Vinayak S. Naik

Learn More
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the intrusion detection problem and the related problems of classifying and tracking targets. Our approach is based on a dense, distributed, wireless network of multi-modal(More)
The <i>Kansei</i> testbed at The Ohio State University is designed to facilitate research on networked sensing applications at scale. <i>Kansei</i> embodies a unique combination of characteristics as a result of its design focus on sensing and scaling: (i) Heterogeneous hardware infrastructure with dedicated node resources for local computation, storage,(More)
We present Sprinkler, a reliable data dissemination service for wireless embedded devices which are constrained in energy, processing speed, and memory. Sprinkler embeds a virtual grid over the network whereby it can locally compute a connected dominating set of the devices to avoid redundant transmissions ,and a transmission schedule to avoid collisions.(More)
Project ExScal (for extreme scale) fielded a 1000+ node wireless sensor network and a 200+ node peer-to-peer ad hoc network of 802.11 devices in a 13km by 300m remote area in Florida, USA during December 2004. In comparison with previous deployments, the ExScal application is relatively complex and its networks are the largest ones of either type fielded to(More)
This paper focuses on the spatial scaling of wireless network behaviors, ranging from low-level signals to network protocol executions to high-level application behaviors. This task is complicated as wireless channels exhibit complex fading patterns across space and time. And there have been several instances of "phase transitions", where wireless network(More)
Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and stylistic features of the SMS to classify spam and ham. SMS spam filtering can be largely influenced by(More)
We present Sprinkler, a reliable data dissemination service for wireless embedded devices which are constrained in energy, processing speed, and memory. Sprinkler embeds a virtual grid over the network whereby it can locally compute a connected dominating set of the devices so as to avoid redundant transmissions ,and a transmission schedule to avoid(More)
In developing regions like India, voice based telecommunication services are one of the most appropriate medium for information dissemination as they overcome prevalent low literacy rate. However, voice based Interactive Voice Response (IVR) systems are still not exploited to their full potential and are commonly considered as frustrating to use. We did a(More)
Mobile phones have emerged as truly pervasive and affordable Information and Communication Technology (ICT) platform in the last decade. Large penetration of cellular networks and availability of advanced hardware platforms have inspired multiple innovative research opportunities in mobile computing domain. However, most of the research challenges have(More)
Large proliferation of mobile phone applications result in extensive use of data intensive services such as multimedia download and social network communication. With limited penetration of 3G/4G networks in developing countries, it is common to use low bandwidth 2G services for data communication, resulting in larger download time and correspondingly high(More)