The proceedings contain 1257 papers. The topics discussed include: research on available resource management model of cognitive networks based on intelligence agent;mobile node authentication protocol for crossing clu...
ISBN:
(纸本)9781612844855
The proceedings contain 1257 papers. The topics discussed include: research on available resource management model of cognitive networks based on intelligence agent;mobile node authentication protocol for crossing cluster in heterogeneous wireless sensor network;performance of dynamic CoMP cell selection in 3GPP LTE system level simulation;analysis and improvement on chord protocol for structured P2P;zero latency applied on a commercial data mart: real-time information in support of decision making;corporate sustainability with security to investors: analyses of business intelligence governance following the requirements of Sarbanes-Oxley law;design of the multi-level security network switch system which restricts covert channel;and the method of active queue management based on air traffic network.
The networks with the cognitive and reconfigure ability are referred to as cognitive communicationnetworks. The cognitive communication network can sense the changes about its internal and external environment throug...
详细信息
Many defects exist in traditional dynamic web service composition in terms of reliability and efficiency. With the rapid development of Web service, overcoming these defects becomes increasingly important. This paper ...
详细信息
Studio system is a platform for teaching and practice partnership, what is useful to both students39; employment ability and teachers39; work for teaching and science, an effective way to practice the educator/emp...
详细信息
In this paper we design a new system to diagnose the electrocardiogram. In this system we use the 3G net as the way to translate the data, and the smart phone as the client platform. This is new application of telemed...
详细信息
The software engineering is confronted with severe software crisis in our country, which makes the software engineering management (SEM) face great challenge. This study examines the matters with SEM and introduces th...
详细信息
In this paper, a blind digital signature is proposed, and a protocol of electronic voting based on the elliptic curve is designed. The performance analysis to these schemes shows that they are theoretically secure and...
详细信息
Aurora protocol of Xilinx Company is one that can be upgraded, small-scale chain layer protocol, can be used for the high speed serial data transmission of point to point. The paper mainly introduces relevant knowledg...
详细信息
In response to the demand for educational reform, this paper aims at cultivating college students39; intercultural communication competence on the basis of intercultural communication theory and empirical research m...
详细信息
This paper described the working principle and system components of RFID technology. And makes an objective comparison of the now popular two-dimensional bar code industry and RFID, brings out the specific problems du...
详细信息
暂无评论