Monica Dixit

Learn More
In this paper, we present a novel method for deep user profiling using information available on social networks about a user's activities and interests. We use this information to personalize the search for the user and make results available via web and low end mobile phones. In addition to using a user's profile as a context, we also use the context of(More)
Distributed protocols executing in uncertain environments, like the Internet or ambient computing systems, should dynamically adapt to environment changes in order to preserve Quality of Service (QoS). In earlier work, it was shown that QoS adaptation should be dependable, if correctness of protocol properties is to be maintained. More recently, some ideas(More)
Distributed protocols executing in uncertain environments, like the Internet, had better adapt dynamically to environment changes in order to preserve QoS. In a previous work, it was shown that QoS adaptation should be dependable, if correctness of protocol properties is to be maintained. In this paper we provide concrete strategies and methodologies to(More)
Unreliable failure detectors are a fundamental building block in the design of reliable distributed systems. But unreliability must be bounded, despite the uncertainties affecting the timeliness of communication. This is why it is important to reason in terms of the quality of service (QoS) of failure detectors, both in their specification and evaluation.(More)
Distributed protocols executing in uncertain environments, like the Inter-net, had better adapt dynamically to environment changes in order to preserve QoS. In earlier work, it was shown that QoS adaptation should be dependable , if correctness of protocol properties is to be maintained. More recently, some ideas concerning specific strategies and(More)
Distributed applications executing in probabilistic environments, like the Internet, often need to make timing assumptions, for instance about the maximum message delay or the round-trip delay. In the case of adaptive systems these bounds should be computed at run-time, using probabilistic or other more or less ad hoc approaches, typically with the(More)
files are stored in PDF, with the report number as filename. Alternatively, reports are available by post from the above address. Abstract Algorithms for solving distributed system problems, such as consensus, often use timeouts as a mean to achieve progress, even if encapsulated in failure detection services. They are designed in a way that safety is(More)
Sensors when interspersed in our structures and ambient environment coupled with efficient relay of the sensed data could provide numerous advantages to the society. Tedious tasks like monitoring a field or sensitive ones like keeping track of an endangered species can be automated through a system of coherent sensors. Wireless sensor networks (WSNs) are(More)
Wireless sensor networks consist of spatially distributed sensor to monitor physical or environmental conditions and cooperatively pass their data to a central location. These kinds of network have come into prominence because they hold the potential to revolutionize many segments of our life from environmental monitoring and conservation to automation in(More)