Search
Now showing items 11-20 of 32
Protecting mobile agents against malicious hosts using trusted computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
Dual-band microstrip antenna design
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
Multi-frequency microstrip antennas are very much in demand due to their physical and mechanical properties like small size, lightweight, thin profile, low power consumption, and ease of implementation in the domestic ...
Selfish routing and network creation games
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
This work studies the two important problems of routing and network creation in the situation of selfish behavior of agents. In routing, agents want to send their data from source to destination. They try to reduce cost ...
Weblab: a framework for remote laboratories
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
Remote laboratories have been proposed and implemented in the past to address a number of issues, namely wider access to high-end expensive experiments, safety, and better resource utilization. However, the existing projects ...
Active contours in action
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
There was considerable success in converting images into something like line drawings without resorting to any but the most general prior knowledge about smoothness and continuity. That led to the problem of “grouping” ...
Contributions to parasitic computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
Internet is a huge connection of networks. To ensure reliable communication on the Internet a layered architecture is used, with various protocols functional at each layer. The way these protocols are used on the Internet, ...
Differential geometry and image processing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
There are various ways of observing and interpreting images. At higher levels of abstraction, one looks at an image as collections of objects, while at the other end it is just a collection of curves and surfaces. We study ...
Distributed clustering for heterogeneous wireless sensor network in data gathering applications
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
Wireless Sensor networks have revolutionized the paradigm of gathering and processing data in diverse environment such as, wildlife area, kindergarten or agriculture farm. The nodes in these networks usually have a very ...
Energy conserving voidless coverage in wireless ad-hoc sensor networks
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
For many sensor network applications such as intrusion detection and military surveillance, it is necessary to provide full sensing coverage to a security-sensitive area while at the same time minimizing energy consumption ...
Non-uniform information dissemination for performance discovery in computational grids
(Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
The required service in any resource-sharing environments like Grid, Peer-to-Peer etc., is discovery of resources. A resource discovery mechanism returns locations of resources that match the description, given a description ...