Sciweavers

2978 search results - page 447 / 596
» Operations Research
Sort
View
126
Voted
IJNSEC
2006
143views more  IJNSEC 2006»
15 years 3 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
130
Voted
IJSN
2006
116views more  IJSN 2006»
15 years 3 months ago
A lightweight encryption and authentication scheme for wireless sensor networks
: The research of Wireless Sensor Networks (WSNs) has recently received a strong boost from IEEE 802.15.4 task group, which focuses on the specifications for low rate wireless pers...
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Ans...
IJSNET
2006
217views more  IJSNET 2006»
15 years 3 months ago
Optimal sleep scheduling with transmission range assignment in application-specific wireless sensor networks
: To extend the functional lifetime of battery-operated Wireless Sensor Networks (WSNs), stringent sleep scheduling strategies with communication duty cycles running at sub-1% rang...
Rick W. Ha, Pin-Han Ho, Xuemin Shen
JDCTA
2008
206views more  JDCTA 2008»
15 years 3 months ago
An Application Strategy for PLM in Construction Industry
There are many interests and researches among an industry as IT develops. It is important to use information effectively and adequately as applying IT to industry because IT provi...
Kyung-Min Min, Nam-Hyuk Ham, Ju-Hyung Kim, Yoon-Su...
137
Voted
JLP
2008
92views more  JLP 2008»
15 years 3 months ago
Relational measures and integration in preference modeling
Based on a set of criteria and a measuring lattice, we introduce relational measures as generalizations of fuzzy measures. The latter have recently made their way from the interva...
Gunther Schmidt, Rudolf Berghammer