The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is an increasing demand for security risk assessment of network & information system where assessment usually is comprised of all kinds of Internal or external threat. Now there is also another problem to be solved, that is, when the information system increased another many risk parts, if the system is still under a security state. In order to answer this question, the paper adopted an...
In this article we address program errors, and through the static code analysis. First, we use inter-procedural based on analysis and blunt insensitive vulnerability testing model, — extracted from the source code. Second, we use of model checking to solve the model. In addition, we do alias analysis method is correct and accuracy testing model. This paper proposed concepts are aimed at those general...
Network engineering is an important discipline in computer science and technology at undergraduates level. We mainly discuss the curricula system construction and teaching innovation problems according to the national program of special discipline construction about network engineering as the followings: curricula system innovation, Integrated experiment platform construction, excellent teaching book...
Link topology lifetime is not only an important metric to evaluate the dynamic characteristic of ad hoc network, but also is a direct and effective method to determine the time to perform ad hoc network measurement. This paper introduces the concept of ldquosnapshotrdquo to take the picture of link topology of three classical mobile mobility (i.e., RPGM, Freeway and Manhattan) respectively. Simulation...
In this paper, a cluster based hybrid architecture is proposed which not only combines the advantages of both cluster and flat architecture, but also introduces how to use multiple communication models in wireless sensor networks(WSNs). Furthermore, the hybrid architecture uses multicast to solve the problem of ldquobroadcast blastrdquo, and adopts deployment of heterogeneous sensors to solve the...
How to achieve the discrete location information of sensor nodes is a key problem in WSNs. The objective of this study is to bring forth a location scheme for WSNs in support of data collection and aggregation, which includes the discrete distance and angle schemes. At last, performance analysis is presented and the result indicates that the location scheme has the properties of scalability and efficiency...
The present study is designed to build up a model for WSNs by using holonic multi-agent systems. The study not only analyzes the benefits of the holonic model by considering six elements, but also brings forth the concept of self-organization to construct a holonic architecture in WSNs. At last, performance analysis is presented and the result indicates that the holonic model has the characteristics...
Topology control in wireless networks is important to maintain reliable communication links between base stations and nodes, and to maximize the battery life. This paper analyzes how the power control technology affects the MAC layer, network topology, routing, and energy efficiency. Then an energy aware degree-based transmission power control protocol is presented in this paper. We augment our distributed...
The internal link performance inference is an increasingly important role in evaluating network. In this paper, we explore the use of end-to-end unicast traffic measurements, which consist of back-to-back packets sent from a sender to pairs of receivers, to estimate the delay probability distribution of mobile ad hoc network (MANET) internal links. Since the majority of existing mobility models for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.