Maulik A. Dave

Learn More
The area of software verification has grown its importance in software engineering. This is a bibliography of verification of a specialized class of softwares called compiler. The citations are sorted year wise in chronological order with most recent years first. The format of each citation is authors; Title; publisher; year.lation and run-time validation(More)
The vehicles are significant entities inside a vehicular network, capable of exchanging safety and non-safety messages with the neighbouring vehicles and RSU (road-side unit). The rapidly changing connectivity, error prone wireless channels, and low vehicle density in vehicular networks can make the routing schemes perform less efficiently. It leads to two(More)
— Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Since the data transmission(More)
Interest in DNA computing has increased among research scientists since 1990s. Author himself is a scientist working in DNA computing. The book is an overview of DNA computing. It touches both theoretical and experimental aspects. The theoretical aspects include algorithms, and computing models. The experimental aspects consist of various DNA experiments(More)
In this column we review the following books. This book reports on a the DIMACS implementation where competitors really coded up different algorithms for the problems indicated. Books I want Reviewed If you want a FREE copy of one of these books in exchange for a review, then email me at gasarchcs.umd.edu Reviews need to be in LaTeX, LaTeX2e, or Plaintext.(More)
Most of the theories are accompanied by motivations, and explanations with the corresponding examples. The policy for organization of the book is to keep the chapter sizes small, and to present a large number (50) of chapters supplied with the chapter dependency diagrams. This policy can be of great help to students studying from the book. The division of(More)
The book is a textbook on security of communicating systems. Security is one of the major concerns while transferring data on communicating systems like Internet. This textbook presents topics like public-key cryptosystems, stream and block ciphers, some secure communication protocols, and related topics. It contains a detailed description of an advanced(More)
Interest in DNA computing has increased among research scientists since 1990s. Author himself is a scientist working in DNA computing. The book is an overview of DNA computing. It touches both theoretical and experimental aspects. The theoretical aspects include algorithms, and computing models. The experimental aspects consist of various DNA experiments(More)