Sciweavers

CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 6 months ago
Bounded Reachability for Temporal Logic over Constraint Systems
Marcello M. Bersani, Achille Frigeri, Angelo Morze...
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 6 months ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 6 months ago
Clustered Hierarchy in Sensor Networks: Performance and Security
Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from...
Mohammed Abuhelaleh, Khaled M. Elleithy, Thabet M....
CORR
2010
Springer
128views Education» more  CORR 2010»
13 years 6 months ago
Effect of Inter Packet Delay in performance analysis of coexistence heterogeneous Wireless Packet Networks
As the explosive growth of the ISM band usage continues, there are many scenarios where different systems operate in the same place at the same time. One of growing concerns is th...
G. M. Tamilselvan, A. Shanmugam
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 6 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
CORR
2010
Springer
427views Education» more  CORR 2010»
13 years 6 months ago
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algori
Genetic algorithms are a population-based Meta heuristics. They have been successfully applied to many optimization problems. However, premature convergence is an inherent charact...
Poonam Garg
CORR
2010
Springer
75views Education» more  CORR 2010»
13 years 6 months ago
Dense Error-Correcting Codes in the Lee Metric
Several new applications and a number of new mathematical techniques have increased the research on errorcorrecting codes in the Lee metric in the last decade. In this work we cons...
Tuvi Etzion, Alexander Vardy, Eitan Yaakobi
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 6 months ago
Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 6 months ago
The impact of cell site re-homing on the performance of umts core networks
Mobile operators currently prefer optimizing their radio networks via re-homing or cutting over the cell sites in 2G or 3G networks. The core network, as the parental part of radi...
Ye Ouyang, M. Hosein Fallah