K. Chandrashekar Shet

Learn More
This paper presents a trust based collaborative approach to mitigate black hole nodes in AODV protocol for MANET. In this approach every node monitors neighbouring nodes and calculates trust value on its neighbouring nodes dynamically. If the trust value of a monitored node goes below a predefined threshold, then the monitoring node assume it as malicious(More)
In this article, we present algorithms devised for the automatic verification of UML(Unified Modeling Language) statechart models. The basic algorithm checks the safety property violation during the construction (onthe-fly) of the state space graph and if any property violation is found, it generates a counter example. The second algorithm builds the state(More)
We discuss scheduling techniques to be used for realtime, embedded systems. Though there are several scheduling policies, the preemptive scheduling policy holds promising results. In this research paper, the different approaches to design of a scheduler for realtime Linux kernel are discussed in detail. The comparison of different preemptive scheduling(More)
In this paper, we have designed single sign on for cloud users. The proposed design allows user to use single set of credentials, even a user maintains with different kinds of cloud environments. We propose a solution with defacto standards of open authorization in which there is a trust party auditor which maintains all the credentials and cloud provider(More)
In today's business environment, web applications become more and more complex but they still need to be flexible for changes, easy to maintain and the development life cycle need to be short. A reflective technique seems to be the best way to achieve flexibility of the web applications when adding the personalization features like recommendations, special(More)
This paper describes an efficient method to detect safety specification violations in dynamic behavior model of concurrent/reactive systems. The dynamic behavior of each concurrent object in a reactive system is assumed to be represented using UML (Unified Modeling Language) statechart diagram. The verification process involves building a global state space(More)
Current telemedicine applications are usually developed for doctors to do consultation and case study between several hospitals. Patients see doctor at home via Internet becomes possible and it might be a part of lifestyle in the future. Telemedicine has been an active area of research for over 30 years. In the past, several telemedicine applications using(More)
In this research paper, a new algorithm, Parametric Multi Level Feedback Queue (PMLFQ), has been presented for solving the problems and minimizing the response time. In this algorithm, a parametric approach has been utilized for defining the optimized quantum of each queue and number of queues. One of the most efficient algorithms for real time scheduling(More)
The model based development is a widely accepted phenomenon to build dependable software. This has lead to development of tools which can generate deployable code from the model. Hence, ensuring the correctness of such models becomes extremely important. Model checking technique can be applied to detect specification violations in such models at the early(More)
Virtualization technology enabled hosting of applications and services in an isolated and resource guaranteed virtual machines (VMs). Typically single physical machine (PM) runs multiple virtual machines and application resource demands are changing with time. To achieve this, dynamic resource provisioning of physical machine resources to VMs in virtualized(More)