Sciweavers

6224 search results - page 205 / 1245
» Recent Advances in Networking
Sort
View
86
Voted
IJNSEC
2010
104views more  IJNSEC 2010»
14 years 7 months ago
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
Pseudo-random subsets of the set {1, 2, . . . , N} have many applications in the fields of network security, cryptography and other security issues. Recently, Dartyge and S
Zhixiong Chen, Li Xu, Chenhuang Wu
126
Voted
WIOPT
2011
IEEE
14 years 4 months ago
Open loop optimal control of base station activation for green networks
Abstract—In recent years there has been an increasing awareness that the deployment as well as utilization of new information technology may have some negative ecological impact....
Sreenath Ramanath, Veeraruna Kavitha, Eitan Altman
199
Voted
GIS
2003
ACM
16 years 1 months ago
Computational data modeling for network-constrained moving objects
Advances in wireless communications, positioning technology, and other hardware technologies combine to enable a range of applications that use a mobile user's geo-spatial da...
Laurynas Speicys, Christian S. Jensen, Augustas Kl...
134
Voted
ITNG
2008
IEEE
15 years 7 months ago
Implementing and Validating an Environmental and Health Monitoring System
In this paper the authors describe the implementation and validation of a prototype of an environmental and health monitoring system based on a Wireless Sensor Network (WSN). The ...
Marco Messina, Yen Yang Lim, Elaine Lawrence, Don ...
83
Voted
IWCMC
2006
ACM
15 years 6 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...