Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes 2010 Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes formed by these attacks....
Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression Applications
virus spread in Networks-Developed in Dotnet
Rate and Delay Guarantees Provided by Close Packet Switches with Load Balancing- Developed in Java: Contact: 9600095047
IRM Integrated File Replication and Consistency Maintenance in P2P Systems
Dynamic load balancing server