نتایج جستجو برای: network routing

تعداد نتایج: 698545  

2003
Dijiang Huang Deep Medhi Cory Beard Lein Harn

Network routing security has received more attention recently. But there are no good design guidelines on how to construct secure network routing domains. There are also no proper evaluation methods to validate the many proposed secure routing frameworks. We analyze network routing security issues via a new approach: trust relations among network routers. Based on the presented trust models for...

Journal: :IEEE Journal on Selected Areas in Communications 2007

Journal: :Computer Communications 2012

Journal: :journal of advances in computer research 2015
majid hatamian hamid barati ali movaghar

wireless sensor network includes a large number of nodes which are distributed in a geographical location. the essential fact about wsn is that energy of nodes is limited. therefore, presenting proper solutions as an optimized routing is crucial to equally use energy of all nodes. in this paper we propose a method which performs routing in wsns using greedy approach. it is able to choose optimu...

Mina Vajed Khiavi Sajjad Jahanbakhsh Gudakahriz, SHahram Jamali

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2021

This study introduces "shortcut routing," a novel routing mechanism in capsule networks that addresses computational inefficiencies by directly activating global capsules from local capsules, eliminating intermediate layers. An attention-based approach with fuzzy coefficients is also explored for improved efficiency. Experimental results on Mnist, smallnorb, and affNist datasets show comparable...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید