Pinned Repositories
CHORD-Protocol
A scalable peer-to-peer distributed lookup service. (using Akka Actors)
Distributed-Bitcoin-Miner
A distributed system replicating the bitcoin mining systems using actor model.
Facebook-Client-Server-Model
Facebook API with Secure Data and Secure Access. (REST based communication to the backend servers. JSON used for serialization/deserialization)
FileSystem-in-UserSpace
Multilevel, Client-Server, Distributed, Secure Filesystem in Userspace
Gossip_PushSum-Protocols
Gossip Based Computation of Aggregate
Kafka-Streaming
Windowed join of two Kafka streams
neo-droid
Slitherlink-Game
The game has two modes: i) Played by user by placing moves ii) Solved by the computer using search techniques. (Artificial Intelligence Project developed in LISP)
TensorFlow-Course
WirelessSensorNetwork_Protocols
Implementation of major WSN protocols: SPIN, Gossip, Flooding. Their performance analyses and comparison.
punam-mahato's Repositories
punam-mahato/Kafka-Streaming
Windowed join of two Kafka streams
punam-mahato/WirelessSensorNetwork_Protocols
Implementation of major WSN protocols: SPIN, Gossip, Flooding. Their performance analyses and comparison.
punam-mahato/FileSystem-in-UserSpace
Multilevel, Client-Server, Distributed, Secure Filesystem in Userspace
punam-mahato/CHORD-Protocol
A scalable peer-to-peer distributed lookup service. (using Akka Actors)
punam-mahato/Distributed-Bitcoin-Miner
A distributed system replicating the bitcoin mining systems using actor model.
punam-mahato/Facebook-Client-Server-Model
Facebook API with Secure Data and Secure Access. (REST based communication to the backend servers. JSON used for serialization/deserialization)
punam-mahato/Gossip_PushSum-Protocols
Gossip Based Computation of Aggregate
punam-mahato/neo-droid
punam-mahato/Slitherlink-Game
The game has two modes: i) Played by user by placing moves ii) Solved by the computer using search techniques. (Artificial Intelligence Project developed in LISP)
punam-mahato/TensorFlow-Course
punam-mahato/Wormhole_Attack_Detection
Geometric approach for wormhole attack detection, by finding forbidden substructures in the Unit Disk Graph model connectivity graph.