標(biāo)題: Titlebook: Computer Networks and Distributed Systems; International Sympos Amir Hossein Jahangir,Ali Movaghar,Hossein Asadi Conference proceedings 201 [打印本頁] 作者: proptosis 時間: 2025-3-21 17:04
書目名稱Computer Networks and Distributed Systems影響因子(影響力)
書目名稱Computer Networks and Distributed Systems影響因子(影響力)學(xué)科排名
書目名稱Computer Networks and Distributed Systems網(wǎng)絡(luò)公開度
書目名稱Computer Networks and Distributed Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer Networks and Distributed Systems被引頻次
書目名稱Computer Networks and Distributed Systems被引頻次學(xué)科排名
書目名稱Computer Networks and Distributed Systems年度引用
書目名稱Computer Networks and Distributed Systems年度引用學(xué)科排名
書目名稱Computer Networks and Distributed Systems讀者反饋
書目名稱Computer Networks and Distributed Systems讀者反饋學(xué)科排名
作者: NEX 時間: 2025-3-21 22:03
Introducing the GBA Covert Channel in IP Multimedia Subsystem (IMS) end-users. Security is one of the main challenges in large-scale deployment of IMS. In this paper, we have focused on a particular security hole in the authentication process in IMS. We introduce and discuss the application scenarios of a new covert channel in Generic Bootstrapping Architecture (GB作者: 門窗的側(cè)柱 時間: 2025-3-22 03:31
DCF/RCB: A New Method for Detection and Punishment of Selfish Nodes in IEEE 802.11udies on its performance and improvement of its different mechanisms. The media access mechanism used in this protocol is designed with the assumption that all users will fully comply with its rules so it doesn’t contain any approach for prevention and detection of any violation of the protocol that作者: 停止償付 時間: 2025-3-22 08:09
Wireless Sensor Network Lifetime Maximization Using Multiple Mobile Sink Nodes-sink information flow routes becomes important for the survivability of sensor networks. Besides, using mobile sink node can extend the network lifetime by balancing the sensors energy consumption. In this paper, we studied lifetime maximization in wireless sensor networks (WSNs) by jointly conside作者: 使聲音降低 時間: 2025-3-22 10:45
IRTP: Improved Reliable Transport Protocol for Wireless Sensor Networkss a flow of sensed data to the sink periodically. Energy consumption is considered as a significant factor associated with the restriction in design of these specific purpose networks. To this end, we want one of the major sources of energy consumption, i.e. the number of message transmissions to be作者: finite 時間: 2025-3-22 15:57 作者: finite 時間: 2025-3-22 19:34 作者: 積云 時間: 2025-3-23 00:22 作者: Ergots 時間: 2025-3-23 04:29 作者: harpsichord 時間: 2025-3-23 08:34 作者: CREST 時間: 2025-3-23 13:37 作者: paltry 時間: 2025-3-23 17:34 作者: 實(shí)現(xiàn) 時間: 2025-3-23 19:14
An Efficient Scheduling of HPC Applications on Geographically Distributed Cloud Data Centerser such computing infrastructures through a set of data centers called a cloud federation. The data centers of a cloud federation are usually distributed over the world. The profit of cloud providers strongly depends on the cost of energy consumption. As the data centers are located in various corne作者: 火光在搖曳 時間: 2025-3-23 22:39
Conference proceedings 2014 Iran, in December 2013. The 14 full papers presented were carefully reviewed and selected from numerous submissions. They are organized in topical sections such as cognitive and multimedia networks; wireless sensor networks; security; clouds and grids.作者: cajole 時間: 2025-3-24 06:17 作者: 關(guān)節(jié)炎 時間: 2025-3-24 07:43
https://doi.org/10.1007/978-3-642-00637-1achieve a near optimal result in a polynomial time. The performance of the proposed formulation evaluated for both single and multi-sink networks. Numerical results indicated that by using the proposed approaches network lifetime increased significantly as compared to not only the fixed sink node model but also conventional mobile sink models.作者: Console 時間: 2025-3-24 12:42 作者: Brocas-Area 時間: 2025-3-24 15:08 作者: floaters 時間: 2025-3-24 19:53 作者: 不真 時間: 2025-3-25 00:50
Wireless Sensor Network Lifetime Maximization Using Multiple Mobile Sink Nodesachieve a near optimal result in a polynomial time. The performance of the proposed formulation evaluated for both single and multi-sink networks. Numerical results indicated that by using the proposed approaches network lifetime increased significantly as compared to not only the fixed sink node model but also conventional mobile sink models.作者: 無情 時間: 2025-3-25 06:08 作者: 接合 時間: 2025-3-25 11:32 作者: FOR 時間: 2025-3-25 15:01 作者: jettison 時間: 2025-3-25 16:38
Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?sed on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory.作者: 輕浮思想 時間: 2025-3-25 22:35 作者: 萬神殿 時間: 2025-3-26 02:51 作者: Vasoconstrictor 時間: 2025-3-26 06:02
Models and Theoretical Perspectivesithm based on the context of node mobility is proposed to detect the Sybil in the mobile sensor networks. Simulation results using J-SIM indicates that the algorithm is able to detect the malicious nodes up?to . and also the false detection rate of nodes in the proposed method is lower than . even the Sybil nodes are added to the network.作者: 繁榮地區(qū) 時間: 2025-3-26 08:39 作者: Bereavement 時間: 2025-3-26 13:35
Detection of Sybil Nodes in Mobile Sensor Networks Using the Context of Nodes Mobilityithm based on the context of node mobility is proposed to detect the Sybil in the mobile sensor networks. Simulation results using J-SIM indicates that the algorithm is able to detect the malicious nodes up?to . and also the false detection rate of nodes in the proposed method is lower than . even the Sybil nodes are added to the network.作者: misshapen 時間: 2025-3-26 16:48 作者: 音樂等 時間: 2025-3-26 21:50 作者: Eulogy 時間: 2025-3-27 03:33
Perspectives on Individual Differencessed on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory.作者: Atheroma 時間: 2025-3-27 06:40 作者: Endemic 時間: 2025-3-27 11:09 作者: Soliloquy 時間: 2025-3-27 14:46 作者: BRUNT 時間: 2025-3-27 20:35
Personal Correlates of Test Anxietyted by its task graph. We assume that each application should meet its own deadline while the overall energy consumption that consists of both communication and computation energies should be minimized. Experimental results indicate that the proposed method consumes 8?% less energy on average, in co作者: Genteel 時間: 2025-3-28 00:21
Personal Correlates of Test Anxietyributed cloud federation is scrutinized. To address the problem, we propose a two-level scheduler which is able to reach a good compromise between CO. emission and the profit of cloud provider. The scheduler should also satisfy all HPC applications’ deadline and memory constraints. Simulation result作者: 諄諄教誨 時間: 2025-3-28 04:29
DCF/RCB: A New Method for Detection and Punishment of Selfish Nodes in IEEE 802.11ing factors. We study backoff misbehavior in this paper and a new mechanism called DCF/RCB containing detection and punishment methods is presented to overcome this misbehavior. The mechanism is based on a new method of assigning backoff, using a deterministic pseudo random function. It can be shown作者: Instantaneous 時間: 2025-3-28 10:06
A Perturbation-Proof Self-stabilizing Algorithm for Constructing Virtual Backbones in Wireless Ad-Ho this algorithm include increasing accessibility, reducing the number of update messages during convergence, and stabilizing with minimum changes in the topological structure. Proofs are given for the self-stabilization and perturbation-proofness of the proposed algorithm. The simulation results sho作者: Lumbar-Spine 時間: 2025-3-28 12:05
An Improved Distributed Intrusion Detection Architecture for Cloud Computingecific attacks that usually target the services of each group. The proposed architecture has been evaluated using Snort and by customizing it for each cloud service security requirement. Simulations indicate that the proposed architecture has been able to decrease the total time of traffic analysis 作者: 小蟲 時間: 2025-3-28 16:16
A Two-Level Energy-Aware ILP Formulation for Application Mapping on a Mobile Cloud Infrastructureted by its task graph. We assume that each application should meet its own deadline while the overall energy consumption that consists of both communication and computation energies should be minimized. Experimental results indicate that the proposed method consumes 8?% less energy on average, in co作者: 難解 時間: 2025-3-28 21:23 作者: 行為 時間: 2025-3-29 01:03
Computer Networks and Distributed Systems978-3-319-10903-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: analogous 時間: 2025-3-29 04:04 作者: amplitude 時間: 2025-3-29 10:47 作者: 地名表 時間: 2025-3-29 12:14 作者: 極微小 時間: 2025-3-29 19:33 作者: Terminal 時間: 2025-3-29 23:08 作者: Arroyo 時間: 2025-3-30 00:23 作者: 要塞 時間: 2025-3-30 04:49
Models and Theoretical Perspectives other side, contributes to solve the free-riding problem and challenges on the copyright issue in peer to peer video streaming applications. In this paper, we propose a new peer to peer micropayment scheme for video streaming services, which is called PPayWord and is based on PayWord micropayment s作者: 阻擋 時間: 2025-3-30 10:10 作者: 盡責(zé) 時間: 2025-3-30 13:15 作者: adduction 時間: 2025-3-30 17:16
Models and Theoretical Perspectives of these networks will also become more important. Sybil attack is one of the serious attacks in this network that a malicious node with the publication of his several fake IDs wants to corrupt several network operations such as routing protocols, data aggregation and voting. Due to the mobility of作者: affluent 時間: 2025-3-30 23:14
Personal Correlates of Test Anxietyssing constraint has been addressed in recent years with the introduction of the concept of mobile cloud computing where a computationally intensive task is distributed among several mobile devices each consisting of an MPSoC. Application mapping and scheduling in the mobile cloud environment is an