- Software System Performance and Reliability
- Cloud Computing and Resource Management
- Energy Efficient Wireless Sensor Networks
- IoT-based Smart Home Systems
- Software Testing and Debugging Techniques
- Distributed systems and fault tolerance
- Energy Harvesting in Wireless Networks
- User Authentication and Security Systems
- Software Engineering Research
- Network Security and Intrusion Detection
- Parallel Computing and Optimization Techniques
- IoT and Edge/Fog Computing
- Software Reliability and Analysis Research
- Formal Methods in Verification
- Evacuation and Crowd Dynamics
- Brain Tumor Detection and Classification
- Advanced Malware Detection Techniques
- Cloud Data Security Solutions
- RNA and protein synthesis mechanisms
- Human Mobility and Location-Based Analysis
- Machine Learning and ELM
- Mobile Ad Hoc Networks
- IoT and GPS-based Vehicle Safety Systems
- Advanced MIMO Systems Optimization
- Advanced Authentication Protocols Security
The Open University
2024-2025
Amrita Vishwa Vidyapeetham
2023-2024
Broad Institute
2024
National Institute of Technology Raipur
2019-2023
Graphic Era University
2023
Princeton University
2013-2016
NEC (United States)
2014
University of California, Berkeley
2007-2012
Berkeley College
2011
Savitribai Phule Pune University
2009
We present a novel dynamic analysis technique that finds real deadlocks in multi-threaded programs. Our runs two stages. In the first stage, we use an imprecise to find potential program by observing execution of program. second control random thread scheduler create with high probability. Unlike other techniques, our approach has advantage it does not give any false warnings. have implemented prototype tool for Java, and experimented on number large Java report previously known unknown were...
As the cloud era begins and failures become commonplace, failure recovery becomes a critical factor in availability, reliability performance of services. Unfortunately, problems still take place, causing downtimes, data loss, many other problems. We propose new testing framework for recovery: FATE (Failure Testing Service) DESTINI (Declarative Specifications). With FATE, is systematically tested face multiple failures. DESTINI, correct specified clearly, concisely, precisely. have integrated...
Cloud infrastructures provide a rich set of management tasks that operate computing, storage, and networking resources in the cloud. Monitoring executions these is crucial for cloud providers to promptly find understand problems compromise availability. However, such monitoring challenging because there are multiple distributed service components involved executions. CloudSeer enables effective workflow monitoring. It takes lightweight non-intrusive approach purely works on interleaved logs...
The last five years have seen a rise of implementation-level distributed system model checkers (dmck) for verifying the reliability real systems. Existing dmcks however rarely exercise multiple failures due to state-space explosion problem, and thus do not address present challenges cloud systems in dealing with complex failures. To scale dmck, we introduce semantic-aware checking (SAMC), white-box principle that takes simple semantic information target incorporates knowledge into reduction...
As hardware failures are no longer rare in the era of cloud computing, software systems must "prevail" against multiple, diverse that likely to occur. Testing multiple poses problem combinatorial explosion failures. To address this problem, we present PreFail, a programmable failure-injection tool enables testers write wide range policies prune down large space We integrate PreFail three (HDFS, Cassandra, and ZooKeeper), show variety useful pruning can for them, evaluate speed-ups testing...
We present an effective dynamic analysis for finding a broad class of deadlocks, including the well-studied lock-only deadlocks as well less-studied, but no less widespread or insidious, involving condition variables. Our consists two stages. In first stage, our observes multi-threaded program execution and generates simple program, called trace that only records operations observed during are deemed relevant to deadlocks. Such include lock acquire release, wait notify, thread start join,...
Cloud infrastructures provide a rich set of management tasks that operate computing, storage, and networking resources in the cloud. Monitoring executions these is crucial for cloud providers to promptly find understand problems compromise availability. However, such monitoring challenging because there are multiple distributed service components involved executions. CloudSeer enables effective workflow monitoring. It takes lightweight non-intrusive approach purely works on interleaved logs...
Abstract Cancer detection poses significant challenges in low-resource healthcare settings, particularly as conventional methods like mammography and Pap smear tests are tailored to the needs of industrialized nations. In recent years, Indian MedTech sector has witnessed a new trajectory artificial intelligence– machine learning–driven innovations that aim address unmet associated with early cancer such settings. This paper examines institutional bundles shape innovation capacity production...
Although IoT technology is advanced, wireless systems are prone to faults and attacks. The replaying information about routing in the case of multi-hop has led problem identity deception among nodes. devastating attacks against protocols as well harsh network conditions make situation even worse. most research literature aim at making system more trustworthy ensuring faultlessness, it still a challenging task. Motivated by this, present proposal introduces trust-aware mechanism (TARM), which...
Writing correct multithreaded programs is difficult. Existing tools for finding bugs in primarily focus on generic concurrency problems such as data races, atomicity violations, and deadlocks. However, these may sometimes be benign not help to catch other functional errors programs. In this paper, we a high-level programming error, called typestate which happens when program does follow the usage protocol of an object. We present novel technique that finds by looking at successful execution....
Modern scalable distributed systems are designed to be partition-tolerant. They often required support increasing load in service requests elastically, and provide seamless services even when some servers malfunction. Partition-tolerance enables such withstand arbitrary loss of messages as "perceived" by the communicating nodes. However, partition-tolerance robustness not tested rigorously practice. Often severe system-level design defects stay hidden after deployment, possibly resulting...
We present a novel dynamic analysis technique that finds real deadlocks in multi-threaded programs. Our runs two stages. In the first stage, we use an imprecise to find potential program by observing execution of program. second control random thread scheduler create with high probability. Unlike other techniques, our approach has advantage it does not give any false warnings. have implemented prototype tool for Java, and experimented on number large Java report previously known unknown were...
As hardware failures are no longer rare in the era of cloud computing, software systems must "prevail" against multiple, diverse that likely to occur. Testing multiple poses problem combinatorial explosion failures. To address this problem, we present PreFail, a programmable failure-injection tool enables testers write wide range policies prune down large space We integrate PreFail three (HDFS, Cassandra, and ZooKeeper), show variety useful pruning can for them, evaluate speed-ups testing...
Cloud infrastructures provide a rich set of management tasks that operate computing, storage, and networking resources in the cloud. Monitoring executions these is crucial for cloud providers to promptly find understand problems compromise availability. However, such monitoring challenging because there are multiple distributed service components involved executions. CloudSeer enables effective workflow monitoring. It takes lightweight non-intrusive approach purely works on interleaved logs...
Testing with manually generated test cases often results in poor coverage and fails to discover many corner case bugs security vulnerabilities. Automated generation techniques based on static or symbolic analysis usually do not scale beyond small program units. We propose predictive testing, a new method for amplifying the effectiveness of existing using analysis. assume that software system has an associated suite consisting set inputs invariants, form assert statements must always satisfy....
In wireless sensor networks (WSNs), mobile sink-driven data acquisition can mitigate hotspot issues, which further increases WSN efficiency, such as throughput, lifetime, and energy while reducing delay packet loss. Recently, most sink algorithms have focused on efficient paths, few consider obstacles in the network environment. Nevertheless, constructing an obstacle-aware trajectory a is challenging. this context, paper proposes bug algorithm based intelligent (CSOBUG) for to acquire from...
Abstract Wireless sensor networks have proven to be a promising paradigm due their wide applicability in the real‐world scenarios. Because of resource constraint, type‐variant and battery‐powered features nodes, key challenge is how improve energy usage network life heterogeneous networks. In this paper, Mahalanobis distance based K‐Means algorithm integrated with novel evolutionary approach for clustering called calf search optimization (K‐CSOA) that creates efficient clusters. The routing...