派博傳思國際中心

標(biāo)題: Titlebook: Computer Networks and Distributed Systems; International Sympos Amir Hossein Jahangir,Ali Movaghar,Hossein Asadi Conference proceedings 201 [打印本頁]

作者: proptosis    時間: 2025-3-21 17:04
書目名稱Computer Networks and Distributed Systems影響因子(影響力)




書目名稱Computer Networks and Distributed Systems影響因子(影響力)學(xué)科排名




書目名稱Computer Networks and Distributed Systems網(wǎng)絡(luò)公開度




書目名稱Computer Networks and Distributed Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer Networks and Distributed Systems被引頻次




書目名稱Computer Networks and Distributed Systems被引頻次學(xué)科排名




書目名稱Computer Networks and Distributed Systems年度引用




書目名稱Computer Networks and Distributed Systems年度引用學(xué)科排名




書目名稱Computer Networks and Distributed Systems讀者反饋




書目名稱Computer Networks and Distributed Systems讀者反饋學(xué)科排名





作者: NEX    時間: 2025-3-21 22:03
Introducing the GBA Covert Channel in IP Multimedia Subsystem (IMS) end-users. Security is one of the main challenges in large-scale deployment of IMS. In this paper, we have focused on a particular security hole in the authentication process in IMS. We introduce and discuss the application scenarios of a new covert channel in Generic Bootstrapping Architecture (GB
作者: 門窗的側(cè)柱    時間: 2025-3-22 03:31
DCF/RCB: A New Method for Detection and Punishment of Selfish Nodes in IEEE 802.11udies on its performance and improvement of its different mechanisms. The media access mechanism used in this protocol is designed with the assumption that all users will fully comply with its rules so it doesn’t contain any approach for prevention and detection of any violation of the protocol that
作者: 停止償付    時間: 2025-3-22 08:09
Wireless Sensor Network Lifetime Maximization Using Multiple Mobile Sink Nodes-sink information flow routes becomes important for the survivability of sensor networks. Besides, using mobile sink node can extend the network lifetime by balancing the sensors energy consumption. In this paper, we studied lifetime maximization in wireless sensor networks (WSNs) by jointly conside
作者: 使聲音降低    時間: 2025-3-22 10:45
IRTP: Improved Reliable Transport Protocol for Wireless Sensor Networkss a flow of sensed data to the sink periodically. Energy consumption is considered as a significant factor associated with the restriction in design of these specific purpose networks. To this end, we want one of the major sources of energy consumption, i.e. the number of message transmissions to be
作者: finite    時間: 2025-3-22 15:57

作者: finite    時間: 2025-3-22 19:34

作者: 積云    時間: 2025-3-23 00:22

作者: Ergots    時間: 2025-3-23 04:29

作者: harpsichord    時間: 2025-3-23 08:34

作者: CREST    時間: 2025-3-23 13:37

作者: paltry    時間: 2025-3-23 17:34

作者: 實(shí)現(xiàn)    時間: 2025-3-23 19:14
An Efficient Scheduling of HPC Applications on Geographically Distributed Cloud Data Centerser such computing infrastructures through a set of data centers called a cloud federation. The data centers of a cloud federation are usually distributed over the world. The profit of cloud providers strongly depends on the cost of energy consumption. As the data centers are located in various corne
作者: 火光在搖曳    時間: 2025-3-23 22:39
Conference proceedings 2014 Iran, in December 2013. The 14 full papers presented were carefully reviewed and selected from numerous submissions. They are organized in topical sections such as cognitive and multimedia networks; wireless sensor networks; security; clouds and grids.
作者: cajole    時間: 2025-3-24 06:17

作者: 關(guān)節(jié)炎    時間: 2025-3-24 07:43
https://doi.org/10.1007/978-3-642-00637-1achieve a near optimal result in a polynomial time. The performance of the proposed formulation evaluated for both single and multi-sink networks. Numerical results indicated that by using the proposed approaches network lifetime increased significantly as compared to not only the fixed sink node model but also conventional mobile sink models.
作者: Console    時間: 2025-3-24 12:42

作者: Brocas-Area    時間: 2025-3-24 15:08

作者: floaters    時間: 2025-3-24 19:53

作者: 不真    時間: 2025-3-25 00:50
Wireless Sensor Network Lifetime Maximization Using Multiple Mobile Sink Nodesachieve a near optimal result in a polynomial time. The performance of the proposed formulation evaluated for both single and multi-sink networks. Numerical results indicated that by using the proposed approaches network lifetime increased significantly as compared to not only the fixed sink node model but also conventional mobile sink models.
作者: 無情    時間: 2025-3-25 06:08

作者: 接合    時間: 2025-3-25 11:32

作者: FOR    時間: 2025-3-25 15:01

作者: jettison    時間: 2025-3-25 16:38
Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?sed on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory.
作者: 輕浮思想    時間: 2025-3-25 22:35

作者: 萬神殿    時間: 2025-3-26 02:51

作者: Vasoconstrictor    時間: 2025-3-26 06:02
Models and Theoretical Perspectivesithm based on the context of node mobility is proposed to detect the Sybil in the mobile sensor networks. Simulation results using J-SIM indicates that the algorithm is able to detect the malicious nodes up?to . and also the false detection rate of nodes in the proposed method is lower than . even the Sybil nodes are added to the network.
作者: 繁榮地區(qū)    時間: 2025-3-26 08:39

作者: Bereavement    時間: 2025-3-26 13:35
Detection of Sybil Nodes in Mobile Sensor Networks Using the Context of Nodes Mobilityithm based on the context of node mobility is proposed to detect the Sybil in the mobile sensor networks. Simulation results using J-SIM indicates that the algorithm is able to detect the malicious nodes up?to . and also the false detection rate of nodes in the proposed method is lower than . even the Sybil nodes are added to the network.
作者: misshapen    時間: 2025-3-26 16:48

作者: 音樂等    時間: 2025-3-26 21:50

作者: Eulogy    時間: 2025-3-27 03:33
Perspectives on Individual Differencessed on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory.
作者: Atheroma    時間: 2025-3-27 06:40

作者: Endemic    時間: 2025-3-27 11:09

作者: Soliloquy    時間: 2025-3-27 14:46

作者: BRUNT    時間: 2025-3-27 20:35
Personal Correlates of Test Anxietyted by its task graph. We assume that each application should meet its own deadline while the overall energy consumption that consists of both communication and computation energies should be minimized. Experimental results indicate that the proposed method consumes 8?% less energy on average, in co
作者: Genteel    時間: 2025-3-28 00:21
Personal Correlates of Test Anxietyributed cloud federation is scrutinized. To address the problem, we propose a two-level scheduler which is able to reach a good compromise between CO. emission and the profit of cloud provider. The scheduler should also satisfy all HPC applications’ deadline and memory constraints. Simulation result
作者: 諄諄教誨    時間: 2025-3-28 04:29
DCF/RCB: A New Method for Detection and Punishment of Selfish Nodes in IEEE 802.11ing factors. We study backoff misbehavior in this paper and a new mechanism called DCF/RCB containing detection and punishment methods is presented to overcome this misbehavior. The mechanism is based on a new method of assigning backoff, using a deterministic pseudo random function. It can be shown
作者: Instantaneous    時間: 2025-3-28 10:06
A Perturbation-Proof Self-stabilizing Algorithm for Constructing Virtual Backbones in Wireless Ad-Ho this algorithm include increasing accessibility, reducing the number of update messages during convergence, and stabilizing with minimum changes in the topological structure. Proofs are given for the self-stabilization and perturbation-proofness of the proposed algorithm. The simulation results sho
作者: Lumbar-Spine    時間: 2025-3-28 12:05
An Improved Distributed Intrusion Detection Architecture for Cloud Computingecific attacks that usually target the services of each group. The proposed architecture has been evaluated using Snort and by customizing it for each cloud service security requirement. Simulations indicate that the proposed architecture has been able to decrease the total time of traffic analysis
作者: 小蟲    時間: 2025-3-28 16:16
A Two-Level Energy-Aware ILP Formulation for Application Mapping on a Mobile Cloud Infrastructureted by its task graph. We assume that each application should meet its own deadline while the overall energy consumption that consists of both communication and computation energies should be minimized. Experimental results indicate that the proposed method consumes 8?% less energy on average, in co
作者: 難解    時間: 2025-3-28 21:23

作者: 行為    時間: 2025-3-29 01:03
Computer Networks and Distributed Systems978-3-319-10903-9Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: analogous    時間: 2025-3-29 04:04

作者: amplitude    時間: 2025-3-29 10:47

作者: 地名表    時間: 2025-3-29 12:14

作者: 極微小    時間: 2025-3-29 19:33

作者: Terminal    時間: 2025-3-29 23:08

作者: Arroyo    時間: 2025-3-30 00:23

作者: 要塞    時間: 2025-3-30 04:49
Models and Theoretical Perspectives other side, contributes to solve the free-riding problem and challenges on the copyright issue in peer to peer video streaming applications. In this paper, we propose a new peer to peer micropayment scheme for video streaming services, which is called PPayWord and is based on PayWord micropayment s
作者: 阻擋    時間: 2025-3-30 10:10

作者: 盡責(zé)    時間: 2025-3-30 13:15

作者: adduction    時間: 2025-3-30 17:16
Models and Theoretical Perspectives of these networks will also become more important. Sybil attack is one of the serious attacks in this network that a malicious node with the publication of his several fake IDs wants to corrupt several network operations such as routing protocols, data aggregation and voting. Due to the mobility of
作者: affluent    時間: 2025-3-30 23:14
Personal Correlates of Test Anxietyssing constraint has been addressed in recent years with the introduction of the concept of mobile cloud computing where a computationally intensive task is distributed among several mobile devices each consisting of an MPSoC. Application mapping and scheduling in the mobile cloud environment is an




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
芜湖县| 泸定县| 博白县| 库尔勒市| 手机| 随州市| 偏关县| 金乡县| 新营市| 明水县| 灌云县| 长乐市| 咸丰县| 衡阳县| 茌平县| 惠安县| 阜新市| 天台县| 大同市| 无极县| 伊通| 邓州市| 嵊泗县| 凤城市| 昆明市| 监利县| 凤城市| 阳谷县| 乌什县| 海宁市| 徐水县| 鄯善县| 清远市| 岫岩| 巴林右旗| 大港区| 枝江市| 双流县| 巩留县| 大埔区| 扎鲁特旗|