Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
Skip Table Of Content Section
research-article
Coverage in mobile wireless sensor networks (M-WSN)

A mobile wireless sensor network (M-WSN) consists of sensors equipped with locomotive platforms to allow movement after initial deployment. M-WSNs are useful for environments that are difficult and/or dangerous for sensor deployment. A key challenge in ...

research-article
SmartLA

High throughput wireless standards based on IEEE 802.11n and IEEE 802.11ac have been developed and released within the last few years as new amendments over the commercially popular IEEE 802.11. IEEE 802.11n and IEEE 802.11ac support a large pool of ...

research-article
A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC

We propose a secure anonymous three-factor based remote user authentication scheme for multi-server environment using ECC.We show that the proposed scheme is accurate and provides mutual authentication and session key agreement securely on the basis of ...

research-article
Improving the performance and reproducibility of experiments on large-scale testbeds with k-cores

Large-scale testbeds provide realistic environments for the experimentation and evaluation of new protocols and distributed applications. In order to be successful, these experiments must be executed on sets of nodes that present a reasonable level of ...

research-article
Real-time DDoS attack detection using FPGA

A real-time DDoS attack detection method should identify attacks with low computational overhead. Although a large number of statistical methods have been designed for DDoS attack detection, real-time statistical solution to detect DDoS attacks in ...

research-article
What do we really need to compute the Tie Strength? An empirical study applied to Social Networks

Analysis of literatures tie strength models, their applicability and limitations.Proposal of domain independent predictors.Analysis of the correlation between tie strength and social media variables.Analysis and empirical comparison of proposed ...

research-article
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)

Wireless sensor networks (WSNs) are an emerging technology used in many applications in both the civilian and military domains. Typically, these networks are deployed in remote and hostile environments. They are vulnerable to various kinds of security ...

research-article
Bloomflow

In-packet bloom filter based multicast is a family of techniques that have been recently proposed to address scalability issues in IP multicast. The main problem motivating these techniques is that network forwarding elements supporting traditional IP ...

research-article
Self-healing distributed scheduling for end-to-end delay optimization in multihop wireless networks with 6TiSCh

Time Slotted Channel Hopping (TSCH) is an amendment of the IEEE 802.15.4 working group to provide a low-power Medium Access Control (MAC) for the Internet of Things (IoT). This standard relies on techniques such as channel hopping and bandwidth ...

research-article
BFCE

Cardinality estimation is of primary importance in many RFID systems and applications. To ensure the time efficiency of estimation, numerous probability-based approaches have been proposed, most of which aim at meeting arbitrary accuracy requirement and ...

research-article
Self organizing method for handover performance optimization in LTE-advanced network

Classical wireless cellular networks configure semi-static values of handover decision parameters, which are usually been modified manually by the operator at a certain time interval post analyzing the network performance report. To reduce the operator'...

research-article
QoS-aware cooperative power control and resource allocation scheme in LTE femtocell networks

Home Evolved Node B (HeNB), which is the base-station of femtocell, is a popular research topic in the future Long Term Evolution (LTE) networks. It can serve many indoor users and improve the spectrum utility. However, the large amount of HeNBs also ...

research-article
Nap

In this paper, we revisit the idea of putting interfaces to sleep during packet overhearing (i.e., when there are ongoing transmissions addressed to other stations) from a practical standpoint. To this aim, we perform a robust experimental ...

research-article
Privacy-preserving data outsourcing in the cloud via semantic data splitting

Automatic privacy-preserving mechanism for outsourcing unstructured data to a multi-cloud.Semantic data splitting provides efficient and utility preserving data protection.It relies on a privacy model that offers intuitive and a priori privacy ...

research-article
Appendix

Comments