The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Connected Dominating Set (CDS) performs a vital role in wireless ad-hoc sensor networks, which can establish a virtual backbone and thus leads to less maintenance overhead and information exchanges in wireless communications. In this paper, our algorithm first finds a prior CDS and then uses the Minimum-Weight Spanning Tree (MST) to optimize the result. Our algorithm applies effective degree, the...
A Connected Dominating Set (CDS) is a subset V′ of V for the graph G(V, E) and induces a connected sub graph, such that each node in V -- V′ is at least adjacent to one node in V′. CDSs have been proposed to formulate virtual backbones in wireless ad-hoc sensor networks to design routing protocols for alleviating the serious broadcast storms problem. It...
In this paper, we discuss Sink-oriented Dynamic Location Service (SDLS) in wireless sensor networks. Since the data is collected by mobile sinks in sensor networks, sink and source must broadcast the information of locations to transfer data from a source node to a sink. To make source can built an efficiently forward data from a source node to a sink, we will discuss the direction of broadcasting...
In this paper, we present a novel broadcast group oriented encryption. In our scheme, any receiver in the designated group can independently decrypt the ciphertext. In addition, compared with other schemes, both ciphertext and private keys are of constant size. Therefore, it is more efficient than the ordinary measures for a sender to encrypt a message for a group
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.