Regular wireless sensor networks gain more and more attention because they can help to save energy and achieve longer network lifetime. In this paper, the popular hexagonal sensor network is focused and some new energ...
详细信息
Regular wireless sensor networks gain more and more attention because they can help to save energy and achieve longer network lifetime. In this paper, the popular hexagonal sensor network is focused and some new energy efficient routing algorithms are proposed based on a new addressing scheme. Performance of the new algorithms is compared by simulation. The results show the tree based routing algorithm achieves the best performance since it can distribute the traffic more evenly in the whole networks.
Bloom's taxonomy of the cognitive domain and the SOLO taxonomy are being increasingly widely used in the design and assessment of courses, but there are some drawbacks to their use in computer science. This paper ...
详细信息
ISBN:
(纸本)9781450378420
Bloom's taxonomy of the cognitive domain and the SOLO taxonomy are being increasingly widely used in the design and assessment of courses, but there are some drawbacks to their use in computer science. This paper reviews the literature on educational taxonomies and their use in computer science education, identifies some of the problems that arise, proposes a new taxonomy and discusses how this can be used in application-oriented courses such as programming.
We propose and experiment a Social Networking Service (SNS) for local communities for tsunami disaster control. It is an easy-to-use GIS-based system with powerful GIS analysis capabilities. One of the features of the...
详细信息
ISBN:
(纸本)9780780397408
We propose and experiment a Social Networking Service (SNS) for local communities for tsunami disaster control. It is an easy-to-use GIS-based system with powerful GIS analysis capabilities. One of the features of the system is resident participation. The GIS layer structure proposed in this paper nicely supports this user participation. The system architecture and the use of the system for tsunami disaster control are discussed. We report ongoing developments in Hachinohe-City, Japan.
We encode a simplified version of the Canetti and Krawczyk (2001) formalism using Asynchronous Product Automata (APA). We then use a model checker tool, Simple Homomorphism Verification Tool (SHVT), to perform statesp...
详细信息
Data replication is one of the key components in data grid architecture as it enhances data access and reliability and minimises the cost of data transmission. In this paper, we address the problem of reducing the ove...
详细信息
The development of effective classification techniques, particularly unsupervised classification, is important for real-world applications since information about the training data before classification is relatively ...
详细信息
In this paper, a novel supervised classification approach called Collateral Representative Subspace Projection Modeling (C-RSPM) is presented. C-RSPM facilitates schemes for collateral class modeling, class-ambiguity ...
详细信息
Data replication is one of the key components in data grid architecture as it enhances data access and reliability and minimises the cost of data transmission. In this paper, we address the problem of reducing the ove...
详细信息
ISBN:
(纸本)9781424430116
Data replication is one of the key components in data grid architecture as it enhances data access and reliability and minimises the cost of data transmission. In this paper, we address the problem of reducing the overheads of the replication mechanisms that drive the data management components of a data grid. We propose an approach that extends the resource broker with policies that factor in user quality of service as well as service costs when replicating and transferring data. A realistic model of the data grid was created to simulate and explore the performance of the proposed policy. The policy displayed an effective means of improving the performance of the grid network traffic and is indicated by the improvement of speed and cost of transfers by brokers.
We encode a simplified version of the Canetti and Krawczyk (2001) formalism using asynchronous product automata (APA). We then use a model checker tool, simple homomorphism verification tool (SHVT), to perform state-s...
详细信息
We encode a simplified version of the Canetti and Krawczyk (2001) formalism using asynchronous product automata (APA). We then use a model checker tool, simple homomorphism verification tool (SHVT), to perform state-space analysis on our automata in the setting of planning problem. As a case study, we revisit two tripartite key exchange protocols of Hitchcock, Boyd, and Gonzalez Nieto (2004), which carry claimed security proofs in the Canetti and Krawczyk (2001) model. We refute their proofs of security by pointing out previously unpublished flaws in the protocols using SHVT. We then point out corresponding flaws in the refuted proofs
We propose and experiment a social networking service (SNS) for local communities for tsunami disaster control. It is an easy-to-use GIS-based system with powerful GIS analysis capabilities. One of the features of the...
详细信息
We propose and experiment a social networking service (SNS) for local communities for tsunami disaster control. It is an easy-to-use GIS-based system with powerful GIS analysis capabilities. One of the features of the system is resident participation. The GIS layer structure proposed in this paper nicely supports this user participation. The system architecture and the use of the system for tsunami disaster control are discussed. We report ongoing developments in Hachinohe-City, Japan
暂无评论