Vishv Malhotra
University of Tasmania
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Vishv Malhotra.
Information Processing Letters | 1978
Vishv Malhotra; M. Pramodh Kumar; Shagun Maheshwari
An O(V cubed) algorithm is given for finding maximum flow in capacitated networks. THe algorithm is already well refenreces in literature and is being posted here to make it accessible to all in electronic form.
Sensors | 2015
Setia Budi; Paulo de Souza; Greg P. Timms; Vishv Malhotra; Paul Turner
This work proposes the design of Environmental Sensor Networks (ESN) through balancing robustness and redundancy. An Evolutionary Algorithm (EA) is employed to find the optimal placement of sensor nodes in the Region of Interest (RoI). Data quality issues are introduced to simulate their impact on the performance of the ESN. Spatial Regression Test (SRT) is also utilised to promote robustness in data quality of the designed ESN. The proposed method provides high network representativeness (fit for purpose) with minimum sensor redundancy (cost), and ensures robustness by enabling the network to continue to achieve its objectives when some sensors fail.
ieee region 10 conference | 1998
Phu Dung Le; Balasubramaniam Srinivasan; Vishv Malhotra; N Mani
Because of the mobility of the machines, it is difficult to provide a satisfactory solution to the problem of resource and load sharing. Mobile computers can change their position from time to time. In addition, their platforms are not only heterogeneous but also dynamic. This makes the resource and load sharing problem more difficult to tackle in such environments than in distributed systems. Finding a (near) optimal solution to the problem of load sharing in such environments is more complicated. Since the mobile computing environments are dynamic, traditional mechanisms for load sharing can not be employed without the support of new software or changes. This paper proposes a method for load sharing in mobile computing environments, using the abstract mobile-ticket engine in conjunction with migrations. Different migration mechanisms can then be employed in different situations to allow better level of load sharing.
Information Processing Letters | 1989
Vishv Malhotra; Tang Van To; Kanchana Kanchanasut
The conventional naive backtracking scheme for Prolog is inefficient. A more sophisticated backtracking scheme [l, 2, 3,4, 51 attempts to unprove the efficiency of execution by carefully selecting the backtrack points, without transgressing the depth-first backward-chaining, clause ordering or literal ordering within the clauses. However, many schemes [l, 3, 41, particularly those based on deductive analysis, are difficult to implement on a WAM (Warren’s Abstract Machine) [‘I]. &mar and Lin [5] have recently described a data-dependency-based backtracking scheme for Prolog that can be incorporated in a WAM implementation. We believe that the scheme, as presented, is not sufficiently selective; and as a result, it taps only a small part of the possible reduction in the search space far certain problems. For example, the 6-queens (clever) solution [l] shows only about 3.2% reduction in the search space. Assume a goal G fails to unify with a clausehead H. The search for a solution can now proceed in on,: of the following ways: Discard I-k Try to satisfy G by using a different clause. Discard G: Backtrack to an ancestor of G and try to search a solution without involving G.
international workshop on security | 2012
Abdullah Mohammed Almuhaideb; Bala Srinivasan; Phu Dung Le; Campbell Wilson; Vishv Malhotra
The next generation of mobile services makes it desirable for mobile users to be connected everywhere. Since these users usually in the move, roaming services are deployed to allow mobile users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed based on either two-party or three-party roaming structure to allow ubiquities mobile access authentication, however, limitations such as performance issues and security vulnerabilities still exist in these approaches. In this paper, we implemented a methodology for verifying authentication protocols based on SVO logic, which shows that our Passport/Visa protocols meet the desired authentication objectives and prove the protocols correctness. Moreover, we show that our proposal addresses existing limitations when compared to the other approaches.
network-based information systems | 2009
Harry Huy Hoang Ngo; Yiling Wang; Phu Dung Le; Balasubramaniam Srinivasan; Vishv Malhotra
Group key management is an important framework to secure group communications. To improve the performance of re-keying for group key management in large scale systems, logical hierarchical key was proposed. However, this approach does not consider the high re-keying cost of single user having multiple memberships. In this paper, we propose a membership oriented group key structure to optimize the re-keying of multiple membership users. Users in the systems are grouped into key-groups based on their memberships. Therefore, the re-keying operations for members of these groups can be combined without sacrificing forward secrecy. An analysis shows that the cost of re-keying operations in large scale multiple membership group key management can be improved with the proposed group key management.
international conference on web information systems and technologies | 2007
Sunanda Patro; Vishv Malhotra; Dg Johnson
This paper presents an algorithm to improve a web search query based on the feedback on the viewed documents. A user who is searching for information on the Web marks the retrieved (viewed) documents as relevant or irrelevant to further expose the information needs expressed in the original query. A new web search query matching this improved understanding of the users information needs is synthesized from these text documents. The methodology provides a way for creating web search query that matches the users information need even when the user may have difficulty in doing so directly due to lack of experience in the query design or lack of familiarity of the search domain. A user survey has shown that the algorithmically formed query has recall coverage and precision characteristics better than those achieved by the experienced human web searchers.
Information Processing Letters | 1996
Vishv Malhotra; Bala Srinivasan; Santosh Kulkarni
We present a new structure, multiple bit hashing, for building dictionaries which is storage efficient and provides fast retrieval.
International Journal of Virtual Communities and Social Networking | 2015
Nadianatra Musa; Vishv Malhotra; Td Wilmshurst
Information infrastructures and resources has become critical component of the modern business and non-business organizations. In turn this dependence makes these organizations vulnerable to any significant failure in their information infrastructures and resources. Literature is full of examples of the companies suffering major losses and even demise as a result of information infrastructure and resources failures. To mitigate this vulnerability the senior management and governance of the organizations needs to pay direct role and attention to protect their critical information infrastructures and resources. This paper provides some results of a study we conducted recently to determine how the senior management of Malaysian business organizations view and control the information infrastructure and resources in their organizations to mitigate vulnerabilities to this critical component of their business organization.
international conference on information technology | 2013
Setia Budi; Vishv Malhotra
The paper describes a multi-objective model to optimally schedule a service on a mobile device that requires data communication with the external data repositories.