N. Balakrishnan

Learn More
The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress in that field. The DARPA IDS evaluation dataset has been criticized and considered by many as a very outdated dataset, unable to accommodate the(More)
The advent of digital computers has made the routine use of pattern-matching possible in various applications. This has also stimulated the development of many algorithms. In this paper, we propose a new algorithm that offers improved performance compared to those reported in the literature so far. The new algorithm has been evolved after analyzing the(More)
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferences for detecting a certain class of attack with improved accuracy, while performing moderately on the other classes. In view of the enormous computing power available in the present-day processors, deploying multiple IDSs in the same network to obtain(More)
The use of audio to retrieve and index the associated video is a relatively new approach. In this paper the focus is on MPEG video. For indexing and retrieval one needs to segment the audio stream associated with the video in terms of gender, speech, music and the speaker. This is called “Audio scene” analysis. The paper discusses techniques for such(More)
Intravenous immunoglobulin preparations are being used for an increasing number of indications. To minimize adverse reactions, sugar additives such as sucrose, maltose, and glycine are added to some preparations to serve as stabilizing agents. Intravenous immunoglobulin infusion induces acute renal failure (ARF) via a mechanism of osmotic nephrosis. Most(More)
Biological systems present remarkable adaptation, reliability and robustness in various environments, even under hostility. Most of them are performed by the individuals in a distributed and self-organized way. These biological mechanisms provide the useful resources for designing the dynamical and adaptive routing schemes of the wireless mobile sensor(More)
Various intrusion detection systems reported in literature have shown distinct preferences for detecting a certain class of attacks with improved accuracy, while performing moderately on the other classes. With the advances in sensor fusion, it has become possible to obtain a more reliable and accurate decision for a wider class of attacks, by combining the(More)
A large number of different languages are spoken in India, each language being the mother tongue of tens of millions of people. While the languages and scripts are distinct from each other, the grammar and the alphabet are similar to a large extent. One common feature is that all the Indian languages are phonetic in nature. In this paper we describe the(More)
In this paper, we present a novel heuristic for routing and wavelength assignment in Virtual-Wavelength-Path (VWP) routed WDM optical networks. We are the first to take up the approach of both minimizing the network cost as well as maximizing the resource utilization. Our algorithm not only minimizes the number of wavelengths required for supporting the(More)