Now showing items 57-76 of 107

  • A novel mechanism for improving performance and security of TCP flows over satellite links 

    Thanthry, Nagaraja; Deshpande, M.; Pendse, Ravi (IEEE, 2006-10)
    Satellite based broadband networks are gaining importance due to their distance insensitivity and high bandwidth availability. Although it is possible to transmit Internet traffic through satellite network, it has been ...
  • Object oriented router simulator 

    Bhagavathula, Ravi; Shende, M.; Pendse, Ravi (International Society for Computers and Their Applications, 2001-08)
  • On the dependence of burst losses on the packet inter-arrival times in VoIP 

    Kadiyala, Murali Krishna; Pendse, Ravi; Namuduri, Kameswara (IEEE, 2009-12-06)
    In this paper, the dependency of length of burst losses on the packet inter-arrival time in Voice over Internet Protocol (VoIP) is analyzed and modeled using the semi-Markov process. The model helps in predicting future ...
  • Optimal zone (OZON) protocol for broadcast control in ad-hoc networks 

    Thanthry, Nagaraja; Malla, Deependra; Pendse, Ravi (IEEE, 2007-09-30)
    Mobile ad-hoc networks have been envisioned as the future of wireless networking technology. Continuous efforts are being put to improve the performance of ad-hoc networks in terms of path selection, quality of service ...
  • Optimum Nrm values for ERICA and EFCI schemes in ATM networks 

    Bhagavathula, Ravi; Moosa, S.; Rajamoni, R.; Pendse, Ravi (International Society for Computers and Their Applications, 2001-08)
  • PCF vs DCF: A performance comparison 

    Rasheed, S.A.; Masnoon, K.; Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2004)
    Wireless LANs are gaining importance at a very rapid pace. The idea of being mobile and connected to the Internet is driving new innovations in this area. With the recent innovations in the field of multimedia networks, ...
  • Performance analysis of UNIX user datagram protocol implementations 

    Balasubramanian, Sivakumar; Thanthry, Nagaraja; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004)
    As wired and wireless networks grow, underlying protocols need to be evaluated so that heterogeneous networks can be linked in an efficient manner. Among the transport layer protocols, user datagram protocol UDP is the ...
  • Performance of LRU block replacement algorithm with pre-fetching 

    Pendse, Ravi; Bhagavathula, Ravi (IEEE, 1998-08-09)
    An economical solution to the need for unlimited amounts of fast memory is a memory hierarchy, which takes advantage of locality and cost/performance of memory technologies. Most of the advanced block replacement algorithms ...
  • Performance of LRU-FP block replacement algorithm with pre-fetching 

    Pendse, Ravi; Katta, H.; Rajmoni, R. (International Society for Computers and Their Applications, 1999-11)
  • Pipeline LRU block replacement algorithm 

    Bhagavathula, Ravi; Chittoor, P.; Pendse, Ravi (IEEE, 2000)
    Recent advances in VLSI technology have spurred a tremendous increase in the performance of processors. Due to the slower main memory, there exists a bottleneck in the performance of computer systems. Caching is an effective ...
  • Port address translation based route optimization for mobile IP 

    Badami, D.; Thanthry, Nagaraja; Best, Patricia K.; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004-09-06)
    The current mobility management protocol mobile IP (MIP) specifies the use of a home agent (HA) in forwarding datagrams to/from the mobile node (MN). This often leads to the usage of either triangular routing or reverse ...
  • Pre-fetching with the segmented LRU algorithm 

    Pendse, Ravi; Bhagavathula, Ravi (IEEE, 1999)
    An economical solution to the need for unlimited amounts of fast memory is a memory hierarchy, which takes advantage of locality and cost/performance of memory technologies. Most of the advanced block replacement algorithms ...
  • Propagator method for joint time delay and frequency estimation 

    Qasaymeh, M.M.; Hiren, G.; Tayem, N.; Pendse, Ravi; Sawan, M. Edwin (IEEE, 2008-10-26)
    A novel method of estimating the differential delay of a sinusoidal signal is considered. The new method utilizes the propagator method (PM) which does not require the eigen-decomposition of the cross-spectral matrix (CSM) ...
  • Quantitative analysis of security protocols in wireless networks 

    Best, Patricia K.; Namuduri, Kameswara; Pendse, Ravi (IEEE, 2003-06-18)
    Security has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information ...
  • Quantizing the throughput reduction of IPSec with mobile IP 

    Khatavkar, D.; Hixon, E.R.; Pendse, Ravi (IEEE, 2002-08-04)
    The demand for immediate and universal access to information is increasing rapidly, leading to the desire for mobile access to the Internet. The Mobile Internet Protocol (Mobile IP) provides mobility to Internet users with ...
  • Radiographic screen film combination: an image analysis 

    Karim, M.A.; Pendse, Ravi (1984-10)
  • Rank revealing QR factorization for jointly time delay and frequency estimation 

    Qasaymeh, M.M.; Hiren, G.; Nizar, T.; Pendse, Ravi; Sawan, M. Edwin (IEEE, 2009-04-26)
    The rank-revealing QR factorization (RRQR) is a valuable tool in numerical linear algebra because it provides accurate information about rank and numerical null-space. In this paper, we addressed the problem of estimating ...
  • Real-time processing of speech signals using networked computers 

    Pendse, Ravi; Yip, A.W.; Hoyer, E.A. (IEEE, 1997-08-03)
    In this paper, parallel processing of speech analysis techniques using networked computers is considered. A unique multiprocessor structure and algorithms have been developed. Results are presented demonstrating that ...
  • Real-time speech signal analysis-synthesis of the Hoyer-Narris model using networked computers 

    Yip, A.W.; Pendse, Ravi; Hoyer, E.A. (IEEE, 1997-08-06)
    The Hoyer-Harris model (H2M) extracts the fundamental information of the speech signal to provide the knowledge for speech signal processing. Because of the complex algorithm, real-time analysis is not possible on a personal ...
  • RFID security threats to consumers: Hype vs. reality 

    Rao, Shantanu; Thanthry, Nagaraja; Pendse, Ravi (IEEE, 2007-10-08)
    Radio frequency identification (RFID) tags are being adopted rapidly by retail giants such as Wal-Mart In the near future these tags will be used for item level tracking of consumer products such as milk cartons, television ...