做事过头 发表于 2025-3-27 00:26:40

Dynamic Job Scheduling Using Ant Colony Optimization for Mobile Cloud Computing,nario there is no doubting the incredible impact that mobile technologies have had on both in scientific and commercial applications. The integration of emerging cloud computing concept and the potential mobile communication services is together considered as Mobile Cloud Computing (MCC). A prominen

耕种 发表于 2025-3-27 02:57:50

Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust ckets in Mobile Ad Hoc Networks (MANETs) is introduced. Dynamic Source Routing (DSR) protocol is extended and termed as Energy Efficient Secure Dynamic Source Routing (EESDSR). The protocol is based on an efficient, power aware and distributed trust model that enhances the security of Dynamic So

甜得发腻 发表于 2025-3-27 05:56:48

http://reply.papertrans.cn/47/4697/469636/469636_33.png

Working-Memory 发表于 2025-3-27 10:13:11

Extending Lifetime of Wireless Sensor Network Using Cellular Automata,vironments. In this paper, we introduced the use of cellular automata in Wireless sensor networks to control Topology. In the network the sensor nodes are redundantly deployed in the same field. Due to this redundant deployment the many nodes in the network have remained in their active state simult

的事物 发表于 2025-3-27 16:36:00

Computer Network Optimization Using Topology Modification,affic. For network of computers, optimisations are achieved for various aspects such as cost of data transfer, maximum data transfer per unit time, capacity utilisation, uniform traffic distribution. One of the important aspects of computer networks is network topology represented using graph theore

Control-Group 发表于 2025-3-27 17:45:51

Mobile Sensor Localization Under Wormhole Attacks: An Analysis,n estimation or localization is a critical aspect for all the location related applications of sensor networks. Localization helps nodes find their absolute position coordinates. Like possibly every system, localization systems are prone to attacks. Through this study we intend to do a low-level ide

恃强凌弱 发表于 2025-3-28 01:00:11

http://reply.papertrans.cn/47/4697/469636/469636_37.png

Vo2-Max 发表于 2025-3-28 03:55:19

http://reply.papertrans.cn/47/4697/469636/469636_38.png

cunning 发表于 2025-3-28 07:28:55

Location-Based Mutual and Mobile Information Navigation System: Lemmings, messaging system is presented. The messaging system will automatically disseminate the question which is related to a specific location, to a group of users who are either within the proximity currently or have just recently been there. The users are supposed to help each other; karma or some sort

帽子 发表于 2025-3-28 13:52:37

http://reply.papertrans.cn/47/4697/469636/469636_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Intelligent Distributed Computing; Rajkumar Buyya,Sabu M. Thampi Conference proceedings 2015 Springer International Publishing Switzerland