print this page
  1. No Image 11Dec
    by
    in 국제

    CHEF: Cluster Head Election mechanism using Fuzzy logic in Wireless Sensor Networks

  2. No Image 11Dec
    by
    in 국제

    Active Cyber Attack Model for Network System's Vulnerability Assessment

  3. No Image 11Dec
    by
    in 국제

    An Optimal Access Points Allocation Scheme based on Genetic Algorithm

  4. No Image 11Dec
    by
    in 국제

    The Concentric-Cluster Routing Scheme adapted to Large-Scale Sensor Networks

  5. No Image 11Dec
    by
    in 국제

    Adaptive Virtual Hierarchy Synthesis for Hybrid Mobile Ad Hoc Network

  6. No Image 11Dec
    by
    in 국제

    A Multicast Applied Task-Role Based Access Control for Medical Emergency Environments

  7. No Image 11Dec
    by
    in 국제

    Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment

  8. No Image 11Dec
    by
    in 국제

    Energy-Efficient Distance based Clustering Routing Scheme for Long-term Lifetime of Multi-hop Wireless Sensor Networks

  9. No Image 11Dec
    by
    in 국제

    A Novel Inter-LMD Handoff mechanism for Network-based Localized Mobility Management

  10. No Image 11Dec
    by
    in 국제

    Design and Implementation of Context-aware Security Management System for Ubiquitous Computing Environment

  11. No Image 11Dec
    by
    in 국제

    An Adaptive Inter-Mobility Supports Scheme for NetLMM

  12. No Image 11Dec
    by
    in 국제

    A Scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6

  13. No Image 11Dec
    by
    in 국제

    Energy-Efficient Distance based Clustering Routing Scheme for Wireless Sensor Networks

  14. No Image 11Dec
    by
    in 국제

    N-dimensional Grid-based Key Predistribution in Wireless Sensor Networks

  15. No Image 11Dec
    by
    in 국제

    Context-Aware Security Management System for Pervasive Computing Environment

  16. No Image 11Dec
    by
    in 국제

    PKG-MIB: Private-mib for Package-based Linux Systems in a Large Scale Management Domain

  17. No Image 11Dec
    by
    in 국제

    Risk Assessment Method based on Business Process-Oriented Asset Evaluation for Information System Security

  18. No Image 11Dec
    by
    in 국제

    An Enhanced Leach Protocol for Long-term Lifetime of Wireless Sensor Networks

  19. No Image 11Dec
    by
    in 국제

    An Energy-Efficient Dynamic Key Management in Wireless Sensor Networks

  20. No Image 11Dec
    by
    in 국제

    Moving AAAH Architecture for Mobile IPv6

Board Pagination Prev 1 2 3 4 5 6 7 Next
/ 7

로그인

로그인폼

로그인 유지