Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 10702 dokumen yang sesuai dengan query
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2011, held in Saarbrücken, Germany, in September 2011. The 16 revised full papers presented together with two invited keynote talks were carefully reviewed and selected from 31 submissions. The papers are organized in two tracks: sensor networks, covering topics such as localization, lifetime maximization, interference control, neighbor discovery, self-organization, detection, and aggregation; and ad hoc wireless and mobile systems including the topics: routing, scheduling and capacity optimization in the SINR model, continuous monitoring, and broadcasting."
Berlin: Springer-Verlag, 2012
e20408862
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Approximation and Online Algorithms, WAOA 2011, held in Saarbrücken, Germany, in September 2011. The 21 papers presented were carefully reviewed and selected from 48 submissions. The volume also contains an extended abstract of the invited talk of Prof. Klaus Jansen. The Workshop on Approximation and Online Algorithms focuses on the design and analysis of algorithms for online and computationally hard problems. Both kinds of problems have a large number of applications in a wide variety of fields. Topics of interest for WAOA 2011 were: algorithmic game theory, approximation classes, coloring and partitioning, competitive analysis, computational finance, cuts and connectivity, geometric problems, inapproximability results, mechanism design, network design, packing and covering, paradigms for design and analysis of approximation and online algorithms, parameterized complexity, randomization techniques and scheduling problems."
Berlin: Springer-Verlag, 2012
e20410515
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Symposium on Parameterized and Exact Computation, IPEC 2011, in Saarbrücken, Germany, in September 2011. The 21 revised full papers presented were carefully reviewed and selected from 40 submissions. The topics addressed cover research in all aspects of parameterized and exact computation and complexity, including but not limited to new techniques for the design and analysis of parameterized and exact algorithms, fixed-parameter tractability results, parameterized complexity theory, relationship between parameterized complexity and traditional complexity classifications, applications of parameterized and exact computation, and implementation issues of parameterized and exact algorithms."
Berlin: Springer-Verlag , 2012
e20408803
eBooks  Universitas Indonesia Library
cover
"This volume constitutes the refereed proceedings of the Third International ICST Conference, ADHOCNETS 2011, held in Paris, France, in September 2011. The 15 revised full papers - selected from 42 submissions - and the 2 invited papers cover several fundamental aspects of ad hoc networking, including security, quality of service, radio and spectrum analysis, mobility, energy efficiency, and deployment. They are organized in topical sections on security and QoS, WSN development and evaluation, radio and spectrum analysis, mobile WSNs, mobile ad hoc networks, and energy."
Heidelberg : Springer, 2012
e20406331
eBooks  Universitas Indonesia Library
cover
Amiruddin
"Mobile Ad Hoc Networks MANETs mendapatkan aplikasi yang luas bersamaan dengan kemajuan teknologi. Namun, MANETs beresiko karena kurangnya mekanisme keamanan. Dalam makalah ini, diusulkan algoritma baru untuk pembangkit kunci dan enkripsi untuk perlindungan privasi di MANETs. Fibonacci dimodifikasi dengan menambahkan faktor pengacak untuk menghasilkan rangkaian kunci acak dengan panjang yang sesuai yang dibutuhkan namun dengan overhead komputasi yang rendah. Sistem One Time Pad OTP dimodifikasi dengan menambahkan faktor pengacak untuk kerahasiaan data melalui enkripsi yang memenuhi uji keacakan, difusi, dan konfusi. Evaluasi algoritma yang diusulkan dilakukan dengan menggunakan Matlab dan NS-2. Hasil percobaan menunjukkan bahwa algoritma yang diusulkan menghasilkan rangkaian kunci dan Ciphertext yang acak. Melalui beberapa pengujian yaitu kecepatan, korelasi dan autokorelasi, difusi, dan konfusi, hasil simulasi menunjukkan keunggulan algoritma usulan terhadap algoritma lainnya. Sebagai bukti konsep, algoritma usulan telah disimulasikan dengan simulator jaringan.

Mobile Ad Hoc Networks MANETs get widespread applications along with the evolving technologies. However, MANETs are at risk due to the shortage of security mechanisms. In this paper, we propose new algorithms for key generation and encryption for privacy preservation in MANETs. We modified Fibonacci sequence by adding scrambling factor to generate random key sequences with required length but incurred low computational overhead. We modified the One Time Pad OTP system by adding scrambling factor for data confidentiality through encryption which satisfies the randomness, diffusion, and confusion tests. Evaluation of the proposed algorithms was conducted using Matlab and NS 2. Experiment results showed that the proposed algorithms produced random key sequences and Ciphertexts. Through several tests i.e. speed, correlation and autocorrelation, diffusion, and confusion tests, the simulation result showed the superiority of our algorithms over the other algorithms. For the proof of concept, our algorithms have been simulated in the network simulator.
"
Depok: Fakultas Teknik Universitas Indonesia, 2018
D-Pdf
UI - Disertasi Membership  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Mobile Networks and Managements (MONAMI 2011) held in Aveiro, Portugal, in September 2011. The 30 revised full papers were carefully selected from numerous submissions and are organized thematically in 5 parts. These are mobile and wireless networks, self organized and mesh networks, new approaches for network visualization, network services, and security"
Heidelberg: Springer, 2012
e20409211
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. The 14 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections on modeling formalisms for concurrent systems, model checking and quantitative extensions thereof, semantics and analysis of modern programming languages, probabilistic models for concurrency, and testing and run-time verification."
Berlin: Springer-Verlag, 2012
e20409032
eBooks  Universitas Indonesia Library
cover
Abdelgawad, Ahmed
"This book introduces resource-aware data fusion algorithms to gather and combine data from multiple sources (e.g., sensors) in order to achieve inferences. These techniques can be used in centralized and distributed systems to overcome sensor failure, technological limitation, and spatial and temporal coverage problems. The algorithms described in this book are evaluated with simulation and experimental results to show they will maintain data integrity and make data useful and informative."
New York: [, Springer], 2012
e20418361
eBooks  Universitas Indonesia Library
cover
"This volume constitutes the refereed proceedings of the 19th International Symposium on Graph Drawing, GD 2010, held in Eindhoven, The Netherlands, during September 2011.
The 34 revised full papers presented together with 3 revised short and 6 poster papers were carefully reviewed and selected from 88 submissions. Furthermore, the proceedings contain the abstracts of two invited talks and to commemorate Kozo Sugiyama and his pioneering research in graph drawing, the proceedings include an obituary. A unique and fun part of the symposium is the Graph Drawing Contest, which is part of the Graph Drawing Challenge. This year was the 18th edition. A report on the contest is included at the end of the proceedings."
Berlin : Springer-Verlag, 2012
e20410621
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration."
Berlin: Springer-Verlag , 2012
e20410386
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>