Old City Publishing

Displaying 1-10 of 10 results

  • White Papers // Dec 2012

    Optimal Packet Size for Network Throughput With Time-Bound Fairness in IEEE 802.11 Networks

    With the popularity of IEEE 802.11 networks, it has become increasingly important to analyze the performance of IEEE 802.11 protocols more accurately. The IEEE 802.11 Distributed Coordination Function (DCF) protocol exhibits fairness problem in scenarios with asymmetric topology. Existing strategies mostly aim at the fairness issue without considering the convergence...

    Provided By Old City Publishing

  • White Papers // Jan 2012

    Reversible Logic Synthesis Based on Decision Diagram Variable Ordering

    Reversible logic synthesis is important for the design of conventional logic systems such as adiabatic logic and also for quantum logic systems since all quantum logic gates are necessarily reversible in nature. A framework is presented that improves reversible logic synthesis by employing a dynamically determined variable order for Quantum...

    Provided By Old City Publishing

  • White Papers // May 2011

    Dependable Over-the-Air Programming

    Wireless Sensor Networks (WSNs) represent an emerging set of technologies that will have profound effects across a wide range of industrial, scientific, and governmental applications. In the civilian sector, probably the largest WSNs currently discussed, prototypically implemented, and tested are WSNs for Critical Infrastructure Protection (CIP) like for example oil...

    Provided By Old City Publishing

  • White Papers // Mar 2011

    Proactive Threshold Cryptosystem for EPC Tags

    The authors define three privacy-preserving solutions to the problem of distributing secrets between manufacturers and vendors of items labeled with Electronic Product Code (EPC) Gen2 tags. The solutions rely on the use of an anonymous threshold secret sharing scheme that allows the exchange of blinded information between readers and tags....

    Provided By Old City Publishing

  • White Papers // Jun 2010

    A Novel Approach Against Reactive Jamming Attacks

    There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices. To avoid the problems in existing methods, the authors propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any...

    Provided By Old City Publishing

  • White Papers // Feb 2010

    An Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

    Designing a user authentication protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and sensor node has limited energy, processing and storage resources. Recently, several authentication schemes have been proposed. This paper shows some security problems and design weaknesses in those schemes. Furthermore,...

    Provided By Old City Publishing

  • White Papers // Aug 2009

    Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption

    Specifying information needs declaratively has turned out to be useful in the context of databases systems, and researchers have applied this approach to sensor networks. The first step to retrieve data from a sensor network in this way is the dissemination of the query. Energy-efficient query dissemination plays an important...

    Provided By Old City Publishing

  • White Papers // May 2009

    An Integrated Protocol for Maintaining Connectivity and Coverage Under Probabilistic Models for Wireless Sensor Networks

    The authors propose a distributed connectivity maintenance protocol that explicitly accounts for the probabilistic nature of wireless communication links. The proposed protocol is simple to implement and it achieves a given target communication quality between nodes, which is quantified by the minimum packet delivery rate between any pair of nodes...

    Provided By Old City Publishing

  • White Papers // Jan 2009

    Minimization of Quantum Multiple-Valued Decision Diagrams Using Data Structure Metrics

    This paper describes new metrics for size minimization of the data structure referred to as Quantum Multiple-valued Decision Diagrams (QMDD). QMDD are used to represent the matrices describing reversible and quantum gates and circuits. The authors explore metrics related to the frequency of edges with non-zero weight for the entire...

    Provided By Old City Publishing

  • White Papers // Jan 2009

    Cooperation Mechanism Taxonomy for Wireless Sensor and Actor Networks

    A Wireless Sensor and Actor Network (WSAN) is commonly integrated by a large quantity of sensor nodes and a lower number of actor nodes which communicate throughout the wireless medium providing distributed sensing and executing specific tasks according to the events monitored in a specific area of interest. To achieve...

    Provided By Old City Publishing

  • White Papers // Dec 2012

    Optimal Packet Size for Network Throughput With Time-Bound Fairness in IEEE 802.11 Networks

    With the popularity of IEEE 802.11 networks, it has become increasingly important to analyze the performance of IEEE 802.11 protocols more accurately. The IEEE 802.11 Distributed Coordination Function (DCF) protocol exhibits fairness problem in scenarios with asymmetric topology. Existing strategies mostly aim at the fairness issue without considering the convergence...

    Provided By Old City Publishing

  • White Papers // May 2009

    An Integrated Protocol for Maintaining Connectivity and Coverage Under Probabilistic Models for Wireless Sensor Networks

    The authors propose a distributed connectivity maintenance protocol that explicitly accounts for the probabilistic nature of wireless communication links. The proposed protocol is simple to implement and it achieves a given target communication quality between nodes, which is quantified by the minimum packet delivery rate between any pair of nodes...

    Provided By Old City Publishing

  • White Papers // Aug 2009

    Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption

    Specifying information needs declaratively has turned out to be useful in the context of databases systems, and researchers have applied this approach to sensor networks. The first step to retrieve data from a sensor network in this way is the dissemination of the query. Energy-efficient query dissemination plays an important...

    Provided By Old City Publishing

  • White Papers // Jan 2009

    Cooperation Mechanism Taxonomy for Wireless Sensor and Actor Networks

    A Wireless Sensor and Actor Network (WSAN) is commonly integrated by a large quantity of sensor nodes and a lower number of actor nodes which communicate throughout the wireless medium providing distributed sensing and executing specific tasks according to the events monitored in a specific area of interest. To achieve...

    Provided By Old City Publishing

  • White Papers // Jun 2010

    A Novel Approach Against Reactive Jamming Attacks

    There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices. To avoid the problems in existing methods, the authors propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any...

    Provided By Old City Publishing

  • White Papers // Mar 2011

    Proactive Threshold Cryptosystem for EPC Tags

    The authors define three privacy-preserving solutions to the problem of distributing secrets between manufacturers and vendors of items labeled with Electronic Product Code (EPC) Gen2 tags. The solutions rely on the use of an anonymous threshold secret sharing scheme that allows the exchange of blinded information between readers and tags....

    Provided By Old City Publishing

  • White Papers // Feb 2010

    An Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

    Designing a user authentication protocol for wireless sensor networks is a difficult task because wireless networks are susceptible to attacks and sensor node has limited energy, processing and storage resources. Recently, several authentication schemes have been proposed. This paper shows some security problems and design weaknesses in those schemes. Furthermore,...

    Provided By Old City Publishing

  • White Papers // Jan 2012

    Reversible Logic Synthesis Based on Decision Diagram Variable Ordering

    Reversible logic synthesis is important for the design of conventional logic systems such as adiabatic logic and also for quantum logic systems since all quantum logic gates are necessarily reversible in nature. A framework is presented that improves reversible logic synthesis by employing a dynamically determined variable order for Quantum...

    Provided By Old City Publishing

  • White Papers // Jan 2009

    Minimization of Quantum Multiple-Valued Decision Diagrams Using Data Structure Metrics

    This paper describes new metrics for size minimization of the data structure referred to as Quantum Multiple-valued Decision Diagrams (QMDD). QMDD are used to represent the matrices describing reversible and quantum gates and circuits. The authors explore metrics related to the frequency of edges with non-zero weight for the entire...

    Provided By Old City Publishing

  • White Papers // May 2011

    Dependable Over-the-Air Programming

    Wireless Sensor Networks (WSNs) represent an emerging set of technologies that will have profound effects across a wide range of industrial, scientific, and governmental applications. In the civilian sector, probably the largest WSNs currently discussed, prototypically implemented, and tested are WSNs for Critical Infrastructure Protection (CIP) like for example oil...

    Provided By Old City Publishing