The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater Acoustic Sensor Networks (UW-ASNs) consist of a variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area through collecting monitored data or data streams. Detecting bursts in data streams of UW-ASNs is an important area of research with a wide range of applications. In this paper, we build semi-autonomous underwater acoustic...
With the improvements in Underwater Acoustic Sensor Network (UW-ASN) technology, distributed deployment mechanism will be needed for allowing flexibility in many UW-ASN applications rather than depending on centralized solutions. However, due to the limitations of UW-ASN, the integration of UW-ASN and the Internet for resource sharing encounters some difficulties. In this paper, we build a Peer-to-Peer...
Online social networks (OSN) are developing rapidly. Most prior OSN researches have been focused on network application layer. However, the social relationships and topology characteristics of OSN can be utilized to enhance the function, performance and security of network protocols in every layer. This paper presents the concept of social-aware plane and designs a novel model (EPSP) to enhance network...
The key of location privacy preserving is to protect the unlinkability between location and identity. Most of existing algorithms focus on location protection and identity protection separately. That will leads to decreased service quality, authentication, and auditability. In this paper, we propose a new algorithm which uses a variable-length anonymous communication path to protect the linkage between...
The tremendous growth of research in Peer-to-Peer (P2P) systems in recent years has initiated rising interests on how to design resilient networks for these systems. In this paper, we propose a novel query routing mechanism for improving query performance and a mobile agent based dynamic network reconfiguration mechanism for providing combined node and link failure diagnosis and restoration in unstructured...
The tremendous growth of public interest in peer-to-peer (P2P) networks in recent years has initiated a lot of research work on how to design efficient overlay structures for P2P systems. Structured overlay networks that based on various distributed hash tables (DHTs) provide no control over where data is stored and cannot support range queries directly. Ordered overlays such as skip graphs and SkipNet...
Alert fusion is a key problem in distributed intrusion detection system (DIDS). The paper proposes a distributed intrusion alert fusion scheme based on multiple keywords and routing infrastructure: distributed hash table (DHT). All the related alerts produced by local sensor can be routed and fused to their corresponding peers by multiple keywords, while evenly distributing unrelated alerts to different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.