![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
313 Result(s)
-
Chapter and Conference Paper
A Method of Pair-Wise Key Distribution and Management in Distributed Wireless Sensor Networks
Improvements in technology introduce new application for sensor networks. As Mission-critical applications are deployed in distributed wireless sensor networks, security issues arise. They are facing tremendou...
-
Chapter and Conference Paper
A Fuzzy Neural Network Based Scheduling Algorithm for Job Assignment on Computational Grids
Grid computing is an emerging computing architecture that can solve massive computational problems by making use of large numbers of heterogeneous computers. Job scheduling is an important issue in the high pe...
-
Chapter and Conference Paper
Research on Clustering Strategy for Wireless Sensor Network Based on Fuzzy Theory
In wireless sensor network applications, effective clustering algorithm can reduce energy consumption, which can increase network scalability and lifetime. In most of traditional clustering methods, clusters d...
-
Chapter and Conference Paper
Fuzzy-Smith Control for QoS-Adaptive Notification Service
In this paper, a QoS-Adaptive Notification Service (QANS) scheme is proposed to prevent system overload, in which the Fuzzy-Smith control approach is applied. Different with traditional admission control, QANS...
-
Chapter and Conference Paper
A Key-Index Based Distributed Mechanism for Component Registration
Component registration and organization is the base of component discovery and reuse. With the development of service-oriented architecture (SOA) and component-based software engineering (CBSE), the number of ...
-
Chapter and Conference Paper
TransCom: A Virtual Disk Based Self-management System
With the rapid advances in hardware and networks, the current computing systems, including desktop or embedded system for end users and routers for professional operators, is becoming more and more complex and...
-
Chapter and Conference Paper
Performance Analysis of a Protocol for Network-Based Localized Mobility Management
This paper introduces a protocol for network-based localized mobility management solution, and develops an analytic model for the performance analysis based on one-dimensional random walk of mobile node. Based...
-
Chapter and Conference Paper
Neighbor-Aware Optimizing Routing for Wireless Ad Hoc Networks
Wireless ad hoc networks are consisted of mobile nodes with limited bandwidth, computing ability and energy, which is different from the traditional wired networks. On demand routing protocols are proposed for...
-
Chapter and Conference Paper
A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block
In this paper, we propose a file-access method, called as OIDB(One-way Isolation Disk Block), which always keeps original files on pristine status and enables users to access files without restricting the func...
-
Chapter and Conference Paper
Directed Diffusion Based on Link-Stabilizing Clustering for Wireless Sensor Networks
Reducing power consumption to extend network lifetime with limited energy resource is one of the most important challenges in wireless sensor networks. In addition, the issue of real-time communication is also...
-
Chapter and Conference Paper
Applications and Performances of Extended TTDDs in Large-Scale Wireless Sensor Networks
There are many applications of large scale sensor networks in which both the stimulus and the data collection stations are mobile (i.e. animal tracking, battlefield chasing). TTDD is a scalable and energy-effi...
-
Chapter and Conference Paper
BASCA: A Business Area-Oriented Service Component Adaptation Approach Suitable for Ubiquitous Environment
Service customization always plays an important role in ubiquitous environment, in which the adaptation of service component according to user requirement is a key problem. Component adaptation is a traditiona...
-
Chapter and Conference Paper
A Scalable Power-Efficient Data Gathering Protocol with Delay Guaranty for Wireless Sensor Networks
Power-efficiency and transmission delay are critical for periodical data gathering applications in wireless sensor networks. This paper presents a scalable power-efficient data gathering protocol with delay gu...
-
Chapter and Conference Paper
MP-FMIPv6: MLD Proxy Based Fast Multicast Protocol for Mobile IPv6
Mobile multicast is a research hotspot and can provide many applications. Some schemes have been proposed to support the mobile subscriber, but most of them study the construction algorithm of dynamic multicas...
-
Chapter and Conference Paper
A SIP-Based Session Mobility Management Framework for Ubiquitous Multimedia Services
This paper proposes a SIP-based session mobility management framework for achieving session handoff that is transparent to the underlying wireless or wired technology between network domains. Session mobility ...
-
Chapter and Conference Paper
Multi-priority Multi-path Selection for Video Streaming in Wireless Multimedia Sensor Networks
Video sensors are used in wireless multimedia sensor networks (WMSNs) to enhance the capability for event description. Due to the limited transmission capacity of sensor nodes, a single path often cannot meet ...
-
Chapter and Conference Paper
Semantic Learning Space: An Infrastructure for Context-Aware Ubiquitous Learning
In order to facilitate the development and proliferation of context-aware ubiquitous learning services, there is a need for architectural support in the user context processing and learning content management....
-
Chapter and Conference Paper
Generic Constructions of Stateful Public Key Encryption and Their Applications
We present generic constructions of stateful public key encryption (StPE). We build several new StPE schemes and explain existing ones using our generic constructions. Of the new StPE schemes, two schemes are ...
-
Book
-
Chapter and Conference Paper
An Efficient Identity-Based Online/Offline Encryption Scheme
In this paper, we present an efficient Identity-based Online / Offline Encryption (IBOOE) scheme. An IBOOE scheme allows one to split the encryption into two phases. In the offline phase, most heavy computatio...