Search
Products meeting the search criteria
Distributed Privacy-Preserving Access Control in Sensor Networks
The owner and users of a sensor network may be different, which necessitates privacy-preserving acce..
Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks
It is important to extend the network lifetime in order to achieve the better transmission in wirele..
Diversifying Web Service Recommendation Results via Exploring Service Usage History
The last decade has witnessed a tremendous growth of Web services as a major technology for sharing ..
Diversifying Web Service Recommendation Results via Exploring Service Usage History-JAVA
The last decade has witnessed a tremendous growth of web services as a major technology for sharin..
Double Guard Detecting Intrusions in Multitier Web Applications
To, Accomplish security over the internet for User and Sever we may detect intruder on multi-tier ar..
E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks JAVA
Wireless sensor networks (WSNs) are resource constrained. Energy is one of the most important reso..
EDAL An Energy Efficient,Delay Aware,and Lifetime Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks
Wireless sensor networks have emerged as a unmarked type of networking systems with limited ..
Effective Key Management in Dynamic Wireless Sensor Networks
Particle swarm optimization (PSO) based effective clustering in wireless sensor networks is proposed..
Efficient and Scalable Public Key Infrastructure for Wireless Sensor Networks
It is important to make a wireless sensor network as secure environment. Because many applications s..
Efficient Interlayer Network Codes for Fair Layered Multicast Streaming
Energy and bandwidth efficiency is most important in the MANET network. By using the coordinated pro..
Efficient Resource Mapping Framework over Networked Clouds via Iterated Local Search
The Cloud represents a computing paradigm where shared configurable resources are provided as a serv..
EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Vehicular ad hoc networks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocat..
ENABLING ALWAYS ON SERVICE DISCOVERY WIFI NEIGHBOR AWARENESS NETWORKING
Genetic Algorithm (GA), an intelligent optimization algorithm inspired by the flocking behavior of b..
Enabling Secure and Efficient Video Delivery through Encrypted In-network Caching
In-network content caching has been a natural trend in emerging network architectures to handle th..
Energy efficient cluster head rotation in beacon Enabled IEEE 802.15.4 Networks
It is important to extend the network lifetime in order to achieve the better transmission in wirele..