Maulik A. Dave

Learn More
The area of software verification has grown its importance in software engineering. This is a bibliography of verification of a specialized class of softwares called compiler. The citations are sorted year wise in chronological order with most recent years first. The format of each citation is authors; Title; publisher; year.lation and run-time validation(More)
The vehicles are significant entities inside a vehicular network, capable of exchanging safety and non-safety messages with the neighbouring vehicles and RSU (road-side unit). The rapidly changing connectivity, error prone wireless channels, and low vehicle density in vehicular networks can make the routing schemes perform less efficiently. It leads to two(More)
— Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Since the data transmission(More)
Interest in DNA computing has increased among research scientists since 1990s. Author himself is a scientist working in DNA computing. The book is an overview of DNA computing. It touches both theoretical and experimental aspects. The theoretical aspects include algorithms, and computing models. The experimental aspects consist of various DNA experiments(More)
Interest in DNA computing has increased among research scientists since 1990s. Author himself is a scientist working in DNA computing. The book is an overview of DNA computing. It touches both theoretical and experimental aspects. The theoretical aspects include algorithms, and computing models. The experimental aspects consist of various DNA experiments(More)
1 Overview Software specifications and modeling are extensively used in software engineering. The variations in different specification methods are found not only at language level, but also at theoretical level. The book offers to solve the problem of integrating specifications developed with different methods. After literature survey, the first chapter(More)
Most of the theories are accompanied by motivations, and explanations with the corresponding examples. The policy for organization of the book is to keep the chapter sizes small, and to present a large number (50) of chapters supplied with the chapter dependency diagrams. This policy can be of great help to students studying from the book. The division of(More)
The book is a textbook on security of communicating systems. Security is one of the major concerns while transferring data on communicating systems like Internet. This textbook presents topics like public-key cryptosystems, stream and block ciphers, some secure communication protocols, and related topics. It contains a detailed description of an advanced(More)
(1) there are error handling code needed in a real implementation but which makes the code hard to follow and (2) variables used in the actual implementation but which serves no purpose in the code shown. Another issues is that the book is almost entirely in a functional setting (in contrast to an imperative setting). The advantage is that problems with(More)