Maulik A. Dave

Learn More
In structured and unstructured Peer-to-Peer (P2P) systems frequent joining and leaving of peer nodes causes topology mismatch between the P2P logical overlay network and the physical underlay network. This topology mismatch problem generates high volume of redundant traffic in the network. This paper presents Common Junction Methodology (CJM) to optimize(More)
Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Since the data transmission on(More)
The book is a textbook on security of communicating systems. Security is one of the major concerns while transferring data on communicating systems like Internet. This textbook presents topics like public-key cryptosystems, stream and block ciphers, some secure communication protocols, and related topics. It contains a detailed description of an advanced(More)
Theorem proving by machine is a very well developed area. The book is about Rippling, which is a proof planning technique. Automatic theorem proving is done by rewrite rules. The assumptions and already proved theorems are supplied to an automatic theorem prover in the form of rewrite rules. The prover program attempts to prove the conjecture by applying(More)
This is a text book on information theory. The major areas, covered by the book, are probability, inference, coding of data getting communicated, and neural networks. According to the preface of the book, the book is aimed at senior undergraduates and graduate students in Engineering, Science, Mathematics, and Computing. Familiarity with calculus,(More)
In this column we review the following books. This book reports on a the DIMACS implementation where competitors really coded up different algorithms for the problems indicated. Books I want Reviewed If you want a FREE copy of one of these books in exchange for a review, then email me at gasarchcs.umd.edu Reviews need to be in LaTeX, LaTeX2e, or Plaintext.(More)
1 Overview This book is in the area of searching data structures, and algorithms. It also has a discussion on experimental analysis of algorithms. The goal of DIMACS Implementation Challenges is projected as to promote top quality experimental research on algorithms, and data structures. The fifth challenge (1995-1996) was on dictionaries, and priority(More)
The first chapter gives a general introduction to DNA. A brief explanation of the double helix structure of DNA is followed by a detailed explanation of operations on DNA. The terms such as synthesis, denaturing, and ligation are explained. Cloning of DNA is described in details. Techniques such as Gel Electrophoresis for sorting DNA by size, Restriction(More)
The first chapter gives a general introduction to DNA. A brief explanation of the double helix structure of DNA is followed by a detailed explanation of operations on DNA. The terms such as synthesis, denaturing, and ligation are explained. Cloning of DNA is described in details. Techniques such as Gel Electrophoresis for sorting DNA by size, Restriction(More)