The portable storage market environment is rapidly changing due to the emergence of USB memory. USB memory is used as a portable storage device by many users. However, due to the high portability of USB memory, USB st...
详细信息
Nodes in Wireless Sensor network (WSN) are energy-constrained and have limited bandwidth. PEGASIS (Power-Efficient Gathering in Sensor informationsystems) presented in [1] is an excellent solution on energy efficienc...
详细信息
Cooperative communication has been considered as a promising method for benefiting the advantages from MIMO (multiple-input multiple-output) system for single antenna mobiles in the wireless network, and many importan...
详细信息
In this paper, we quantify the performance analysis of PingPong-128 keystream generator for wireless sensor networks. Although, PingPong-128 is not a standard stream cipher but still PingPong-128 keystream generator i...
详细信息
ISBN:
(纸本)9788988678299
In this paper, we quantify the performance analysis of PingPong-128 keystream generator for wireless sensor networks. Although, PingPong-128 is not a standard stream cipher but still PingPong-128 keystream generator is an idea for resource constrained WSNs and can be widely used in the applications of secure communication, where the communication nodes have limited computation processing and storage capabilities while requiring sufficient levels of security. We present a performance comparison of PingPong- 128 with other stream ciphers selected in European Project Ecrypt called eSTREAM project, namely Dragon, HC-128, and Rabbit. Apart from that, we are also considering RC-4 stream ciphers for comparison with pingpong-128 for wireless sensor networks.
Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MA...
详细信息
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for data security a...
详细信息
This paper describes how, in large-scale multi-agent systems, each agent's adaptive selection of peer agents for collaborative tasks affects the overall performance and how this performance varies with the workloa...
详细信息
The process of categorizing packets into flows in an Internet router is called packet classification. All packets belonging to the same flow obey a predefined rule and are processed in a similar manner by the router i...
详细信息
The process of categorizing packets into flows in an Internet router is called packet classification. All packets belonging to the same flow obey a predefined rule and are processed in a similar manner by the router itself. For example, all packets with the same destination IP address and protocol may be defined as a flow. Packet classification is the foundation of many Internet functions such as Quality of Service enforcement, monitoring applications, security, and so on. This paper presents a novel classification scheme designed for NetFPGA boards which takes advantage of a very compressed version of Deterministic Finite Automata (DFA) in order to process packets at line rate.
Acquisition of pervasive sensor data can be often unsuccessful due to power outage at nodes, time synchronization issues, interference, network transmission failures or sensor hardware issues. Such failures can lead t...
详细信息
In this paper, we discussed current situation and problems of the statistical language models. And then the development and realization methods of the long-distance dependency language model simply introduced At last ...
详细信息
暂无评论