are devised and two new hypotheses for feature extraction to detect offensive comments directed towards peers which are perceived more negatively and result in cyberbullies are presented.
Abstract: The fast growing use of social networking sites among the teens have made them vulnerable to get exposed to bullying. Cyberbullying is the use of computers and mobiles for bullying activities. Comments containing abusive words effect psychology of teens and demoralizes them. In this paper we have devised methods to detect cyberbullying using supervised learning techniques. We present two new hypotheses for feature extraction to detect offensive comments directed towards peers which are perceived more negatively and result in cyberbullying. Our initial experiments show that using features from our hypotheses in addition to traditional feature extraction techniques like TF-IDF and N-gram increases the accuracy of the system.

109 citations