Mathews Thomas
IBM
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mathews Thomas.
congress on evolutionary computation | 2003
Johnson P. Thomas; Mathews Thomas; George Ghinea
Services such as automatic purchasing, automatic updating of prices, or getting latest information etc, can be provided on the Internet using Web services technology. A client can access these services using the Internet. Web services infrastructure includes some standards, such as simple object access protocol (SOAP), Web services description language (WSDL) and universal description, discovery and integration (UDDI). In this paper we represent distributed Web services by modeling the flow of messages and methods in a Web service transaction. Such a model assists the Web services designer to ensure the correctness of Web flows in terms of deadlock and correct termination of the Web services transaction. WSDL and methods are modeled using Petri Nets. A software tool is implemented for extracting the model from the WSDL description of the Web services flow.
international conference on e-business engineering | 2005
Subil M. Abraham; Mathews Thomas; Johnson P. Thomas
Little work has been reported on highly available Web services which are essential for mission critical applications. In this paper we propose architecture for highly available Web services for mission critical applications. The central idea is the enhancement of Web services by the introduction of a central hub to increase the availability of Web services
trust security and privacy in computing and communications | 2012
Yihong Zang; Johnson P. Thomas; Gheorghita Ghinea; Mathews Thomas; Salaheddin Darwish
Security and efficient routing are two important parameters in sensor networks. In this paper we propose SSBCR (Secured Sector Based Bi-path Clustering and Routing) protocol that takes both these two issues into consideration. It uses a bi-path routing algorithm to decrease the computational overhead as well as energy dissipation in the nodes. A key pre-distribution scheme is proposed such that nodes in the route share keys while those that are not in the route do not share keys with nodes that are in the route. Simulations have been done for both small and large areas, low and high density, on-route and non-route connectivity scenarios. Simulation results show that the proposed protocol not only provides security but also maximizes sensor network lifetime and achieves a high probability of connectivity, particularly when the network is large.
social computing behavioral modeling and prediction | 2010
Ruiyi Zhang; Johnson P. Thomas; Qiurui Zhu; Mathews Thomas
Manipulation is used as a behavior mechanism to achieve a certain goal. In this paper we propose a framework for manipulation in sensor networks where an attacker is manipulated with a long term objective in view. In particular an approach for selecting manipulation nodes is presented. Results show that the proposed scheme improves the security of the network by allowing more of the network to operate normally even when under attack. A manipulation scheme for a Denial of Service attack is proposed. A prediction based scheme is used to drive the manipulation.
information assurance and security | 2010
Johnson P. Thomas; Vinay Abburi; Mathews Thomas; Ajith Abraham
We define an ad hoc transportation system as one that has no infrastructure such as roads (and lanes), traffic lights etc. We assume that in such a system the vehicle are autonomic and can guide and direct themselves without a human driver. In this paper we investigate how a safe distance can be maintained between vehicles. A vehicle which has been compromised by an adversary can cause serious chaos and accidents in such a network (a denial of service type of attack). A simple key management scheme is then introduced to ensure secure communications between the components of the system.
ieee international conference on services computing | 2007
Anuradha Gasikanti; Johnson P. Thomas; Mathews Thomas
There is a need for the creation of virtual organizations where services offered by one organization should become accessible to other organizations. The proposed model virtual service-oriented architecture, makes the information discovery process across organizations more flexible and efficient by introducing a cache registry. A Web services architecture is realized using the Websphere message broker and WAS servers. The proposed approach is compared with extended services oriented architecture. Results show that caching significantly improves the response time.
international conference on enterprise information systems | 2004
Simon Cheng; Mathews Thomas; Santhosh Kumaran; Amaresh Rajasekharan; Frederick Y. Wu; Yiming Ye; Ying Huang
The pervasive connectivity of the Internet and the powerful architecture of the WWW are changing many market conventions and creating a tremendous opportunity for conducting business on the Internet. Digital marketplace business models and the advancement of Web related standards are tearing down walls within and between different business artifacts and entities at all granularities and at all levels, from devices, operating systems and middleware to directory, data, information, application, and finally the business processes. As a matter of fact, business process integration (BPI), which entails the integration of all the facets of business artifacts and entities, is emerging as a key IT challenge. In this paper, we describe our effort in exploring a new approach to address the complexities of BPI. More specifically, we study how to use a solution template based approach for BPI and explore the validity of this approach with a frequently encountered integration problem, the item synchronization problem for large enterprises. The proposed approach can greatly reduce the complexities of the business integration task and reduce the time and amount of effort of the system integrators. Different customers are deploying the described Item Synchronization system.
Archive | 2010
Joshua L. Purcell; Tassanee K. Supakkul; Mathews Thomas; Julio Wong
Archive | 2005
Subil M. Abraham; Tam M. Cao; Jason A. Gonzalez; Adam A. Nemati; Mathews Thomas
Archive | 2004
Subil M. Abraham; James P. Appleyard; Jason A. Gonzalez; Mathews Thomas