Skip to main content

previous disabled Page of 16
and
  1. No Access

    Chapter and Conference Paper

    A Method of Pair-Wise Key Distribution and Management in Distributed Wireless Sensor Networks

    Improvements in technology introduce new application for sensor networks. As Mission-critical applications are deployed in distributed wireless sensor networks, security issues arise. They are facing tremendou...

    **ng Liao, Shizhong Xu, Sheng Wang, Kaiyu Zhou in Mobile Ad-Hoc and Sensor Networks (2007)

  2. No Access

    Chapter and Conference Paper

    A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids

    Grid computing is an emerging computing architecture that can solve massive computational problems by making use of large numbers of heterogeneous computers. Job scheduling is an important issue in the high pe...

    Kun-Ming Yu, Zhi-Jie Luo, Chih-Hsun Chou in Network-Based Information Systems (2007)

  3. No Access

    Chapter and Conference Paper

    Research on Clustering Strategy for Wireless Sensor Network Based on Fuzzy Theory

    In wireless sensor network applications, effective clustering algorithm can reduce energy consumption, which can increase network scalability and lifetime. In most of traditional clustering methods, clusters d...

    Wei Zhenhua, Hou **aodong, Zhou Hong, Liu Chang’an in Mobile Ad-Hoc and Sensor Networks (2007)

  4. No Access

    Chapter and Conference Paper

    Fuzzy-Smith Control for QoS-Adaptive Notification Service

    In this paper, a QoS-Adaptive Notification Service (QANS) scheme is proposed to prevent system overload, in which the Fuzzy-Smith control approach is applied. Different with traditional admission control, QANS...

    Yuying Wang, **ngshe Zhou in Ubiquitous Intelligence and Computing (2007)

  5. No Access

    Chapter and Conference Paper

    A Key-Index Based Distributed Mechanism for Component Registration

    Component registration and organization is the base of component discovery and reuse. With the development of service-oriented architecture (SOA) and component-based software engineering (CBSE), the number of ...

    Ming Zhong, Yaoxue Zhang, Pengwei Tian in Ubiquitous Intelligence and Computing (2007)

  6. No Access

    Chapter and Conference Paper

    TransCom: A Virtual Disk Based Self-management System

    With the rapid advances in hardware and networks, the current computing systems, including desktop or embedded system for end users and routers for professional operators, is becoming more and more complex and...

    Li Wei, Yaoxue Zhang, Yuezhi Zhou in Autonomic and Trusted Computing (2007)

  7. No Access

    Chapter and Conference Paper

    Performance Analysis of a Protocol for Network-Based Localized Mobility Management

    This paper introduces a protocol for network-based localized mobility management solution, and develops an analytic model for the performance analysis based on one-dimensional random walk of mobile node. Based...

    Huachun Zhou in Mobile Ad-Hoc and Sensor Networks (2007)

  8. No Access

    Chapter and Conference Paper

    Neighbor-Aware Optimizing Routing for Wireless Ad Hoc Networks

    Wireless ad hoc networks are consisted of mobile nodes with limited bandwidth, computing ability and energy, which is different from the traditional wired networks. On demand routing protocols are proposed for...

    **anlong Jiao, **aodong Wang, **ngming Zhou in Ubiquitous Intelligence and Computing (2007)

  9. No Access

    Chapter and Conference Paper

    A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block

    In this paper, we propose a file-access method, called as OIDB(One-way Isolation Disk Block), which always keeps original files on pristine status and enables users to access files without restricting the func...

    Wenyuan Kuang, Yaoxue Zhang, Li Wei, Nan **a in Autonomic and Trusted Computing (2007)

  10. No Access

    Chapter and Conference Paper

    Directed Diffusion Based on Link-Stabilizing Clustering for Wireless Sensor Networks

    Reducing power consumption to extend network lifetime with limited energy resource is one of the most important challenges in wireless sensor networks. In addition, the issue of real-time communication is also...

    Zude Zhou, Wenjun Xu, Fangmin Li, Xuehong Wu in Ubiquitous Intelligence and Computing (2007)

  11. No Access

    Chapter and Conference Paper

    Applications and Performances of Extended TTDDs in Large-Scale Wireless Sensor Networks

    There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD is a scalable and energy-effi...

    Hong Zhou, Lu **, Zhongwei Zhang, Hesham Ali in Mobile Ad-Hoc and Sensor Networks (2007)

  12. No Access

    Chapter and Conference Paper

    BASCA: A Business Area-Oriented Service Component Adaptation Approach Suitable for Ubiquitous Environment

    Service customization always plays an important role in ubiquitous environment, in which the adaptation of service component according to user requirement is a key problem. Component adaptation is a traditiona...

    Pengwei Tian, Yaoxue Zhang, Ming Zhong in Ubiquitous Intelligence and Computing (2007)

  13. No Access

    Chapter and Conference Paper

    A Scalable Power-Efficient Data Gathering Protocol with Delay Guaranty for Wireless Sensor Networks

    Power-efficiency and transmission delay are critical for periodical data gathering applications in wireless sensor networks. This paper presents a scalable power-efficient data gathering protocol with delay gu...

    Zuzhi Fan, Huaibei Zhou in Mobile Ad-Hoc and Sensor Networks (2007)

  14. No Access

    Chapter and Conference Paper

    MP-FMIPv6: MLD Proxy Based Fast Multicast Protocol for Mobile IPv6

    Mobile multicast is a research hotspot and can provide many applications. Some schemes have been proposed to support the mobile subscriber, but most of them study the construction algorithm of dynamic multicas...

    Jianfeng Guan, Huachun Zhou, Wei Qu, Yongliang Hao in Mobile Ad-Hoc and Sensor Networks (2007)

  15. No Access

    Chapter and Conference Paper

    A SIP-Based Session Mobility Management Framework for Ubiquitous Multimedia Services

    This paper proposes a SIP-based session mobility management framework for achieving session handoff that is transparent to the underlying wireless or wired technology between network domains. Session mobility ...

    Chung-Ming Huang, Chang-Zhou Tsai in Ubiquitous Intelligence and Computing (2008)

  16. No Access

    Chapter and Conference Paper

    Multi-priority Multi-path Selection for Video Streaming in Wireless Multimedia Sensor Networks

    Video sensors are used in wireless multimedia sensor networks (WMSNs) to enhance the capability for event description. Due to the limited transmission capacity of sensor nodes, a single path often cannot meet ...

    Lin Zhang, Manfred Hauswirth, Lei Shu in Ubiquitous Intelligence and Computing (2008)

  17. No Access

    Chapter and Conference Paper

    Semantic Learning Space: An Infrastructure for Context-Aware Ubiquitous Learning

    In order to facilitate the development and proliferation of context-aware ubiquitous learning services, there is a need for architectural support in the user context processing and learning content management....

    Zhiwen Yu, **ngshe Zhou, Yuichi Nakamura in Ubiquitous Intelligence and Computing (2008)

  18. Chapter and Conference Paper

    Generic Constructions of Stateful Public Key Encryption and Their Applications

    We present generic constructions of stateful public key encryption (StPE). We build several new StPE schemes and explain existing ones using our generic constructions. Of the new StPE schemes, two schemes are ...

    Joonsang Baek, Jianying Zhou, Feng Bao in Applied Cryptography and Network Security (2008)

  19. No Access

    Book

  20. Chapter and Conference Paper

    An Efficient Identity-Based Online/Offline Encryption Scheme

    In this paper, we present an efficient Identity-based Online / Offline Encryption (IBOOE) scheme. An IBOOE scheme allows one to split the encryption into two phases. In the offline phase, most heavy computatio...

    Joseph K. Liu, Jianying Zhou in Applied Cryptography and Network Security (2009)

previous disabled Page of 16