نتایج جستجو برای: rekeying

تعداد نتایج: 186  

2002
K. J. Ray Liu Wade Trappe Prakash Narayan

Title of Dissertation: Multi-User Security: A Signal Processing and Networking Perspective Wade Trappe, Doctor of Philosophy, 2002 Dissertation directed by: Professor K. J. Ray Liu Applied Mathematics and Scientific Computing Department of Electrical and Computer Engineering Institute for Systems Research The advancements in communication and multimedia technologies have paved the way for a new...

2010
S. Gunasekaran K. Duraiswamy

Problem statement: Multicasting communication network accepted a single message from an application and delivered copies of the message to multiple recipients at different locations. Recently, there has been an explosion of research literature on multicast communication environment. The objective of this study were to contribute the complexity of supporting current multicast applications, (i) t...

2011
Albert Wasef

Recently, vehicular ad-hoc network (VANET) has emerged as an excellent candidate to change the life style of the traveling passengers along the roads and highways in terms of improving the safety levels and providing a wide range of comfort applications. Due to the foreseen impact of VANETs on our lives, extensive attentions in industry and academia are directed towards bringing VANETs into rea...

2015
K. V Srikanth

Mobile nodes in military environments like a field of battle or a hostile region ar seemingly to suffer from intermittent network property and frequent partitions. Disruption-tolerant network (DTN) technologieshave become eminent solutions that enable wireless devices carried by troopers to speak with one another and access the guidance or command faithfully by exploiting secondary storage node...

2012
P. Gunasekaran

Wireless sensor networks have been widely deployed in many applications, e.g., military field surveillance, health care, environment monitor, accident report, etc. Each sensor detects a target within its radio range, performs simple computations, and communicates with other sensors. Generally, sensors are constrained in battery power, communication, and computation capability; therefore, reduci...

2017
MARCO TILOCA KIRILL NIKITIN SHAHID RAZA

ing with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. c © YYYY ACM. 1539-9087/YYYY/01-ARTA $15.00 DOI: 0000001.0000001 ACM Transactions on Embedded Computing Systems, Vol. V, No. N, Article A, Publication date: January YYYY. A:2 M. Tiloca et al....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید