My research interests include studies in
Computational Molecular Biology,
Computer Network Security, Data & Communication Networks,
Distributed & Mobile Agent Computing, Wireless Ad Hoc & Sensor Networks.
For additional details on all these topics please look at my list
Investigatons focus on fundamental issues in Network Computing.
Of interest are distributed computations in distributed/data networks,
(as well as, ad-hoc, wireless, sensor) peer-to-peer computing as
well as social networks and small world phenomena.
Communication complexity is studied and solutions are sought that optimize
the parameters involved. The distributed systems investigated
involve a broad range of assumptions concerning synchronicity,
fault tolerance, anonymity of processors, as well as local and
global awareness. Design options are mathematically analyzed and
sometimes evaluated with simulation results in order to study the effects
of the different protocol mechanisms.
The flow of data through a system is greately affected by the presence
of high security gateways and web servers.
Aim of the research will be the study and analysis
of the performance of a network when services and documents are made
remotely accessible (e.g., on the web) in a
secure way. Our methodology will use a combination of paradigms, including
mobile agents, smart packets, distributed objects in order to create
a trusted multi-level operating environment. Of particular interest are
DDoS attacks, intrusion detection systems, and related security issues in
modern computer environments, like ad-hoc and wireless networks, RFIDs, etc.
The crucial questions that underlie the efficiency
and security of communication in wireless networks
involve architectural, methodological and coordination
issues. Some of the questions we will try to answer
in the long term include:
What characteristics of the wireless nodes and what wireless
topological and architectural designs will play a significant
role in the development of efficient algorithms?
What methodologies should be explored in order to turn the inherent
locality of information in a wireless system to an advantageous
How do we coordinate wireless processes in order to establish
efficient and secure communication channels and provide privacy
Resolution of these questions will address efficiency analysis
and communication security and also lead to new paradigms.
|Computational Molecular Biology|
Of interest are asymptotic problems of RNA secondary structures, random and viral RNA, folding energies, as well as fundamental problems on biological networks.