The Evolution of Microprocessor Chip: A historic overview of development
暂无分享,去创建一个
[1] Deepak Puthal,et al. Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .
[2] Jinjun Chen,et al. A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.
[3] Deepak Puthal,et al. Effective Machine to Machine Communications in Smart Grid Networks , 2012 .
[4] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[5] Farid Neema,et al. Data sharing , 1998 .
[6] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[7] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[8] Xiangjian He,et al. Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.
[9] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[10] Abdelkrim Haqiq,et al. Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .
[11] Kenji Nakagawa,et al. B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .
[12] Fazlullah Khan,et al. An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .
[13] Jinjun Chen,et al. DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[14] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[15] Hashim Ali,et al. Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level , 2016 .
[16] Syed Roohullah Jan,et al. Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .
[17] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, TrustCom 2015.
[18] Jinjun Chen,et al. A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..
[19] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[20] Xiangjian He,et al. Data Sharing in Secure Multimedia Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[21] Xiangjian He,et al. Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[22] Shahzad Khan,et al. Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[23] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[24] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[25] Fazlullah Khan,et al. Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[26] Mian Ahmad Jan,et al. Energy-efficient routing and secure communication in wireless sensor networks , 2016 .
[27] Farman Ullah,et al. A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.