دانلود مقاله Cloud-aware data intensive workflow scheduling on volunteer computing systems - انتشار 2015
Future Generation Computer Systems Volume 51, October 2015, Pages 87–97 AbstractVolunteer computing systems offer high computing power to the scientific communities to run large data intensive scientific workflows. However, these computing environments provide the best effort infrastructure to execute high performance jobs. This work aims to schedule scientific and data intensive wor ...1,500 تومان
دانلود مقاله Cloud Computing Risk and Audit Issues - انتشار 2015
Computer Standards & Interfaces Available online 20 June 2015 AbstractCloud computing has gained a mass popularity in the business environment. However, thistechnology also imposes some risk concerns, such as weak protection to security and privacy.Since its nature of distant and remote connectivity, the auditing process to this technologybecomes challengeable. This paper focuses on is ...1,500 تومان
دانلود مقاله Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty - انتشار 2015
European Journal of Operational Research Volume 244, Issue 2, 16 July 2015, Pages 637–647 Revenue Management for Cloud Computing ProvidersDecision Models for Service Admission Control underNon-probabilistic Uncertainty Tim P¨uschela, Guido Schryenb,, Diana Hristovab, Dirk NeumannaaChair for Information Systems Research, Albert-Ludwigs-Universit¨at Freiburg, Platz derAl ...1,500 تومان
دانلود مقاله Proposing a Novel Method based on Network- Coding for Optimizing Error Recovery in Wireless Sensor Networks- انتشار 2015 به همراه ترجمه فارسی - ژورنال ISI
Indian Journal of Science and Technology, Vol 8(9), 859–867, May 2015 Leyla Azari and Ali GhaffariDepartment of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran; firstname.lastname@example.org,email@example.com Abstract In Wireless Sensor Networks (WSNs), signals are used as channels for communicating data. Wireless channels are inherentlyinsecure; hence, th ...3,000 تومان
دانلود مقاله A multipath routing protocol for wireless sensor network for mine security monitoring - انتشار 2010
Mining Science and Technology (China) Volume 20, Issue 1, January 2010, Pages 148–151 XIAO Shuo1,2,*, WEI Xueye2, WANG Yu2 Abstract: Underground mining is a hazardous industrial activity. In order to provide a safe working environment for miners, aWireless Sensor Network (WSN) technology has been used for security monitoring. It can provide a wide range of surveillancewith a r ...1,500 تومان
دانلود مقاله SecLooCI: A comprehensive security middleware architecture for shared wireless sensor networks- انتشار 2014
Ad Hoc Networks Available online 14 October 2014 Jef Maerien⇑, Sam Michiels, Danny Hughes, Christophe Huygens, Wouter Joosen AbstractWSNs are trending towards dynamic environments that enable multiple parties to concurrently deploy and exploit multiple applications on shared nodes. The node owners want to share their nodes’ capabilities in order to increase return on investment, ...1,500 تومان
دانلود مقاله Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks - انتشار 2014
Contents lists available at ScienceDirectAd Hoc NetworksADHOC 1019 No. of Pages 15, Model 3G27 March 2014Ding Wang, ,Ping Wanga b s t r a c tUnderstanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In this work, we investigate two recent proposals in the area of smart-card-based password authentication for sec ...1,500 تومان
دانلود مقاله AN ANALYSIS OF VARIOUS PARAMETERS IN WIRELESS SENSOR NETWORKS USING ADAPTIVE FEC TECHNIQUE
M.R.Ebenezar jebarani1and T.Jayanthy2 ABSTRACTIn Wireless sensor network, since the media is wireless there will be burst errors which leads tohigh bit error rate that affect the throughput. Wireless sensor networks drop the packets due to propagationerrors that lead to retransmission traffic. This paper evaluates the effect of adaptive FEC in Wirelesssensor networks. Adaptive FEC technique ...
دانلود مقاله A packet error recovery scheme for vertical handovers mobility management protocols
A packet error recovery scheme for verticalhandovers mobility management protocolsPierre-Ugo Tournoux1,2, Emmanuel Lochin1,2, Henrik Petander3, J´erˆomeLacan41 CNRS ; LAAS ; 7 avenue du colonel Roche, F-31077 Toulouse, France2 Universit´e de Toulouse ; UPS, INSA, INP, ISAE ; LAAS ; F-31077 Toulouse, France3 NICTA, Australian Technology Park, Eveleigh, NSW, Australia4 ISAE ; 10 av. ...
دانلود مقاله Network Information Flow
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 4, JULY 2000 Rudolf Ahlswede, Ning Cai, Shuo-Yen Robert Li, Senior Member, IEEE, andRaymond W. Yeung, Senior Member, IEEE Abstract—We introduce a new class of problems called networkinformation flow which is inspired by computer network applications.Consider a point-to-point communication network on whicha number of information sources ar ...