Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Improvement on APIT Localization Algorithms for Wireless Sensor Networks
Ji zeng Wang, Hongxu Jin
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
A Wireless Design of Low-Cost Irrigation System Using ZigBee Technology
Yiming Zhou, Xianglong Yang, Wang, L., Yibin Ying
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
A RFID Network Planning Method Based on Genetic Algorithm
Yahui Yang, Yujie Wu, Min Xia, Zhijing Qin
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Tree-Based RFID Yoking Proof
Hung-Yu Chien, Shih-Bin Liu
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Loading…
An Encryption Algorithm Based on Transformed Logistic Map
Xie, Jianquan, Yang, Chunhua, Xie, Qing, Tian, Lijun
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Loading…
Spray and Wait Routing Based on Average Delivery Probability in Delay Tolerant Network
Jingfeng Xue, Xiumei Fan, Yuanda Cao, Ji Fang, Jiansheng Li
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Shortest Path Routing Protocol for Multi-layer Mobile Wireless Sensor Networks
Zhi-feng Duan, Fan Guo, Ming-xing Deng, Min Yu
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Loading…
A Fuzzy Logic-Based Trust Model in Grid
Hongmei Liao, Qianping Wang, Guoxin Li
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Loading…
Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu
Narayan, S., Peng Shang, Na Fan
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
A Novel Approach to Detect IRC-Based Botnets
Wei Wang, Binxing Fang, Zhaoxin Zhang, Chao Li
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Detecting New P2P Botnet with Multi-chart CUSUM
Jian Kang, Jun-Yao Zhang, Qiang Li, Zhuo Li
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
A Routing Method of Ad Hoc Networks Based on A-star Algorithm
Zhanqi Dong, Mingxia Li
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Privacy Preserving C4.5 Algorithm over Vertically Distributed Datasets
Yanguang Shen, Hui Shao, Li Yang
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
A Wireless Sensor Network for Cropland Environmental Monitoring
Hui Liu, Zhijun Meng, Maohua Wang
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Published in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (01.04.2009)
Get full text
Conference Proceeding
Loading…
Loading…