Jiangsu University

Displaying 1-2 of 2 results

  • White Papers // Feb 2011

    Patrol Detection for Replica Attacks on Wireless Sensor Networks

    Replica attack is a critical concern in the security of wireless sensor networks. The authors employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then they...

    Provided By Jiangsu University

  • White Papers // Dec 2010

    The Hash Postfix Table Based Metadata Management Algorithm for Mass Storage System

    It is important for mass storage system to distribute access requests dynamically and balanced between several MetaData Servers (MDS). Based on analyzing the features of metadata management in the mass storage system, this paper designs the structure of metadata management module, proposes the Hash Postfix Table (HPT) based metadata management...

    Provided By Jiangsu University

  • White Papers // Dec 2010

    The Hash Postfix Table Based Metadata Management Algorithm for Mass Storage System

    It is important for mass storage system to distribute access requests dynamically and balanced between several MetaData Servers (MDS). Based on analyzing the features of metadata management in the mass storage system, this paper designs the structure of metadata management module, proposes the Hash Postfix Table (HPT) based metadata management...

    Provided By Jiangsu University

  • White Papers // Feb 2011

    Patrol Detection for Replica Attacks on Wireless Sensor Networks

    Replica attack is a critical concern in the security of wireless sensor networks. The authors employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then they...

    Provided By Jiangsu University