بحث بسيط
السجلات المعروضة 1 -- 6 من 6
Protecting private cloud located within public cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
Many studies use cryptographic technologies to protect sensitive data in public cloud. However, these approaches may introduce large overheads. Recently, hybrid cloud started to gain a lot of attentions. A hybrid cloud ...
Impact of location heterogeneity on random walk mobility models
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
This paper investigates random walk mobility models with location heterogeneity, where different locations may have different neighboring regions.With the assumption of totally n locations, we consider two cases, i.e., ...
Copy limited flooding over opportunistic networks
(2013 , Conference Paper)
Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ...
A survey on communication infrastructure for micro-grids
(2013 , Conference Paper)
A micro-grid is a small scale power supply network that is designed to provide electricity to a small community with its own renewable energy sources. Due to distributed generation variability, security and load sharing ...
Social interaction increases capacity of wireless networks
(2013 , Conference Paper)
A network model with both social and communication characteristics is considered. Different capacity regions are computed as a function of the social network size for each node. It has been shown that as the social ...
Taking advantage of multi-user diversity in OFDM systems
(2013 , Conference Paper)
A multi-user diversity approach, called Opportunistic Interference Management (OIM), is considered in connection with Orthogonal Frequency Division Multiplexing (OFDM) systems. The OIM is applied to each consecutive group ...