Nipoon Malhotra

Learn More
With the development of location aware sensor applications, location determination has become an increasingly important middleware technology. Numerous current technologies for location determination of sensor nodes use the received signal strength from sensor nodes using omnidirectional antennas. However, an increasing number of sensor systems are now(More)
This paper presents a study of topological characteristics of mobile wireless ad-hoc networks. The characteristics studied are connectivity, coverage, and diameter. Knowledge of topological characteristics of a network aids in the design and performance prediction of network protocols. This paper introduces intelligent goaldirected mobility algorithms for(More)
An efficient recovery protocol for lost messages is crucial for supporting reliable multicasting. The tree-based recovery protocols group nodes into recovery regions and designate a recovery node per region for buffering and retransmitting lost messages. In these protocols, the recovery host may get overloaded during periods of large message losses and(More)
With the development of location aware sensor applications, location determination has become an increasingly important middleware technology. Numerous current technologies for location determination of sensor nodes use the received signal strength from sensor nodes using omni-directional antennas. However, an increasing number of sensor systems are now(More)
A large class of sensor networks is used for data collection and aggregation of sensory data about the physical environment. Since sensor nodes are often powered by limited energy sources, such as battery which may be difficult to replace, energy saving is an important criterion in any activity. Some deployments of sensor networks have passive mobile nodes,(More)
An efficient recovery protocol for lost messages is crucial for supporting reliable multicasting. The treebased recovery protocols group nodes into recovery regions and designate a recovery node per region for buffering and retransmitting lost messages. In these protocols, the recovery host may get overloaded during periods of large message losses and(More)
Utilizing a systematic methodology (The Consultation-Liaison Outcome Evaluation System), the compliance of nonpsychiatric consultations within a general hospital psychiatric unit staffed by private practitioners was assessed. Thirty-one percent of the patients received such consultations and these patients had a longer length of stay than those without a(More)
Peer-to-peer systems such as Gnutella and Kazaa are used by millions of people for sharing music and many other files over the Internet, and they account for a significant portion of the Internet traffic. The traffic in a peer-to-peer overlay network is different from that in WWW in that each peer is both a client and a server. This suggests that one can(More)
The paper presents a simulation-based study of topological characteristics of a mobile wireless ad-hoc network with unreliable nodes. The characteristics studied are connectivity, coverage, maximum inter-node distance and node degree. Knowledge of these characteristics aids in the design of new distributed protocols as well as in predicting the performance(More)
  • 1