The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the progress of researches on the integration of Geographic Information System (GIS) and Remote Sensing (RS), digital earth, and information sharing, to publish RS images on Internet has become a significant research work. This paper presents an efficient algorithm to build image pyramid model for convenient data storage and retrieval and proposes two distributed cutting algorithms under the...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
More and more users subscribing to wireless broadband services are seeking to have access to both WLAN and UMTS networks. We study individually optimal user-network association in an integrated WLAN and UMTS hybrid cell. The association problem is formulated within a non-cooperative game framework. In the formulation, mobile arrivals are assumed to follow the Poisson process and each mobile considers...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.