Distributed fine-grained access control in wireless sensor networks
In mission-critical activities, each user is allowed to access some specific, but not all, data
gathered by wireless sensor networks. Yu et al recently proposed a centralized fine grained …
gathered by wireless sensor networks. Yu et al recently proposed a centralized fine grained …
Positive correlations and buffer occupancy: Lower bounds via supermodular ordering
S Vanichpun, AA Makowski - Proceedings. Twenty-First Annual …, 2002 - ieeexplore.ieee.org
We use recent advances from the theory of multivariate stochastic orderings to formalize the"
folk theorem" to the effect that positive correlations lead to increased buffer occupancy and …
folk theorem" to the effect that positive correlations lead to increased buffer occupancy and …
Research on Multiple Classifiers Combination Method for Remote Sensing Images
AP Jiang, S Xiao, LY Wei, YL Zhu - … of the First International Conference on …, 2018 - Springer
Remote sensing technology is widely used in land surveying and earth science research,
such as the study of the earth's oceans, glaciers, hydrology, ecology, geology and so on, is …
such as the study of the earth's oceans, glaciers, hydrology, ecology, geology and so on, is …
Application of combinatorial structures to key predistribution in sensor networks and traitor tracing
S Ruj - 2009 - search.proquest.com
From time immemorial people have used cryptography for secure communication.
Cryptography has decided the fate of many kings and queens as well as the outcome of …
Cryptography has decided the fate of many kings and queens as well as the outcome of …
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks
Compass, face and geographical routing, for ad hoc and wireless sensor networks, rely on
nodes knowing their geographic location and locations of other nodes. For location-unaware …
nodes knowing their geographic location and locations of other nodes. For location-unaware …
Secure Communication Mechanism Based on Key Management and Suspect Node Detection in Wireless Sensor Networks
D Qin, S Yang, P Ji, Q Ding - International Conference on Machine …, 2017 - Springer
The limitation of bandwidth, environment and multipath fading in wireless sensor network
(WSN) cannot satisfy the need of users. Cooperative multiple-input-multiple-output (C …
(WSN) cannot satisfy the need of users. Cooperative multiple-input-multiple-output (C …