Subbarayan Venkatesan

Learn More
— We consider the issue of designing a generic transport layer protocol for energy-constrained sensor networks. We present the requirements for such a transport protocol and propose Sensor Transmission Control Protocol (STCP). STCP is a generic, scalable and reliable transport layer protocol where a majority of the functionalities are implemented at the(More)
— One of the main design issues for a sensor network is conservation of the energy available at each sensor node. We propose to deploy multiple, mobile base stations to prolong the lifetime of the sensor network. We split the lifetime of the sensor network into equal periods of time known as rounds. Base stations are relocated at the start of a round. Our(More)
Detecting properties about distributed program as an important problem in testing and debugging distributed programs. This problem is very hard due to the com-binatorial explosion of the global state space. For a given execution, we consider the problem of detecting whether a predicate @ is true at some global state of the system. First, we present a space(More)
—There is a growing trend in using mobile computing environment for several applications, and it is important that the mobile systems are provided adequate support both at the systems level and at the communication level. Causal ordering is a useful property, particularly in applications that involve human interactions. (Such applications are common in(More)
hoc networks consist of a set of mobile hosts communicating among themselves using wireless links, without the use of any other communication support facilities (e.g., base stations). They are also called mobile radio networks or multihop wireless networks. Two mobile hosts (MHs) are said to be within range and neighbors of each other if each can receive(More)
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and how the system events are related. We consider intrusions of file systems. Existing tools, like BackTracker, help the system administrator backtrack from the detection point, which(More)
Detecting termination of a distributed computation is a fundamental problem in distributed systems. We present two optimal algorithms for detecting termination of a non-diffusing distributed computation for an arbitrary topology. Both algorithms are optimal in terms of message complexity and detection latency. The first termination detection algorithm has(More)