Sciweavers

ITIIS
2010
247views more  ITIIS 2010»
12 years 12 months ago
An Efficient Overlay for Unstructured P2P File Sharing over MANET using Underlying Cluster-based Routing
In traditional unstructured P2P file sharing network, each peer establishes connections with a certain number of randomly chosen other peers. This would lead to redundant traffic ...
Nadir Shah, Depei Qian
ITIIS
2010
158views more  ITIIS 2010»
12 years 12 months ago
Development of a Dynamic Collision Avoidance Algorithm for Indoor Tracking System Based on Active RFID
We propose a novel collision-avoidance algorithm for the active type RFID regarding an indoor tracking system. Several well-known collision avoidance algorithms are analyzed consi...
Sekyung Han, Yeonsuk Choi, Masayuki Iwai, Kaoru Se...
ITIIS
2010
130views more  ITIIS 2010»
12 years 12 months ago
A Novel System for Detecting Adult Images on the Internet
As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen. To help prevent adolescents accessi...
Jae-Yong Park, Sang-Sung Park, Young-Geun Shin, Do...
ITIIS
2010
186views more  ITIIS 2010»
12 years 12 months ago
Adaptive Binary Negative-Exponential Backoff Algorithm Based on Contention Window Optimization in IEEE 802.11 WLAN
IEEE 802.11 medium access control (MAC) employs the distributed coordination function (DCF) as the fundamental medium access function. DCF operates with binary exponential backoff...
Bum-Gon Choi, Ju Yong Lee, Min Young Chung
ITIIS
2010
154views more  ITIIS 2010»
12 years 12 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An
ITIIS
2010
93views more  ITIIS 2010»
12 years 12 months ago
Fair Peer Assignment Scheme for Peer-to-Peer File Sharing
Chih-Lin Hu, Da-You Chen, Yi-Hsun Chang, Yu-Wen Ch...
ITIIS
2010
200views more  ITIIS 2010»
12 years 12 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
ITIIS
2010
138views more  ITIIS 2010»
12 years 12 months ago
Identification of Fuzzy Inference System Based on Information Granulation
In this study, we propose a space search algorithm (SSA) and then introduce a hybrid optimization of fuzzy inference systems based on SSA and information granulation (IG). In comp...
Wei Huang, Lixin Ding, Sung-Kwun Oh, Chang-Won Jeo...
ITIIS
2010
140views more  ITIIS 2010»
12 years 12 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo