cacophony 发表于 2025-3-30 09:03:38

http://reply.papertrans.cn/31/3080/307974/307974_51.png

GREG 发表于 2025-3-30 12:32:52

http://reply.papertrans.cn/31/3080/307974/307974_52.png

Monotonous 发表于 2025-3-30 16:56:12

http://reply.papertrans.cn/31/3080/307974/307974_53.png

FADE 发表于 2025-3-30 23:23:40

http://reply.papertrans.cn/31/3080/307974/307974_54.png

持续 发表于 2025-3-31 01:39:47

https://doi.org/10.1007/978-3-642-92905-2directional key distribution scheme based on . and . developed by using synchronized broadcast and multi-level key concept. Our protocol, called SPDA(Security Protocol for Data Aggregation) is well suited for any data aggregation algorithms and applications. Our analysis results prove SPDA’s efficie

caldron 发表于 2025-3-31 06:09:47

John W. Johnson,Philippe Ascher users can access the services. And it is also a mandatory technology for context-aware services in which users do not participate in the service flow. In this paper, we propose a device authentication and access control scheme based on two-layered PKI approach for efficient communication and user c

Mirage 发表于 2025-3-31 09:12:19

Sabine Forster,Wolfgang Kirstenlatform developed by ETRI. Programs of nodes such as sensors, routers, sinks and actuators in a sensor network are automatically generated through the technique of this paper. Developers can implement USN applications from models of sensor networks. The configuration information of each node is auto

ascetic 发表于 2025-3-31 16:41:36

http://reply.papertrans.cn/31/3080/307974/307974_58.png

即席演说 发表于 2025-3-31 17:44:18

https://doi.org/10.1007/978-1-4899-0700-4g. Wireless GRID supports mobility, however it should consider geographic position to support efficient resource sharing and routing. When the devices in the GRID are highly mobile, there will be much traffic to exchange the geographic position information of each mobile node, and this makes adverse

wall-stress 发表于 2025-3-31 22:54:55

K. Kalyanasundaram,J. K. Thomasmore than technical and managerial resolutions, encompassing knowledge management for the group, eliciting tacit knowledge from the end users, and pattern and time series analyses of utilization for various applications..This paper proposes a framework for building an automated intelligent agent for
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Embedded and Ubiquitous Computing; International Confer Edwin Sha,Sung-Kook Han,Bin Xiao Conference proceedings 2006 Springer-Verlag Berlin