Institution
Wipro
Company•Singapore, Singapore•
About: Wipro is a company organization based out in Singapore, Singapore. It is known for research contribution in the topics: Context (language use) & Software. The organization has 1238 authors who have published 1434 publications receiving 7655 citations. The organization is also known as: Western India Products Limited & Western India Palm Refined Oils Limited.
Papers published on a yearly basis
Papers
More filters
••
01 Jun 2003TL;DR: This paper presents a new reliable transport layer protocol for ad hoc networks called ATP (ad hoc transport protocol), and shows through ns2-based simulations that ATP outperforms default TCP as well as TCP-ELFN and ATCP.
Abstract: Existing works have approached the problem of reliable transport in ad-hoc networks by proposing mechanisms to improve TCP's performance over such networks. In this paper we show through detailed arguments and simulations that several of the design elements in TCP are fundamentally inappropriate for the unique characteristics of ad-hoc networks. Given that ad hoc networks are typically stand-alone, we approach the problem of reliable transport from the perspective that it is justifiable to develop an entirely new transport protocol that is not a variant of TCP. Towards this end, we present a new reliable transport layer protocol for ad-hoc networks called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN.
356 citations
••
TL;DR: This paper presents a new reliable transport layer protocol for ad hoc networks called ATP (ad hoc transport protocol), and shows through ns2-based simulations that ATP outperforms default TCP as well as TCP-ELFN and ATCP.
Abstract: Existing works have approached the problem of reliable transport in ad hoc networks by proposing mechanisms to improve TCP's performance over such networks, In this paper, we show through detailed arguments and simulations that several of the design elements in TCP are fundamentally inappropriate for the unique characteristics of ad hoc networks. Given that ad hoc networks are typically stand-alone, we approach the problem of reliable transport from the perspective that it is justifiable to develop an entirely new transport protocol that is not a variant of TCP. Toward this end, we present a new reliable transport layer protocol for ad hoc networks called ATP (ad hoc transport protocol). We show through ns2-based simulations that ATP outperforms default TCP as well as TCP-ELFN and ATCP.
277 citations
••
TL;DR: This paper develops an authentication and key exchange protocol by combining the ideas of Identity based Encryption, PUFs and Key-ed Hash Function to show that this combination can help to do away with the requirement to store the secret challenge-response pair explicitly at the verifier end.
Abstract: Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things (IoTs). In traditional authentication protocols a user presents a set of credentials with an accompanying proof such as password or digital certificate. However, IoTs need more evolved methods as these classical techniques suffer from the pressing problems of password dependency and inability to bind access requests to the “things” from which they originate. Additionally, the protocols need to be lightweight and heterogeneous. Although PUFs seem promising to develop such mechanism, it puts forward an open problem of how to develop such mechanism without needing to store the secret challenge-response pair (CRP) explicitly at the verifier end. In this paper, we develop an authentication and key exchange protocol by combining the ideas of Identity based Encryption (IBE), PUFs and Key-ed Hash Function to show that this combination can help to do away with this requirement. The security of the protocol is proved formally under the Session Key Security and the Universal Composability Framework. A prototype of the protocol has been implemented to realize a secured video surveillance camera using a combination of an Intel Edison board, with a Digilent Nexys-4 FPGA board consisting of an Artix-7 FPGA, together serving as the IoT node. We show, though the stand-alone video camera can be subjected to man-in-the-middle attack via IP-spoofing using standard network penetration tools, the camera augmented with the proposed protocol resists such attacks and it suits aptly in an IoT infrastructure making the protocol deployable for the industry.
179 citations
••
TL;DR: In this article, the problem of finding an optimal and suboptimal task allocation (i.e., to which processor should each module of a task or program be assigned) in distributed computing systems with the goal of maximizing the system reliability is considered.
Abstract: We consider the problem of finding an optimal and suboptimal task allocation (i.e., to which processor should each module of a task or program be assigned) in distributed computing systems with the goal of maximizing the system reliability (i.e., the probability that the system can run the entire task successfully). The problem of finding an optimal task allocation is known to be NP-hard in the strong sense. We present an algorithm for this problem, which uses the idea of branch and bound with underestimates for reducing the computations in finding an optimal task allocation. The algorithm reorders the list of modules to allow a subset of modules that do not communicate with one another to be assigned last, for further reduction in the computations of optimal task allocation for maximizing reliability. We also present a heuristic algorithm which obtains suboptimal task allocations in a reasonable amount of computational time. We study the performance of the algorithms over a wide range of parameters such as the number of modules, the number of processors, the ratio of average execution cost to average communication cost, and the connectivity of modules. We demonstrate the effectiveness of our algorithms by comparing them with recent competing task allocation algorithms for maximizing reliability available in the literature.
128 citations
••
TL;DR: In this paper, the authors examined the relationship of emotional intelligence with transformational leadership and organizational citizenship behavior (OeB) of the followers and found that emotional intelligence of leaders enhances the OeB of followers.
Abstract: This manuscript examines the relationship of emotional intelligence (El) with transformational leadership (TL) and organizational citizenship behavior (OeB) of the followers. A sample of 57 dyads of managers and their supervisors (i.e. 114 respondents) participated in this study. The reliabilities of the scales were - OeB(0.83), TL (0.88), and El (0.86). El was significantly correlated to conscientiousness, civic virtue, and altruistic behaviors of followers. The method suggested by Barron and Kenny (1986) was used to test mediation of EI between TL and OeB but nothing significant was found. The results indicate that emotional intelligence of leaders enhances the OeB of followers. However, EI of the leader may not be the only factor determining the perception of TL.
116 citations
Authors
Showing all 1239 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jinling Wang | 48 | 290 | 7109 |
Sunil Kumar Khare | 41 | 205 | 5104 |
Mounir Hamdi | 35 | 386 | 5253 |
Yan Xin | 27 | 87 | 2927 |
Amitava Das | 25 | 115 | 2268 |
Tobias Lindstrøm Jensen | 14 | 46 | 965 |
Bo Yu | 13 | 26 | 1135 |
Pankaj Gupta | 13 | 42 | 788 |
Joachim Wehinger | 12 | 31 | 541 |
Paul Ignatius | 11 | 18 | 2118 |
Yashwant B. Katpatal | 10 | 45 | 319 |
Pethuru Raj | 9 | 78 | 278 |
Swarup Mandal | 9 | 35 | 187 |
Sandipan Dey | 8 | 17 | 246 |
Zhongjun Wang | 8 | 17 | 127 |