標題: Titlebook: Advances in Wireless, Mobile Networks and Applications; International Confer Salah S. Al-Majeed,Chih-Lin Hu,Dhinaharan Nagamala Conference [打印本頁] 作者: 類屬 時間: 2025-3-21 16:33
書目名稱Advances in Wireless, Mobile Networks and Applications影響因子(影響力)
書目名稱Advances in Wireless, Mobile Networks and Applications影響因子(影響力)學科排名
書目名稱Advances in Wireless, Mobile Networks and Applications網(wǎng)絡公開度
書目名稱Advances in Wireless, Mobile Networks and Applications網(wǎng)絡公開度學科排名
書目名稱Advances in Wireless, Mobile Networks and Applications被引頻次
書目名稱Advances in Wireless, Mobile Networks and Applications被引頻次學科排名
書目名稱Advances in Wireless, Mobile Networks and Applications年度引用
書目名稱Advances in Wireless, Mobile Networks and Applications年度引用學科排名
書目名稱Advances in Wireless, Mobile Networks and Applications讀者反饋
書目名稱Advances in Wireless, Mobile Networks and Applications讀者反饋學科排名
作者: ADOPT 時間: 2025-3-21 20:49 作者: 拒絕 時間: 2025-3-22 03:32 作者: Fulsome 時間: 2025-3-22 05:06 作者: 和音 時間: 2025-3-22 12:32
Mitigating Soft Error Risks through Protecting Critical Variables and Blocksor, this paper proposes a novel methodology to detect and recover from soft error considering only ‘critical code block’ and ‘critical variable’ rather than considering all variables and/or blocks in the whole program. The proposed method reduces space and time overhead in comparison to existing dominant approach.作者: 寬敞 時間: 2025-3-22 13:08 作者: 令人苦惱 時間: 2025-3-22 19:28
The Hybrid Cubes Encryption Algorithm (HiSea)that the proposed generator matrices from hybrid cubes layers are suitable as candidate for a key schedule algorithm. Large key space will make brute force attack on the key space difficult and time consuming.作者: 伸展 時間: 2025-3-23 01:16 作者: 使苦惱 時間: 2025-3-23 02:53 作者: MORPH 時間: 2025-3-23 07:08
Luis M. Fernández,Mohamed Aquib,Pooja Bansalposed solution known as . is also combined with this loop mitigation mechanism in order to minimize the use of . and minimize the performance degradation introduced by loops between more than two nodes.作者: 割公牛膨脹 時間: 2025-3-23 12:14
Contact Geometry of Slant Submanifoldsnew schema does not degrade from the network performance by sending an additional messages to create a new backup routing table. The Simulation results (using NS2 simulator) show a comparison between existing link state protocol and the proposed algorithm.作者: FLOUR 時間: 2025-3-23 15:27 作者: fidelity 時間: 2025-3-23 19:29
Faisal A. Motashar,Alwyn S. Toothcy in Mobile IPv6. The proposed scheme consists of parallel signal execution at the access router while the mobile node is performing layer 2 handover. Simulation results shows that the proposed scheme performs better than the standard MIPv6 delays.作者: 亞當心理陰影 時間: 2025-3-23 22:35
An Efficient Mining of Dominant Entity Based Association Rules in Multi-databases network (MDLN) which can be used to generate DEBARs between the values of attributes belonging to different databases. We show that MDLN structure is . and this property of MDLN structure permit it to be used for mining vary large size databases. Experimental results reveal the efficiency of the proposed scheme.作者: 的事物 時間: 2025-3-24 05:28
Mitigation of Transient Loops in IGP Networksposed solution known as . is also combined with this loop mitigation mechanism in order to minimize the use of . and minimize the performance degradation introduced by loops between more than two nodes.作者: Irrigate 時間: 2025-3-24 07:57 作者: modifier 時間: 2025-3-24 11:13 作者: interference 時間: 2025-3-24 15:39 作者: ADOPT 時間: 2025-3-24 22:26
Conference proceedings 2011e First International Conference on Computer Science, Engineering and Applications, ICCSEA 2011, held in Dubai, United Arab Emirates, in May 2011. The book is organized as a collection of papers from WiMoA 2011 and ICCSEA 2011. The 8 revised full papers presented in the WiMoA 2011 part were carefull作者: 毗鄰 時間: 2025-3-25 03:04 作者: critic 時間: 2025-3-25 05:55 作者: 通知 時間: 2025-3-25 09:20 作者: obviate 時間: 2025-3-25 14:03 作者: neolith 時間: 2025-3-25 16:42 作者: 分貝 時間: 2025-3-25 20:06
https://doi.org/10.1007/978-3-642-03827-3solutions with those faced by other researchers in this area. Finally, we provide recommendations for consideration by researchers who may in future consider integrating several protocols on these platforms.作者: PATRI 時間: 2025-3-26 00:42 作者: 種族被根除 時間: 2025-3-26 05:19
An Goossens,Cristina Amaro,Vera Mahler a network of compromised machines that can be remotely controlled by an attacker. In this we propose an approach using honeynet data collection mechanisms to detect IRC and HTTP based botnet. We have evaluated our approach using real world network traces.作者: Palliation 時間: 2025-3-26 11:25
Paulo Flores,Hamid M. Lankaraniending traffic. We also show how to achieve the stationary state behavior of the system to limit the number of probe packets. On simulation, Bandwidth Probe gives a accurate estimation of the available bandwidth using average convergence time and lower intrusiveness.作者: VALID 時間: 2025-3-26 15:44
Mohamed Elgaaly,Raghuvir K. Salkaran application as the system load increases, whereas the existing solution may fail to allocate the new application onto the current system configuration. Again, a node(used to describe a task in an application) belonging to an ACG is deallocated when its Life-Time expires which results in minimizing the communication energy consumption.作者: dissent 時間: 2025-3-26 19:45
Implementing Recovery in Low-Resource Stationary Wireless Sensor Networkssolutions with those faced by other researchers in this area. Finally, we provide recommendations for consideration by researchers who may in future consider integrating several protocols on these platforms.作者: FLASK 時間: 2025-3-26 21:37 作者: 翅膀拍動 時間: 2025-3-27 02:10 作者: 招募 時間: 2025-3-27 08:06 作者: 信任 時間: 2025-3-27 13:04
Dynamic Task Allocation in Networks-on-Chipan application as the system load increases, whereas the existing solution may fail to allocate the new application onto the current system configuration. Again, a node(used to describe a task in an application) belonging to an ACG is deallocated when its Life-Time expires which results in minimizing the communication energy consumption.作者: hurricane 時間: 2025-3-27 13:55 作者: reject 時間: 2025-3-27 21:14
Trusted Third Party Synchronized Billing Framework using Multiple Authorizations by Multiple Owners of data without permission of author by non-authors within a file. Although the billing framework is illustrated for synchronization of data during acquisition of data from two sources, it could be extended to synchronization among multiple sources too.作者: 配偶 時間: 2025-3-27 22:31 作者: manifestation 時間: 2025-3-28 04:50
Performance Study of Fluid Content Distribution Model for Peer-to-Peer Overlay Networksution models for peer-topeer overlay networks. In this paper, investigates three different classes of Fluid content distribution models including: Fluid model with scheduling, backpressure and encoding. Moreover, the performance of Fluid model with backpressure, and encoding, have been evaluated and作者: cluster 時間: 2025-3-28 10:09 作者: 形上升才刺激 時間: 2025-3-28 11:45
Renz Mang,Helger Stege,Jean Krutmanns that the minimum edge trees have 20-100% larger hop count per source-receiver path compared to the minimum hop trees. Similarly, the minimum hop trees have 13-35% more edges than the minimum edge trees.作者: harrow 時間: 2025-3-28 14:57
Jean-Marie Lachapelle,Liliane Marotof data without permission of author by non-authors within a file. Although the billing framework is illustrated for synchronization of data during acquisition of data from two sources, it could be extended to synchronization among multiple sources too.作者: 向前變橢圓 時間: 2025-3-28 21:33 作者: GEM 時間: 2025-3-29 00:15 作者: 袖章 時間: 2025-3-29 07:04 作者: 驚惶 時間: 2025-3-29 08:41 作者: overshadow 時間: 2025-3-29 11:50
Salah S. Al-Majeed,Chih-Lin Hu,Dhinaharan NagamalaFast-track conference proceedings.State-of-the-art research.Up-to-date results作者: Aerate 時間: 2025-3-29 16:31
Communications in Computer and Information Sciencehttp://image.papertrans.cn/a/image/150216.jpg作者: 過渡時期 時間: 2025-3-29 20:21
Advances in Wireless, Mobile Networks and Applications978-3-642-21153-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Diuretic 時間: 2025-3-30 01:09 作者: phlegm 時間: 2025-3-30 07:03
https://doi.org/10.1007/978-3-642-03827-3of these issues and recommendations for workarounds can be very useful for the WSN research community testing hardware..In recent work, the authors developed and implemented clustering, reprogramming and authentication protocols involved in recovering WSNs with low resources. In attempting to integr作者: exceed 時間: 2025-3-30 08:58
Jean-Marie Lachapelle,Liliane Marot. Third party billing system needs acquisition of data from both users’ handset and base satiation of the service providers. Trustworthiness and Synchronization are the characteristics that need to be ensured of the third party billing system. A scheme, Multiple Authorizations by Multiple Owners (MA作者: Hangar 時間: 2025-3-30 14:11
Malin Glindvad Ahlstr?m,Jeanne Duus Johansenfe. Due to the unreliable communication medium and the failure prone sensors, coverage is an important functional property of a sensor network. Coverage is represented as a function of sensor density, which in turn depends on sensing range and the deployment function. The sensing range and the deplo作者: itinerary 時間: 2025-3-30 17:05 作者: Camouflage 時間: 2025-3-30 20:46 作者: 修改 時間: 2025-3-31 02:37
An Goossens,Cristina Amaro,Vera Mahlerle and organizations. This alarming new class of attacks directly impacts the day to day lives of millions of people and endangers businesses and governments around the world. At the centre of many of these attacks is a large pool of compromised computers located in homes, schools, businesses, and g作者: 釘牢 時間: 2025-3-31 08:40 作者: lanugo 時間: 2025-3-31 12:42 作者: 他很靈活 時間: 2025-3-31 14:31
Luis M. Fernández,Mohamed Aquib,Pooja Bansalources through full link utilization, routing loops were originally mitigated in IP networks by TTL expiration, resulting in wasted resources before packets were dropped after a few seconds. In this paper a new mitigation approach based upon . is developed, in which a router can drop looping packets作者: cortisol 時間: 2025-3-31 18:05 作者: 推測 時間: 2025-3-31 23:15
Close Encounters between Languages, surveillance systems rely on the ability to detect moving objects in the video stream which is a relevant information extraction step in a wide range of computer vision applications. There are many ways to track the moving object. Most of them use the frame differences to analyze the moving object