Search
Now showing items 11-16 of 16
Guest Editorial: Special Issue on: WiMAX security and applications
(
John Wiley & Sons, Ltd.
, 2009 , Article)
Wireless Multicast Cross-Layer Framework for Rate
(
IEEE
, 2009 , Article)
Multicast-based data communication is an efficient communication scheme especially in multihop ad hoc networks where the MAC layer is based on one-hop broadcast from one source to multiple receivers. In this paper, we ...
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
(
IEEE
, 2009 , Article)
In mobile ad hoc networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast ...
Estimating design effort for the compressor design department: a case study at Pratt & Whitney Canada
(
Elsevier Ltd
, 2009 , Article)
The effort required in a design project not only impacts the final cost, but also the project lead-time. This paper presents a case study carried out with the collaboration of Pratt & Whitney Canada, a global leader in the ...
Cross-Layer Optimal Rate Allocation for Heterogeneous Wireless Multicast
(
Hindawi Publishing Corporation
, 2009 , Article)
Heterogeneous multicast is an efficient communication scheme especially for multimedia applications running over multihop networks. The term heterogeneous refers to the phenomenon when multicast receivers in the same session ...
Security Dynamics of Cloud Computing
(
Cutter Consortium
, 2009 , Article)
This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing ...