A popular medium for data publishing and sharing on the Web. Modern enterprises across all spectra are moving towards a service-oriented architecture by putting their databases behind Web services, thereby providing a well-documented, platform independent and interoperable method of interacting with their data. This new type of services is known as DaaS (Data-as-a-Service) services where […]
MULTICAST CAPACITY IN UNIFORMLY DENSE NETWORKS BY AD HOC ROUTING
A rapid development in wireless ad hoc networks, in both academic and industrial fields. The optimal scheduling, routing and relaying of packets, the per-node capacity still decreases as Θ(1/√ n) when n approaches the infinity. Many studies try to improve this disappointing scalability of throughput capacity by introducing different characteristics into ad hoc networks, such […]
Enhanced Adaptive Acknowledgment for Mobile Ad hoc Network
Natural mobility and scalability, wireless networks are always preferred since the first day of their invention. Owing to the improved technology and reduced costs, wireless networks have gained much more preferences over wired networks in the past few decades. Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes equipped with both a wireless […]
PPDA techniques for security multiparty computation
PRIVACY and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For example, for credit card companies […]
IBSDDS:Access control and security schemes for Distributed Network
CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS). In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced ciphertexts without knowing anything about the original files. This technique has not been […]
Node localization in mobile sensor networks in Noisy Environments
WIRELESS sensor networks (WSNs) are increasingly a part of the modern landscape. Disciplines as diverse as volcanic eruption prediction and disaster response benefit from the addition of sensing and networking. A common requirement of many wireless sensor network systems is localization, where deployed nodes in a network discover their positions. smaller networks covering small areas, […]
TOA model for Mobile Tracking in Wireless sensor and Mobile sensor Networks
Wireless sensor networks have found rapidly growing applications in areas such as automated data collection, surveillance, and environmental monitoring. One important use of sensor networks is the tracking of a mobile target (point source) by the network. Mobile target tracking has a number of practical applications, including robotic navigation, search-rescue, wildlife monitoring, and autonomous surveillance. […]
VMISO links for multihop wireless network
SPACE-TIME communication is a technique that leverages the spatial and temporal variations of the channel to significantly enhance the performance of wireless networks. This communication paradigm can be realized using multiple antenna element arrays where the antenna elements are separated sufficiently (of the order of the wavelength of the carrier used) such that the channel […]
Retrieve Content From Remote Servers Via Uplink query processing
THE processing and storage capabilities of mobile consumer devices are becoming increasingly powerful. A gamut of new mobile applications has thus emerged for providing a better quality of experience for the end users. A class of such applications commonly referred to as mobile augmented reality includes ones that enable delivery of content in response to […]
VM-multiplexing resource allocation in Self-Organizing Clouds Computing
CLOUD computing has emerged as a compelling paradigm for deploying distributed services. Resource allocation problem in cloud systems emphasizes how to harness the multi attribute resources by multiplexing operating systems. The virtual machine (VM) technology, able to multiplex several operating systems on the same hardware and allow task execution over its VM substrates without performance […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- …
- 14
- Next Page »