Sciweavers

116 search results - page 19 / 24
» Simulating Individual-Based Models of Epidemics in Hierarchi...
Sort
View
GCC
2004
Springer
14 years 1 months ago
Trust Establishment in Large Scale Grid Settings
Trust establishment is hard in grid architecture by the ad hoc nature. To set up trust in large scale of network is more difficult. In this paper, we propose an automatic key manag...
Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhall...
IJCNN
2008
IEEE
14 years 2 months ago
Spatiotemporal feature extraction based on invariance representation
— This paper investigates spatiotemporal feature extraction from temporal image sequences based on invariance representation. Invariance representation is one of important functi...
Wenlu Yang, Liqing Zhang
ICC
2007
IEEE
193views Communications» more  ICC 2007»
14 years 2 months ago
Cost-Effective MAP Selection in HMIPv6 Networks
— In Hierarchical Mobile IPv6(HMIPv6) networks, the system performance is critically affected by the selection of Mobile Anchor Points(MAPs) and its load status. Thus, in this pa...
Wonsik Chung, SuKyoung Lee
ASMTA
2008
Springer
200views Mathematics» more  ASMTA 2008»
13 years 9 months ago
Bottleneck Analysis for Two-Hop IEEE 802.11e Ad Hoc Networks
Recently, a quality-of-service (QoS) extension of the IEEE 802.11 standard (known as IEEE 802.11e) for wireless LANs has been proposed. We present a versatile and accurate performa...
Anne Remke, Boudewijn R. Haverkort, Geert J. Heije...
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 19 days ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...