H. Yin, Zhangxi Tan, Chuang Lin, G. Min, Xiaowen Chu
{"title":"Considering Network Context for Efficient Simulation of Highly Parallel Network Processors","authors":"H. Yin, Zhangxi Tan, Chuang Lin, G. Min, Xiaowen Chu","doi":"10.1007/11534310_122","DOIUrl":"https://doi.org/10.1007/11534310_122","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127910649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangho Yi, Geunyoung Park, Junyoung Heo, Jiman Hong, Gwangil Jeon, Yookun Cho
{"title":"Energy Aware Routing Based on Adaptive Clustering Mechanism for Wireless Sensor Networks","authors":"Sangho Yi, Geunyoung Park, Junyoung Heo, Jiman Hong, Gwangil Jeon, Yookun Cho","doi":"10.1007/11534310_116","DOIUrl":"https://doi.org/10.1007/11534310_116","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks","authors":"Guangming Hu, Xiaohui Kuang, Z. Gong","doi":"10.1007/11534310_38","DOIUrl":"https://doi.org/10.1007/11534310_38","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122226106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two New Fast Methods for Simultaneous Scalar Multiplication in Elliptic Curve Cryptosystems","authors":"Run-hua Shi, Jiaxing Cheng","doi":"10.1007/11534310_50","DOIUrl":"https://doi.org/10.1007/11534310_50","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Internet Control Architecture: Successes and Challenges","authors":"D. Towsley","doi":"10.1007/11534310_2","DOIUrl":"https://doi.org/10.1007/11534310_2","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132877634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P2P-Based Software Engineering Management","authors":"Lina Zhao, Yin Zhang, S. Zhang, X. Ye","doi":"10.1007/11534310_53","DOIUrl":"https://doi.org/10.1007/11534310_53","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Schema Based XML Indexing","authors":"Yan Lu, Liang Zhang","doi":"10.1007/11534310_94","DOIUrl":"https://doi.org/10.1007/11534310_94","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132213360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Steganalytic Algorithm for Detecting Jsteg","authors":"Mingqiao Wu, Zhongliang Zhu, Shiyao Jin","doi":"10.1007/11534310_112","DOIUrl":"https://doi.org/10.1007/11534310_112","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134253405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Code Security on Destination Platform","authors":"Changzheng Zhu, Zhaolin Yin, Ai-juan Zhang","doi":"10.1007/11534310_132","DOIUrl":"https://doi.org/10.1007/11534310_132","url":null,"abstract":"","PeriodicalId":163057,"journal":{"name":"International Conference on Computer Network and Mobile Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131817524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}