Withthe development of WSN applications, there is increasing concern for the research of WSN. the routing algorithm is one of the important supporting technologies of WSN. However, the current studies of routing algo...
详细信息
In this paper, we present a scalable implementation of a topic modeling (Adaptive Link-IPLSA) based method for online event analysis, which summarize the gist of massive amount of changing tweets and enable users to e...
详细信息
though, Wireless Sensor Networks have many successful applications in military, smart building, habitat monitoring, etc. it just begun to show its superiority in the medical domain in recent years. Deployment of WSNs ...
详细信息
Locality Sensitive Hashing (LSH) is proposed to construct indexes for high-dimensional approximate similarity search. Multi-Probe LSH (MPLSH) is a variation of LSH which can reduce the number of hash tables. Based on ...
详细信息
In this paper, we introduce a distributed algorithm to compute the Čech complex. this algorithm is aimed at solving the coverage problems in self organized wireless networks. the complexity to compute the minimal Čech...
详细信息
In this paper we present the PL-LAB, which is a Polish nationwide network test bed involving several research and academia institutions. PL-LAB was designed to facilitate research in the area of Future Internet carrie...
详细信息
the proceedings contain 7 papers. the topics discussed include: the geomorphic view of networking: a network model and its uses;CLiSuite: simplifying the development of cross-layer adaptive applications;the power of s...
ISBN:
(纸本)9781450316071
the proceedings contain 7 papers. the topics discussed include: the geomorphic view of networking: a network model and its uses;CLiSuite: simplifying the development of cross-layer adaptive applications;the power of software-defined networking: line-rate content-based routing using OpenFlow;toward efficient and confidentiality-aware federation of access control policies;managing service performance in NoSQL distributed storage systems;towards performance isolation in multi-tenant SaaS applications;and PAPaS: peer assisted publish and subscribe.
this paper proposes a method to recommend the relevant information of the document which recorded in the development support systems such as BTS and VCS. We improve a system which we implemented in previous work with ...
详细信息
this paper aims to defeat TCG TOCTOU attacks occurring in trusted para-virtualized machines (TPVM). We propose a robust and efficient response mechanism (RERM). Compared to the existing response mechanisms, RERM is mo...
详细信息
ISBN:
(纸本)9780769548791
this paper aims to defeat TCG TOCTOU attacks occurring in trusted para-virtualized machines (TPVM). We propose a robust and efficient response mechanism (RERM). Compared to the existing response mechanisms, RERM is more effective in defeating the TPVM TCG TOCTOU attacks without incurring CPU overhead during the normal system execution. We verify the security ability of RERM via both model checking based formal verification techniques and experiments.
the IEEE802.15.4e standard for low power wireless sensor networks defines a new mode called Time Slotted Channel Hopping (TSCH) as Medium Access Control (MAC). TSCH allows highly efficient deterministic time-frequency...
详细信息
ISBN:
(纸本)9781538638392
the IEEE802.15.4e standard for low power wireless sensor networks defines a new mode called Time Slotted Channel Hopping (TSCH) as Medium Access Control (MAC). TSCH allows highly efficient deterministic time-frequency schedules that are built and maintained by the 6TiSCH operation sublayer (6top). In this paper, we propose a solution to limit the allocation of identical cells to co-located pair of nodes by distributed TSCH scheduling algorithms. It consists of making nodes able to overhear past cell negotiations exchanged in shared cells by their neighbors and prevent the nodes from reusing already assigned cells in future allocations. Our mechanism has been tested through simulations that show a significant improvement with respect to random scheduling algorithms.
暂无评论