Sciweavers

AINA
2005
IEEE
14 years 5 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen
AINA
2005
IEEE
14 years 5 months ago
Optimal Energy-Efficient Routing for Wireless Sensor Networks
The network lifetime for wireless sensor network plays an important role to survivability. Thus, we indicate the importance of routing protocol to network lifetime, and model the ...
Chih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Che...
AINA
2005
IEEE
14 years 5 months ago
Grouping Proof for RFID Tags
An RFID tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The tag is used for management of goods and its distribution. Moreove...
Junichiro Saito, Kouichi Sakurai
AINA
2005
IEEE
14 years 5 months ago
Distribution of Data and Remote Invocation of Programs
Tomasz Müldner, Zhonghai Luo, Elhadi Shakshuk...
AINA
2005
IEEE
14 years 5 months ago
Multi-Agent Based Network Management Task Decomposition and Scheduling
The rapid development of Internet makes network management on large-scale network a critical issue. But with the management task of large-scale network becoming more complicated, ...
Bo Liu, Junzhou Luo, Wei Li
AINA
2005
IEEE
14 years 5 months ago
Scalable Collision Detection for Massively Multiplayer Online Games
We describe approaches for satisfying the real-time collision detection requirements of distributed virtual environments. We assume a distributed virtual environment is deployed u...
Graham Morgan, Kier Storey
AINA
2005
IEEE
14 years 5 months ago
A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks
— This paper presents an Emergent Ad hoc Routing Algorithm with QoS provision (EARA-QoS). This ad hoc QoS routing algorithm is based on a swarm intelligence inspired routing infr...
Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Consta...
AINA
2005
IEEE
14 years 5 months ago
Periodic Contention-Free Multiple Access for Power Line Communication Networks
— There is industrial intent to use Powerline Communication (PLC) PLC networks in the home for delivery of multimedia data, with associated challenging quality of service (QoS) r...
Yu-Ju Lin, Haniph A. Latchman, Jonathan C. L. Liu,...
AINA
2005
IEEE
14 years 5 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
AINA
2005
IEEE
14 years 5 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen