The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To solve the key management related problems encountered in symmetric as well as asymmetric key based schemes, recently a public key based scheme known as Certificateless Effective Key Management protocol (CL-EKM) has been proposed for dynamic Wireless Sensor Networks (WSNs). In spite of showing numerous advantages over the previously proposed schemes, this protocol shows some critical limitations...
Interest in the modelling and simulation of complex systems with processes occurring at several spatial and temporal scales is increasing, particularly in biological, historical and geographic studies. In this multi-scale modelling study, we propose a generic model to account for processes operating at several scales. In this approach, a ‘world’ corresponds to a complete and self-sufficient submodel...
Les techniques de modélisation basées sur le dépla-cement d'agents dans une topologie de type graphe s'avèrent une approche fructueuse. Beaucoup de modèles liés aux déplacements d'agents utilisent l'algorithme de Dijkstra pour construire, à coup sür, les plus courts chemins. Cependant un problème majeur de ces modèles est la fréquence à laquelle les nombreux agents, durant toute la simulation, utilisent...
In this work, we'll strive to present a survey about the important traditional and modern telecommunication management network (TMN) on one hand; and information and communication technology (ICT) management on the other hand. In this review, we classify all the major networks and technology management systems known to date in order to provide guidelines for network management architectures design...
The intent of this paper is to propose an enhanced certificate revocation scheme for Mobile Ad hoc Networks (MANETs). Our approach is built on mainly two previously proposed mechanisms. A combination of the schemes and optimization of certain steps with intelligent choices of parameters could significantly reduce the overhead associated with such mechanism. We prove the efficiency of our approach...
Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in the network and Key revocation, which refers to the task of securely withdrawing the key information...
The purpose of this article is to design and implement a performing compiler for parallelizing Java application with divide-and-conquer algorithm. The compiler is built around Java ForkJoin framework, which is directly integrated within Java 1.7 version and imported as archive library in Java 1.6 and 1.5 versions. This compiler tends to make easier and less error-prone the parallelization of recursive...
Javar is a Java source-to-source restructuring compiler, which is written in C language. It exploits implicit parallelism in loops and multi-way recursive methods in a Java program. Programmer indicates parallel regions with annotations. However, parallelization is prohibited by the compiler when a primitive variable declared outside the parallel loop body and referred to within that loop body is...
The purpose of this paper is to design and implement a hybrid compiler that combines JOMP's directives with javar's annotations in order to obtain a more performing compiler. This is an original approach and consists of pooling the advantages of those two compilers while fixing some of their issues. However the achievement of this aim is facing the issue of the difference of implementation of these...
We propose to design a source-to-source parallelizing tool that transforms an incorrectly synchronized Jomp parallel program into a correctly synchronized and well-optimized program. The tool deals with the primitive variables accesses (read/write). The approach consists of (1) analyzing variables accesses and dependences between statements, (2) slicing the program into independent subsets of statements...
The present work is dedicated to study attacks and contremusure in MANET. After a short introduction to what MANETs are and network security we present a survey of various attacks in MANETs pertaining to fail routing protocols. We also present the different tools used by these attacks and the mechanisms used by the secured routing protocols to counter them. Our work ends with a proposal analytical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.