Overstate 发表于 2025-3-28 17:43:56

http://reply.papertrans.cn/67/6630/662902/662902_41.png

Frequency 发表于 2025-3-28 18:44:00

Sensor-Actuator Communication Protocols in Wireless Networksages to only nearer nodes due to weak radio and messages are forwarded by sensor nodes to an actuator node. Messages sent by nodes might be lost due to collision and noise. We discuss the redundant data transmission (RT) protocol to reduce the loss of sensed values sent to an actuator node even if m

天然热喷泉 发表于 2025-3-28 23:32:17

The Effect of Routing Protocol Dynamics on TCP Performance in Mobile Ad Hoc Networksorted in the literature. This is mainly due to the interactions between TCP and lower layers protocols. Among these, routing protocols have perhaps the greatest impact on the performance of TCP. In this paper, by extensive simulation, we evaluate how TCP interacts with some of the IETF standardised

expound 发表于 2025-3-29 04:41:27

Battery and Power Aware Routing in Mobile Ad Hoc Networksonsiders both of power consumption and the amount of the battery remainder. To improve the availability of ad hoc networks, routing which considers both at the same time is needed though power consumption and the amount of the battery remainder have been separately examined in the research so far. W

虚弱的神经 发表于 2025-3-29 08:22:40

Wireless Balloon Network for Disaster Information System with evacuated residents and disaster areas, we propose a balloon wireless network which is realized by combining balloons and wireless LANs and organizing into an adhoc network in the air. Using this balloon network, the damaged communication line can be quickly recovered. By combining with balloo

paroxysm 发表于 2025-3-29 13:31:26

Wireless Networks as an Infrastructure for Mission-Critical Business Applicationsan overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process – wireless mesh. It can result in significant i

松驰 发表于 2025-3-29 18:39:43

The DecoyPort: Redirecting Hackers to Honeypotsthe accurate signatures of new attacks as soon as possible. For this reason, there have been several researches on honeypots. However, honeypots can not collect information about hackers attacking active computers except themselves. In this paper, we propose the DecoyPort system to redirect hackers

obeisance 发表于 2025-3-29 20:05:31

Network Security Improvement with Isolation Implementation Based on ISO-17799 StandardThe Taiwan government has ruled the importance of network isolation in several policies, such as “The Handling Implementation Program of Information Security Emergency Incidents for government departments” and “The Responding Protocol of Notifying Information Security Events in Executive Yuan and it

gastritis 发表于 2025-3-30 00:38:24

Positive and Negative Authorizations to Access Protected Web Resourcesource. Such conflict situations may occur if an organization has decentralized administration, and/or several collaborating organizations have access to one resource and some of them apply positive authorizations while others apply negative authorizations. The proposed solution involves Belnap’s log

Mechanics 发表于 2025-3-30 05:18:43

An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutionsband and wireless communication with fixed and nomadic Access. The standard has a security sublayer in the MAC layer called, Privacy Key Management, which aims to provide authentication and confidentiality. However, several researches have been published to address the security vulnerabilities of 80
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Network-Based Information Systems; First International Tomoya Enokido,Leonard Barolli,Makoto Takizawa Conference proceedings 2007 Springer