نتایج جستجو برای: hidden node problem
تعداد نتایج: 1081759 فیلتر نتایج به سال:
Abstract MAC address spoofing has plagued LAN communication for a long time. Many attacks use it as springboard to carry out subsequent attacks. The main reason this kind of attack is the exposure address. If source node can be hidden during frame forwarding, effectively prevented. This study proposes virtual switching (VMS) solution problem. VMS uses multi-address hopping technology make chang...
In the construction of a Bayesian network, it is always assumed that the variables starting from the same parent are conditionally independent. In practice, this assumption may not hold, and will give rise to incorrect inferences. In cases where some dependency is found between variables, we propose that the creation of a hidden node, which in effect models the dependency, can solve the problem...
The dominating set concept in graphs has been used in many applications. In large graphs finding the minimum dominating set is difficult. The minimum dominating set problem in graphs seek a set D of minimum number of vertices such that each vertex of the graph is either in D or adjacent to a vertex in D. In a graph on n nodes if there is a single node of degree n-1 then that single node forms a...
Ad-hoc networks suffer from the problem of hidden nodes (terminals), which leads to severe degradation of network throughput. This survey gives a comprehensive overview of Medium Access Control (MAC) protocols which directly or indirectly address this problem. The presented protocols are grouped in several categories and are described in the order of their publication date. To give the reader a...
Vehicular AdHoc Networks or VANETs are emerging as a promising technology for providing safety and comfort applications for vehicular transportation. VANETs are receiving growing attention from the research community and from the transportation industry because of their great potential to improve traffic safety on roads. In existing system the IEEE 802.11 broadcasting mode, considers no request...
Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedi...
nowadays, hidden markov models are extensively utilized for modeling stochastic processes. these models help researchers establish and implement the desired theoretical foundations using markov algorithms such as forward one. however, using stability hypothesis and the mean statistic for determining the values of markov functions on unstable statistical data set has led to a significant reducti...
In this paper we study a novel computational problem called the Hidden Root Problem, which appears naturally when considering fault attacks on pairing based cryptosystems. Furthermore, a variant of this problem is one of the main obstacles for efficient pairing inversion. We present an algorithm to solve this problem over extension fields and investigate for which parameters the algorithm becom...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید