Sciweavers

12194 search results - page 122 / 2439
» cans 2010
Sort
View
EJWCN
2010
94views more  EJWCN 2010»
13 years 4 months ago
Efficient Scheduling of Pigeons for a Constrained Delay Tolerant Application
Information collection in the disaster area is an important application of pigeon networks - a special type of delay tolerant networks (DTN) that borrows the ancient idea of using ...
Jiazhen Zhou, Jiang Li, Legand L. Burge III
EJWCN
2010
237views more  EJWCN 2010»
13 years 4 months ago
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
Abstract--Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sn...
Honglong Chen, Wei Lou, Xice Sun, Zhi Wang
IEEEHPCS
2010
13 years 4 months ago
Framework of Web content filtering for IPv6
IPv6 embraces various good features from the security perspective, but the improvements also bring us some new challenges for web content filtering. This paper presents a new fram...
Yingxu Lai, Qian Ma, Zhen Yang, Jing Liu
IEEEVAST
2010
13 years 4 months ago
Helping users recall their reasoning process
The final product of an analyst`s investigation using a visualization is often a report of the discovered knowledge, as well as the methods employed and reasoning behind the disco...
Heather Richter Lipford, Felesia Stukes, Wenwen Do...
IJACTAICIT
2010
84views more  IJACTAICIT 2010»
13 years 4 months ago
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions
The theory of regions has been recognized as the optimal deadlock prevention policy based on the marking/transition-separation instance (MTSI) or the event-state-separation-proble...
Yi-Sheng Huang, Yen-Liang Pan