Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Mani, Ganapathy
George Washington University
Washington, District of Columbia
   Reader Recommended
   Reviewer Selected
Follow this Reviewer

Ganapathy Mani is a lecturer of computer science at the George Washington University, Washington, DC. His broad research interests are artificial intelligence, human-computer interaction, information management, and computational biology. He is currently conducting research on crowdsourcing, social computing, and privacy-security paradoxes in social networks. Ganapathy has a master’s degree in computer science from the George Washington University. He holds a bachelor’s degree in electronics and communication engineering from Anna University, India. He graduated with first class honors.

Previously, he worked as a research and software development engineer at the World Bank, where he developed a new integrated Internet and intranet architecture (I3), which interconnects open-source and proprietary products, to enhance the communication and collaboration of employees in the organization. Leveraging the proliferation of mobile phones to empower women in developing countries, Ganapathy, in collaboration with women’s self-help groups in India, has built an information service with micro-volunteering that can deliver vital information—educational and training opportunities—to women in remote impoverished villages in India.

As a researcher at the George Washington University, he worked on several big data management problems, including the development of fault-tolerant big data processing mechanisms using error-correcting codes. He also designed a new architecture and information flow model for surgical training with cloud computing and 3D web technologies. He built a model of the system using OpenGL and an intubation robot for generating a 3D simulation of a surgery, which is stored in the cloud and rendered through a webpage built using WebGL. It reduces the computation and storage cost while extending the service to doctors with a simple Internet connection. With these projects, Ganapathy has also developed protocols for detecting clone attacks and preventing data losses in mobile ad hoc networks.

Collaborating with the University of Medicine and Dentistry in New Jersey (UMDNJ), Ganapathy has developed an operational scheme of mental disorders in the framework of a big data computational model. As part of this project, he has developed interactive and adaptive virtual learning tools for treating autistic children. These projects and their findings have been published in international conferences as well as journals.

Apart from his research in computer science, Ganapathy has a keen research interest in physics and biology. He spends his spare time conducting research to find explanations for quantum entanglement, quantum gravity, variations in radioactive decay, and the movement of stars in galaxies. He also conducts biological research to find the disparities among gradual and punctual evolutionary theories in order to develop a generic evolutionary theory with both gradual and punctual evolution aided by epigenetics.

Date Reviewed  
- 10 of 10 reviews

  Big-data applications in the government sector
Kim G., Trimi S., Chung J. Communications of the ACM 57(3): 78-85, 2014.  Type: Article

Big data analysis is used in both public and private sectors. This article aims to differentiate between the uses of big data analytics in these sectors....

Jun 2 2014  
   Toward a social-technological system that inactivates false rumors through the critical thinking of crowds
Tanaka Y., Sakamoto Y., Matsuka T.  HICSS 2013 (Proceedings of the 2013 46th Hawaii International Conference on System Sciences, Maui, HI, Jan 7-10, 2013) 649-658, 2013.  Type: Proceedings

Mass media, the Internet in particular, often spreads false rumors and claims before they can be verified or critiqued by experts. These rumors can cause significant harm during violent events such as natural disasters. This paper pres...

May 29 2014  
   Beliefs and biases in web search
White R.  SIGIR 2013 (Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval, Dublin, Ireland, Jul 28-Aug 1, 2013) 3-12, 2013.  Type: Proceedings

It is a fact widely accepted by psychologists that people’s judgments are influenced by their beliefs and unconscious biases. Although companies that provide Internet-related services excel in tracking user behavior online, l...

Mar 25 2014  
   Paper generators: harvesting energy from touching, rubbing and sliding
Karagozler M., Poupyrev I., Fedder G., Suzuki Y.  UIST 2013 (Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology, St. Andrews, Scotland, UK, Oct 8-11, 2013) 23-30, 2013.  Type: Proceedings

Paper generators are novel, paper-like energy-harvesting structures that generate energy through user gestures such as sliding, tapping, rubbing, and touching. Most importantly, these paper generators are built with electrets, which ar...

Mar 10 2014  
   Analyzing user-generated YouTube videos to understand touchscreen use by people with motor impairments
Anthony L., Kim Y., Findlater L.  CHI 2013 (Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 1223-1232, 2013.  Type: Proceedings

People with disabilities face considerable challenges when using touchscreens. The authors of this paper investigate how well touchscreen devices work out of the box, evaluating the extent to which they affect interaction and how disab...

Dec 20 2013  
  Network formation in the presence of contagious risk
Blume L., Easley D., Kleinberg J., Kleinberg R., Tardos É. ACM Transactions on Economics and Computation 1(2): 1-20, 2013.  Type: Article

All interconnected networks may reap the benefits of neighboring nodes. But these complex networks, some of which have millions of nodes and edges, risk failure due to a very few compromised or flawed nodes. For example, replica attack...

Nov 7 2013  
   Cross-domain sentiment classification using a sentiment sensitive thesaurus
Bollegala D., Weir D., Carroll J. IEEE Transactions on Knowledge and Data Engineering 25(8): 1719-1731, 2013.  Type: Article

Sentiment classification systems are vital for applications such as targeted and contextual advertising, market analysis, opinion mining, and so on. Sentiments are expressed on sites across the web, from online shopping to movie review...

Sep 24 2013  
   Is simplicity the key to engagement for children on the autism spectrum?
Keay-Bright W., Howarth I. Personal and Ubiquitous Computing 16(2): 129-141, 2012.  Type: Article

Children with autism have difficulties with social interaction, communication (verbal and nonverbal), behavior, and interests. Computer technologies (like video games and virtual reality) are widely used in treating children with autis...

Aug 8 2013  
   Target to sensor allocation: a hierarchical dynamic distributed constraint optimization approach
Hosseini Semnani S., Basir O. Computer Communications 36(9): 1024-1038, 2013.  Type: Article

Target to sensor allocation means finding trajectories of targets moving over the sensing field and assigning sensors based on them. This is one of the important issues in fields such as military operations, surveillance, biodiversity ...

Jul 15 2013  
  The complexity of the list homomorphism problem for graphs
Egri L., Krokhin A., Larose B., Tesson P. Theory of Computing Systems 51(2): 143-178, 2012.  Type: Article

Homomorphisms are very useful in combinatorial problems in mapping and assignments. Homomorphism problems involve greater modeling power than graph coloring, yet compared to general constraint satisfaction problems (CSPs), they are sim...

May 8 2013  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy