A rapid development in wireless ad hoc networks, in both academic and industrial fields. The optimal scheduling, routing and relaying of packets, the per-node capacity still decreases as Θ(1/√ n) when n approaches the infinity. Many studies try to improve this disappointing scalability of throughput capacity by introducing different characteristics into ad hoc networks, such […]
Delay comparison between ICMP probing and HTTP/Get probing
The applications will benefit from or be enabled by knowing the geographical locations or geolocations, of Internet hosts. Such locality-aware applications include local weather forecast, the choice of language to display on web pages, targeted advertisement, page hit account in different places, restricted content delivery according to local policies, etc. Locality-aware peer selection will also […]
Packet driven timing scheme for dynamic routing in wireless sensor networks
WIRELESS sensor networks (WSNs) can be readily deployed in various environments to collect information in an autonomous manner, and thus can support abundant applications such as habitat monitoring, moving target tracking, and fire detection. WSNs are generally event-based systems, and consist of one or more sinks which is responsible for gathering specific data by sending […]
SSO scheme Analysis for Authentication of distributed computer Networks
The widespread use of distributed computer networks, it has become common to allow users to access various network services offered by distributed service providers. A crucial role in distributed computer networks to verify if a user is legal and can therefore be granted access to the services requested. To avoid bogus servers, users usually need […]
Network Instruction and detection of zombie exploration of security measurement, mitigation, countermeasures
RECENT studies have shown that users migrating to the cloud consider security as the most important factor. A recent Cloud Security Alliance (CSA) survey shows that among all security issues, abuse and nefarious use of cloud computing is considered as the top security threat, in which attackers can exploit vulnerabilities in clouds and utilize cloud […]
Enhanced Adaptive Acknowledgment for Mobile Ad hoc Network
Natural mobility and scalability, wireless networks are always preferred since the first day of their invention. Owing to the improved technology and reduced costs, wireless networks have gained much more preferences over wired networks in the past few decades. Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless […]
Filtering Infromation and Short text Classification in OSN
ONLINE Social Networks (OSNs) are today one of the most popular interactive medium to communicate, share, and disseminate a considerable amount of human life information. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. According to Facebook statistics1 average user creates 90 pieces of […]
PPDA techniques for security multiparty computation
PRIVACY and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For example, for credit card companies […]
IBSDDS:Access control and security schemes for Distributed Network
CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS). In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced ciphertexts without knowing anything about the original files. This technique has not been […]
Information Brokering System for healthcare service
Along with the explosion of information collected by organizations in many realms ranging from business to government agencies, there is an increasing need for inter-organizational information sharing to facilitate extensive collaboration. While many efforts have been devoted to reconcile data heterogeneity and provide interoperability, the problem of balancing peer autonomy and system coalition is still […]
- « Previous Page
- 1
- …
- 49
- 50
- 51
- 52
- 53
- …
- 108
- Next Page »