Sciweavers

3134 search results - page 157 / 627
» simulation 2010
Sort
View
184
Voted
EJWCN
2010
237views more  EJWCN 2010»
14 years 10 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
118
Voted
EJWCN
2010
119views more  EJWCN 2010»
14 years 10 months ago
Embedding Protection Inside H.264/AVC and SVC Streams
into the H.264 bitstream of supplementary network abstraction layer (NAL) units that contain forward error-correction (FEC) data generated by a block error-correction code. The pro...
Catherine Lamy-Bergot, Benjamin Gadat
105
Voted
EVI
2010
94views more  EVI 2010»
14 years 10 months ago
Collective neuro-evolution for evolving specialized sensor resolutions in a multi-rover task
This article presents results from an evaluation of the collective neuro-evolution (CONE) controller design method. CONE solves collective behavior tasks, and increases task perfor...
Geoff S. Nitschke, Martijn C. Schut, A. E. Eiben
155
Voted
IJACTAICIT
2010
135views more  IJACTAICIT 2010»
14 years 10 months ago
New Clustering Protocol to Decrease Probability Failure Nodes and Increasing the Lifetime in WSNs
Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. There are many algorithms in for clustering. LEACH algorithm is one of the...
Davood KeyKhosravi, Ali Ghaffari, Ali Hosseinalipo...
118
Voted
IJNSEC
2010
116views more  IJNSEC 2010»
14 years 10 months ago
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Fangwei Wang, Yunkai Zhang, Jianfeng Ma