The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we formulate coverage requirements of the sensor network as a minimum-cost connectivity guaranteed point k-coverage problem. An improved ant colony algorithm (EasiDesign) is proposed to achieve the approximate solution to this optimization problem. We made modifications in the convergence strategy and the ant state transition rule of the general ant colony optimization. Considering...
Motivated by the highly dynamic topology in wireless sensor networks with asynchronous duty cycle, and its impact on reliable data delivery, we propose a light-weight opportunistic forwarding (LWOF) scheme. Differing from other recently proposed schemes, LWOF neither employs historical network information nor a contention process to select a forwarder prior to data transmission. It takes advantage...
In this paper, we describe a heterogeneous peer-to-peer network testbed, which is developed as part of a joint research project to investigate novel resource discovery and content distribution protocols in a heterogeneous wired/wireless environment. We describe the testbed requirements, the testbed architecture, the multi-functional wireless node, and the software architecture. We also describe some...
Recently, System-on-Chip (SoC) technology has been adopted to design smaller, lower-power and cheaper tamper-resistant sensor nodes. In these nodes, we find that there exists a lifetime-secure memory fraction which stores the anterior part of the application executable binary code, namely "fingerprint". We propose a key management protocol based on this secure finger- print-FKM. In this...
Convenient, rapid, efficient and anonymous characteristic of P2P technology, enables P2P network gathering enormous users very quickly, and P2P traffic has occupied 60~80% bandwidth of Internet. Such giant traffic has formed a threat to the service quality of other Internet application and the security of Internet itself. However, most study about P2P traffic focuses on traffic monitoring and characteristic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.