Sathya Gunasekaran

Learn More
Censorship circumvention systems that use HTTP as cover traffic make tradeoffs between deniability and performance by offering either deniability at the expense of performance (e.g., Infranet) or performance at the expense of deniability (e.g., StegoTorus). These systems do so because HTTP is typically very asymmetric, with very little capacity to carry(More)
All validations of MANET simulations are meaningful when they use realistic mobility models. If this movement is unrealistic, the simulation results obtained may not correctly reflect the true performance of the protocols. The majority of existing mobility models for MANET do not provide realistic movement. Most of the mobile nodes are directly or(More)
Most of the MANET protocols are evaluated by simulation environments. The validation is meaningful when they use realistic mobility models. Once the nodes have been initially distributed, the mobility model dictates the movement of the nodes within the network. If this movement is unrealistic, the simulation results obtained may not correctly reflect the(More)
Collaborative tagging is one of the most popular services available in social networks, and it allows user to classify either online or offline resources based on their feedback, deliver in the form of tags. Although tags may not be secret information the wide use of collaborative tagging services increases the risk, thereby seriously compromising user(More)
The Association Rule Mining is the traditional mining technique which identifies the frequent itemsets from the databases and this technique generates the rules by considering the each items. The traditional association rule mining fails to obtain the infrequent itemsets with higher profit. Since association rule mining technique treats all the items in the(More)
World Wide Web is a repository containing an enormous amount of documents and hyperlinked documents. The information on the web is shared based on the user interest. The search through these documents considers the user query and retrieves documents that are related. Traditionally the search engine includes three operations such as searching, indexing and(More)
  • Gowthami R, S Gunasekaran, Student-M E, I Cloud Computing, Iv Scheduling
  • 2015
One of the current emerging trend is cloud computing. The achievement of cloud computing is the amount of rising level in case of real-time applications such as signal processing and weather forecasting. Temporarily, scheduling for real-time tasks is playing a vital role for a cloud provider to retain its QoS and enrich the system's performance. A mechanism(More)
  • 1