It has been proven that Artificial Intelligence, in general, and Artificial Neural Networks, in particular, can be successfully applied to problems in the field of Knowledge Manage...
New overlay-based services aim to provide properties like resilience, availability or QoS. To achieve this, automatic organization and optimization is required, which again demands...
Dirk Haage, Ralph Holz, Heiko Niedermayer, Pavel L...
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
—The self-protecting multipath (SPM) is a simple protection switching mechanism that can be implemented, e.g., by MPLS. We present a linear program for the optimization of the SP...
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...