Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hrushikesha Mohanty is active.

Publication


Featured researches published by Hrushikesha Mohanty.


Archive | 2005

Distributed Computing and Internet Technology

Tomasz Janowski; Hrushikesha Mohanty

Section 1 - Network Protocols.- Time-Efficient Broadcasting in Radio Networks: A Review.- An Efficient and Optimized Bluetooth Scheduling Algorithm for Piconets.- EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks.- On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks.- Self-stabilizing Routing Algorithms for Wireless Ad-Hoc Networks.- A Structured Mesh Overlay Network for P2P Applications on Mobile Ad Hoc Networks.- A Scalable and Adaptive Clustering Scheme for MANETs.- Section 2 - Security and Privacy.- A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks.- Monitoring Information Leakage During Query Aggregation.- An Efficient Certificate Authority for Ad Hoc Networks.- Design and Analysis of a Game Theoretic Model for P2P Trust Management.- Hasslefree: Simplified Access Control Management for XML Documents.- LISA: LIghtweight Security Algorithm for Wireless Sensor Networks.- Section 3 - Network Management.- An Optimal Weighted-Average Congestion Based Pricing Scheme for Enhanced QoS.- Distributed Resource Adaptation for Virtual Network Operators.- Maximum Lifetime Tree Construction for Wireless Sensor Networks.- Overlay Network Management for Scheduling Tasks on the Grid.- Section 4 - Network Services.- An End-Systems Supported Highly Distributed Content Delivery Network.- An Analytical Estimation of Durability in DHTs.- A Multiple Tree Approach for Fault Tolerance in MPLS Networks.- Selective Querying and Other Proposals for a Less Congested Gnutella Network.- Section 5 - e-Application Engineering.- Language Support and Compiler Optimizations for STM and Transactional Boosting.- Unifying Denotational Semantics with Operational Semantics for Web Services.- PHAC: An Environment for Distributed Collaborative Applications on P2P Networks.- Webformer: A Rapid Application Development Toolkit for Writing Ajax Web Form Applications.- Section 6 - e-Application Services.- Continuous Adaptive Mining the Thin Skylines over Evolving Data Stream.- Service Recommendation with Adaptive User Interests Modeling.- An Approach to Aggregating Web Services for End-User-Doable Construction of GridDoc Application.- An Adaptive Metadata Model for Domain-Specific Service Registry.- Section 7 - e-Applications.- Globalization from the Information and Communication Perspective.- WAND: A Robust P2P File System Tree Interface.- A Tsunami Warning System Employing Level Controlled Gossiping in Wireless Sensor Networks.- Relation Extraction and Validation Algorithm.- A Fair-Exchange and Customer-Anonymity Electronic Commerce Protocol for Digital Content Transactions.- A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols.- Augmentation to GT4 Framework for B2B Collaboration over Grid.


computational intelligence communication systems and networks | 2009

Prioritization of Scenarios Based on UML Activity Diagrams

P. G. Sapna; Hrushikesha Mohanty

Increased size and complexity of software requires better methods for different activities in the software development lifecycle. Quality assurance of software is primarily done by means of testing, an activity that faces constraints of both time and resources. Hence, there is need to test effectively within the constraints in order to maximize throughput i.e. rate of fault detection, coverage, etc. Test case prioritization involves techniques aimed at finding the best prioritized test suite. In this paper, we propose a prioritization technique based on UML activity diagrams. The constructs of an activity diagram are used to prioritize scenarios. Preliminary results obtained on a case-study indicate that the technique is effective in extracting the critical scenarios from the activity diagram.


international conference on information technology | 2008

Automated Scenario Generation Based on UML Activity Diagrams

P. G. Sapna; Hrushikesha Mohanty

Specification-based testing, also called black-box testing, involves producing a test suite based on the specification. Using a formal language or a model for specification helps in automation of the test generation process. For large and complex systems, testing based on covering the control flow or data flow paths becomes infeasible. In this regard, an efficient set of test scenarios need to be generated. One of the main objectives of testing is to check whether customer requirements are met. Scenarios help in generating sequence of events that represent the purpose of a system. Requirements are well defined using activity diagrams and this has led to an increased interest on generating test scenarios using activity diagrams. Each path from the initial node to the final node in an activity diagram constitutes a test scenario. The problem encountered following the strategy is exponential increase in test scenarios when considering concurrent activities, represented in an activity diagram using fork-join nodes. In this paper, we investigate this problem and have observed that the growth in test scenarios can be limited by considering domain dependency existing among concurrent activities. The paper proposes a method to automate the test scenario generation process.


amrita acm w celebration on women in computing in india | 2010

Clustering test cases to achieve effective test selection

P. G. Sapna; Hrushikesha Mohanty

Full testing involves running all the tests in the test suite. This is exhaustive and will consume an inordinate amount of time and money. Hence, an ordering of test cases aids in early detection of faults. However, ordering and running a large test suite is still infeasible, as it would not be possible to run all tests during regression testing. In this work, clustering is used to select a subset of scenarios for testing. First, a distance matrix is obtained by using Levenshtein distance to compare scenarios. This distance matrix is used as input for the Agglomerative Hierarchical Clustering(AHC) technique with the objective of selecting dissimilar test scenarios and at the same time achieveing maximum coverage and rate of fault detection.


international conference on information technology coding and computing | 2004

Causal ordering in event notification service systems for mobile users

Chit Htay Lwin; Hrushikesha Mohanty; R. K. Ghosh

Advances in wireless network technology and the increasing use of number of handheld mobile devices make many services and applications necessary to be offered to mobile users. An event notification service (ENS) system is an extremely useful communication service for those applications. Therefore, it becomes necessary to extend ENS system to a mobile environment. A distributed ENS system is an asynchronous system consisting of several subsystems, namely, producer clients, consumer clients and servers without common memory and global clock. The subsystems communicate each other by sending messages with unpredictable transmission delays causing unordered propagation of messages. We describe a model of ENS system for mobile environment. Then we present a causal ordering algorithm of ENS systems for mobile environment.


hawaii international conference on system sciences | 2003

MOBICHARTS: a notation to specify mobile computing applications

Satyajit Acharya; Hrushikesha Mohanty; R. K. Shyamasundar

A standard notation, that unambiguously expresses different aspects of a system, is important to the process of software development. The expressiveness of a standard notation helps analysts and developers to describe a computing scenario or to formulate software architecture and then to communicate these decisions unambiguously to other team members. Much attention is already given to the software development methodologies and architectural descriptions. Specifically, statecharts and state transition diagrams have been used to show the state space of a system, the events that cause state transitions and the actions that result from a state change. The paradigm shift to object-oriented programming has changed the method of system analysis and design from traditional top-down approach to bottom-up object-oriented approach. This change in approach has motivated the development of objectcharts that depict the behaviour of objects used in a system. This paper extends the notational capabilities of objectcharts to specify the issues related to the mobile computing. We discuss the specialty and the limitations found in mobile computing to motivate the readers on the necessity of having methods for developing mobile computing applications. We have shown that while making use of all the niceties of Statecharts as well as objectcharts, the formalism can be extended for developing mobile computing applications. First, we discuss the need for an extension of objectchart notation by showing the limitations of objectcharts in specifying mobile computing applications. Second, we propose an extension to objectcharts, referred to as Mobicharts. The proposed Mobicharts can specify the important characteristics of mobile computing applications. We illustrate typical mobile computing characteristics such as migration, hoarding, cloning, synchronization, sharing and disconnected operations using Mobicharts.


international conference on quality software | 2005

Domain consistency in requirements specification

Satyajit Acharya; Hrushikesha Mohanty; Chris George

Fixing requirements errors that are detected late in the software development life cycle can be extremely costly. So, finding problems in requirements specification early in the development cycle is critical and crucial. A formal specification can reduce errors by reducing ambiguity and imprecision and by making some instances of inconsistency and incompleteness obvious. In this paper, with an example of a moderately complex system of the mobile computing domain, we discuss how the consistency conditions found during initial abstract formal specification help in detecting logical errors during early stages of system development. We also discuss the importance of consistency conditions while modelling the domain of a complex system and show how the identified consistency conditions help in better understanding the specification and to gain confidence on the correctness of the specification. We use a combination of techniques, like specification inspection and testing the executable specification of a prototype using test cases, to validate the specification against the requirements as well as to ensure that the specified consistency conditions are respected and maintained by the operations defined in the specification.


Proceedings of the CUBE International Information Technology Conference on | 2012

Service maps in XML

Supriya Vaddi; Hrushikesha Mohanty; R. K. Shyamasundar

Increasing number of services available on web makes service discovery a difficult problem. Existing webservice search techniques follow search by names or inputs, outputs. Here we propose a new method to search web services on the basis of service elements and the maps they make. Service maps are also found useful in exploring alternatives and business promotions associated with. The proposed concept is being implemented in jUDDI an open source software for service registry.


Information Sciences | 2009

Algorithms for validating E-tickets in mobile computing environment

Anand R. Tripathi; T. Suman Kumar Reddy; Sanjay Kumar Madria; Hrushikesha Mohanty; R. K. Ghosh

E-tickets issued online can be used by different vendors to provide services such as discount coupons for E-shopping, or an entrance for a football game. One major issue associated with E-tickets is the problem of validation, which becomes more severe in a mobile environment due to mobility of a mobile host (MH) and frequent failure/disconnection of validation servers known as mobile support stations (MSSs). Some additional problems include the identification of duplicate submissions of an E-ticket by a MH. Thus, this paper proposes two protocols using the Flat and Hierarchical schemes for E-ticket processing and validation in a mobile environment that guarantee at least and at most once property (each E-ticket is validated at least and at most once). The protocols have been validated and compared through complexity analysis and experiments.


Archive | 2015

Big Data: An Introduction

Hrushikesha Mohanty

The term big data is now well understood for its well-defined characteristics. More the usage of big data is now looking promising. This chapter being an introduction draws a comprehensive picture on the progress of big data. First, it defines the big data characteristics and then presents on usage of big data in different domains. The challenges as well as guidelines in processing big data are outlined. A discussion on the state of art of hardware and software technologies required for big data processing is presented. The chapter has a brief discussion on the tools currently available for big data processing. Finally, research issues in big data are identified. The references surveyed for this chapter introducing different facets of this emergent area in data science provide a lead to intending readers for pursuing their interests in this subject.

Collaboration


Dive into the Hrushikesha Mohanty's collaboration.

Top Co-Authors

Avatar

R. K. Ghosh

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar

P. G. Sapna

University of Hyderabad

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

R. K. Shyamasundar

Tata Institute of Fundamental Research

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tomasz Janowski

United Nations University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arunkumar Balakrishnan

Coimbatore Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge