The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose and implement a key-value store that supports MPI while allowing application access at any time without having to declaring in the same MPI communication world. This feature may significantly simplify the application design and allow programmers leverage the power of key-value store in an intuitive way. In our preliminary experiment results captured from a supercomputer at...
With high expansibility and efficient power usage, tiered wireless sensor networks are widely deployed in many fields as an important part of Internet of Things (IoTs). It is challenging to process range query while protecting sensitive data from adversaries. Moreover, most existing work focuses on privacy-preserving range query neglecting collusion attacks and probability attacks, which are more...
Wireless Sensor Network is an important part of the Internet of Things. Data privacy preservation in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper a privacy-preserving data aggregation protocol in wireless sensor networks. Compared to the previous research, our protocol protects the actual data from other nodes based on a rotation scheme...
Since both transmission power and modulation method can be varied in Mobile Ad hoc Networks (MANETs), it is necessary to take power control and rate adaptation into account when dealing with routing problems. In this paper, we propose a Q-Learning-based Rate-aware Power-Controlled Routing scheme (QLRPCR) to address the joint optimization of power, rate and routing in an on-demand and distributed manner...
In this paper, we proposes a multi-gateway nodes data collected routing algorithm based on load balancing(TBLB algorithm) and energy balance, robustness, data forwarding and anti-interference etc, which is multi-gateway nodes-based in wireless sensor network. This algorithm fully takes into account the problem of excessive power consumption when it serves as the data forwarding task, to reduce node...
A lot of researches on IEEE 802.11 had been done, particularly on the performance analysis and improvement of DCF mechanism. However most of the studies were only on some aspect and lacked of systemic. On the other hand, the scenarios in previous' studies were mostly in ad hoc network only few in the network with infrastructure. This paper analyzed the IEEE 802.11 completely and systematically in...
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth and defection of centra authority. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.