An Efficient Hierarchical Multi-Hop Clustering Scheme in Non-uniform Large Wireless Sensor Networks (English)
- New search for: Lee, C.
- New search for: Kim, E.
- New search for: Park, J.
- New search for: Seong, D.
- New search for: Yoo, J.
- New search for: Lee, C.
- New search for: Kim, E.
- New search for: Park, J.
- New search for: Seong, D.
- New search for: Yoo, J.
In:
Computer Science and its Applications
;
757-766
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:An Efficient Hierarchical Multi-Hop Clustering Scheme in Non-uniform Large Wireless Sensor Networks
-
Contributors:
-
Conference:Conference, Computer Science and its Applications ; 2009 ; Jeju Island, Korea
-
Published in:Computer Science and its Applications ; 757-766LECTURE NOTES IN ELECTRICAL ENGINEERING ; 203 ; 757-766
-
Publisher:
- New search for: Springer Netherlands
-
Place of publication:Dordrecht
-
Publication date:2012-01-01
-
Size:10 pages
-
Remarks:The 4th FTRA International Conference on Computer Science and its Applications (CSA-12) was held in Jeju, Korea on November 22~25, 2012. Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Utilizing TPM Functionalities on Remote ServerAziz, N.A. / Khalid, P.S. et al. | 2012
- 13
-
Security and QoS relationships in Mobile PlatformsNieto, A. / Lopez, J. et al. | 2012
- 23
-
A Hybrid Natural Computing Approach for the VRP Problem Based on PSO, GA and Quantum ComputationZeng, K. / Peng, G. / Cai, Z. / Huang, Z. / Yang, X. et al. | 2012
- 29
-
Finger Triggered Virtual Musical InstrumentsNg, C.K. / Fam, J.G. / Noordin, N.K. et al. | 2012
- 39
-
A Low Complexity Multi-Layered Space Frequency Coding Detection Algorithm for MIMO-OFDMChong, J.H. / Ng, C.K. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 49
-
Dynamic Transmit Antenna Shuffling Scheme for MIMO Wireless Communication SystemsChong, J.H. / Ng, C.K. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 59
-
A Low Complexity V-BLAST/STBC Detection Algorithm for MIMO-SystemChong, J.H. / Ng, C.K. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 69
-
A Grid-Based Cloaking Scheme for Continuous Location-Based Services in Distributed SystemsKim, H.-I. / Chang, J.-W. et al. | 2012
- 79
-
Occluded and Low Resolution Face Detection with Hierarchical Deformable ModelYang, X. / Peng, G. / Cai, Z. / Zeng, K. et al. | 2012
- 87
-
Negotiated Economic Grid Brokering for Quality of ServiceKavanagh, R. / Djemame, K. et al. | 2012
- 97
-
Differential Fault Analysis on HAS-160 Compression FunctionKang, J. / Jeong, K. / Sung, J. / Hong, S. et al. | 2012
- 107
-
A New Energy-Efficient Routing Protocol Based on Clusters for Wireless Sensor NetworksYoon, M. / Chang, J.-W. et al. | 2012
- 121
-
MIDI-to-Singing Online Karaoke for English M-LearningShen, H.-C. / Lee, C.-N. et al. | 2012
- 129
-
A New Cloaking Method Based on Weighted Adjacency Graph for Preserving User Location Privacy in LBSJang, M. / Chang, J.-W. et al. | 2012
- 139
-
Simulation Videos for Understanding Occlusion Effects on Kernel Based Object TrackingLee, B.Y. / Liew, L.H. / Cheah, W.S. / Wang, Y.C. et al. | 2012
- 149
-
Originator Recognition (or) Path Recovery Mechanism for Load-Based Routing ProtocolEe, G.K. / Ng, C.K. / Hashim, F. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 159
-
Analysis of Correlation Peak Position ModulationNah, J. / Kim, J. et al. | 2012
- 169
-
Simulation Study on Distribution of Control Points for Aerial Images RectificationLiew, L.H. / Lee, B.Y. / Wang, Y.C. / Cheah, W.S. et al. | 2012
- 179
-
A Secure Image Watermarking Using Visual CryptographyJin, X. / Kim, J. et al. | 2012
- 189
-
Bit Error Rate Analysis of Partial Packets in Ad hoc Wireless NetworksLu, J. / Gan, X. / Han, G. / Li, B. / Dou, W. et al. | 2012
- 197
-
An Interaction System Architecture and Design between Smart Computing and Cloud ComputingLee, T.-G. / Lee, S.-H. / Chung, G.-S. et al. | 2012
- 207
-
A Virtual Machine Scheduling Algorithm for Resource Cooperation in a Private CloudChang, R.-S. / Chang, Y.-C. / Ye, R.-C. et al. | 2012
- 217
-
Heterogeneous Core Network Architecture for Next-Generation Mobile Communication NetworksChang, Y.-C. et al. | 2012
- 231
-
A Novel Learning Algorithm Based on a Multi-Agent Structure for Solving Multi-Mode Resource-Constrained Project Scheduling ProblemMirzaei, O. / Akbarzadeh-T, M.-R. et al. | 2012
- 243
-
Security Analysis of the Keyschedule of ARIA-128Kang, H. / Lee, Y. / Jeong, K. / Sung, J. / Hong, S. et al. | 2012
- 253
-
Estimating Number of Columns in Mixing Matrix for Under-Determined ICA Using Observed Signal Clustering and Exponential FilteringSaengpratch, C. / Lursinsap, C. et al. | 2012
- 261
-
Realization of Coordinative Control Between Multi Readers and Multi RF-SIM Cards Under Mobile RF-SIM ModeYu, S. / Peng, Y. / Huang, X. et al. | 2012
- 271
-
Effects of Smart Home Dataset Characteristics on Classifiers Performance for Human Activity RecognitionFatima, I. / Fahim, M. / Lee, Y.-K. / Lee, S. et al. | 2012
- 283
-
Activity Recognition Based on SVM Kernel Fusion in Smart HomeFahim, M. / Fatima, I. / Lee, S. / Lee, Y.-K. et al. | 2012
- 291
-
Secure Anonymous Conditional Purchase Order Payment MechanismWu, W.-C. / Liaw, H.-T. et al. | 2012
- 301
-
Trustworthiness Inference of Multi-tenant Component Services in Service CompositionsElshaafi, H. / Botvich, D. et al. | 2012
- 313
-
Enhanced Middleware for Collaborative Privacy in Community Based Recommendations ServicesElmisery, A.M. / Doolin, K. / Roussaki, I. / Botvich, D. et al. | 2012
- 329
-
A New k-NN Query Processing Algorithm Using a Grid Structure for Mobile Objects in Location-Based ServicesHong, S. / Chang, J. et al. | 2012
- 339
-
An Immune System-Inspired Byte Permutation Function to Improve Confusion Performance of Round Transformation in Symmetric Encryption SchemeAriffin, S. / Mahmod, R. / Jaafar, A. / Rezal, M. / Ariffin, K. et al. | 2012
- 353
-
New Bilateral Error Concealment Method of Entire Depth Frame Loss for 3DTV and Virtual 3D Videoconferencing SystemsLi, F. / Jiang, G. / Yu, M. / Wang, X. / Shao, F. / Peng, Z. et al. | 2012
- 361
-
A REST Open API for Preventing Income Tax Over-Payment by Auditing Year-End Tax SettlementChoi, M. / Yeo, S.-S. et al. | 2012
- 371
-
BAT: Bimodal Cryptographic Algorithm Suitable for Various EnvironmentsLee, J. / Jeong, K. / Kang, J. / Lee, Y. / Sung, J. / Chang, K.-Y. / Hong, S. et al. | 2012
- 389
-
Applying Forensic Approach to Live Investigation Using XeBagLim, K.-S. / Lee, C. et al. | 2012
- 399
-
The Development of an Internet-Based Knowledge Management System for Adapted Physical Education Service DeliveryBae, J.-J. / Lee, J.-C. / Cheon, M.-W. / Choi, S.-O. et al. | 2012
- 409
-
Intangible Capital, Opportunity Exploitation and Institutional Endorsement in Emerging IT IndustryYoungkeun, C. et al. | 2012
- 421
-
A Virtualization Security Framework for Public Cloud ComputingPark, J.H. et al. | 2012
- 429
-
Environmental Awareness in Green Supply Chain and Green Business Practices: Application to Small and Medium-Sized EnterprisesChun, S.-H. / Hwang, H.J. / Byun, Y.-H. et al. | 2012
- 437
-
Computational Analysis of the Bargaining Power and Channel Strategies in Supply Chain RelationshipChun, S.-H. et al. | 2012
- 445
-
New Hybrid Data Model for XML Document Management in Electronic CommerceKim, E.-Y. / Chun, S.-H. et al. | 2012
- 453
-
A Study on Advanced Penetration Testing and Defensive Schemes for Web Service Vulnerability AnalysesPark, J.S. / Mun, C.-H. / Shin, C.H. / Park, J.H. et al. | 2012
- 461
-
Orthogonal Unified Buffer with Memory EfficiencySeo, S. / Choi, J. et al. | 2012
- 469
-
The Study on Smart Sensor Network Based Production Management Service DesignChang, H. et al. | 2012
- 477
-
R&D Intensity and Productivity: Evidence from IT Firms versus Non-IT Firms in KOSDAQ MarketKim, S. et al. | 2012
- 485
-
An Improved CRT-Based Broadcast Authentication Scheme in WSNsZhu, Y. / Shen, Y. et al. | 2012
- 493
-
Evaluation and Exploration of Optimal Deployment for RFID Services in Smart Campus FrameworkChang, Y.-C. et al. | 2012
- 503
-
Towards Analyzing Family Misconfiguration in Tor NetworkWang, X. / Shi, J. / Li, G. et al. | 2012
- 515
-
Intelligent Heterogeneous Network Worms Propagation Modeling and AnalysisGuo, W. / Zhai, L. / Ren, Y. / Guo, L. et al. | 2012
- 525
-
The Design of Remote Control Car Using Smartphone for Intrusion DetectionRyu, C.-J. et al. | 2012
- 537
-
The Impact of Systems Engineering on Program Performance: A Case Study of the Boeing CompanySon, S.K. / Kim, S.-K. et al. | 2012
- 547
-
IT Framework and User Requirement Analysis for Smart AirportsSohn, S.-C. / Kim, K.-W. / Lee, C. et al. | 2012
- 557
-
The Framework Development of a RFID-Based Baggage Handling System for AirportsKim, C.-g. / Kim, K.-w. / Choi, Y.-C. et al. | 2012
- 567
-
A Modified Carbon Calculator for Enhanced Accuracy, Reliability and UnderstandabilityLee, G.-Y. / Yoo, K.-E. / Kim, K.-W. / Kim, B.-M. et al. | 2012
- 577
-
A Framework for Developing Internet-Based Global Integrated Logistics Management SystemHong, H.-S. / Hong, K.-s. / Kim, K.-w. / Lee, C. et al. | 2012
- 587
-
The Implication of Environmental Costs on Air Passenger Demand for Airline NetworksKim, B.-J. / Yoo, K.-E. et al. | 2012
- 595
-
An Empirical Study on the Design Peak Hourly Traffic at a Major International AirportLee, S.-k. / Kim, K.-W. / Choi, Y.-C. et al. | 2012
- 605
-
Review of CRS in the Airline Industry: New Categorization with Previous LiteraturesBang, S.O. / Lee, J. / Kim, K.-w. / Lee, C. et al. | 2012
- 613
-
Simulation Analysis for the Design of the Airport Security SystemSim, Y.-t. / Park, S.-b. / Choi, Y.-c. et al. | 2012
- 623
-
Measuring Asia Airport Productivity Considering the Undesirable OutputPark, S. / Lee, C. et al. | 2012
- 633
-
A Study on Aviation Technology Forecast for Sustainable (Green) Aviation Using Patent AnalysisKwon, H. / Lee, C. et al. | 2012
- 645
-
A Vision-Based Universal Control System for Home AppliancesHsieh, C.-H. / Huang, P.S. / Weng, S.-K. / Huang, C.-P. / Yeh, J.-S. / Lee, Y.-B. et al. | 2012
- 655
-
An IMU-Based Positioning System Using QR-Code Assisting for Indoor NavigationChiou, Y.-S. / Tsai, F. / Yeh, S.-C. / Hsu, W.-H. et al. | 2012
- 667
-
A Visual-Audio Assisting System for Senior Citizen ReadingLi, Y.-Q. / Liu, J.-J. / Huang, S.-Y. / Yang, C.-K. / Chang, C.-C. / Wang, L.-T. / Hsiao, K.-F. et al. | 2012
- 677
-
Automated Text Detection and Text-Line Construction in Natural ImagesYu, C.-C. / Chen, Y.-N. / Hsu, W.-H. / Chuang, T.C. et al. | 2012
- 687
-
Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key AgreementKim, M. / Park, N. / Won, D. et al. | 2012
- 693
-
Development and Application of STEAM Teaching Model Based on the Rube Goldberg's InventionKim, Y. / Park, N. et al. | 2012
- 699
-
Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service SystemPark, N. / Cho, S. / Kim, B.-D. / Lee, B. / Won, D. et al. | 2012
- 707
-
Weakness of Tan's Two-Factor User Authentication Scheme in Wireless Sensor NetworksLee, Y. / Kim, J. / Won, D. et al. | 2012
- 715
-
Design of Mobile NFC Extension Protocol for Various Ubiquitous Sensor Network EnvironmentsLee, J.W. / Bang, H. / Park, N. et al. | 2012
- 723
-
Experimentation and Validation of Web Application's Vulnerability Using Security Testing MethodLee, T. / Won, G. / Cho, S. / Park, N. / Won, D. et al. | 2012
- 733
-
Teaching-Learning Methodology of STS Based on Computer and CAI in Information Science EducationHong, J. / Park, N. et al. | 2012
- 739
-
Encryption Scheme Supporting Range Queries on Encrypted Privacy Databases in Big Data Service EraLee, J.W. / Park, N. et al. | 2012
- 749
-
A Congested Route Discrimination Scheme Through the Analysis of Moving Object TrajectoriesLi, H. / Park, H. / Park, Y. / Bok, K. / Yoo, J. et al. | 2012
- 757
-
An Efficient Hierarchical Multi-Hop Clustering Scheme in Non-uniform Large Wireless Sensor NetworksLee, C. / Kim, E. / Park, J. / Seong, D. / Yoo, J. et al. | 2012
- 767
-
An Energy-Efficient Data Compression and Transmission Scheme in Wireless Multimedia Sensor NetworksPark, J. / Seong, D.-o. / Lee, B.-y. / Yoo, J. et al. | 2012
- 773
-
A Sensor Positioning Scheme in Irregular Wireless Sensor NetworksPark, H. / Hwang, D. / Park, J. / Seong, D.-o. / Yoo, J. et al. | 2012
- 781
-
Secure Multipath Routing for WMSNLee, S. / Park, J. / Seong, D. / Yoo, J. et al. | 2012
- 791
-
Dynamic TDMA Scheduling for Data Compression in Wireless Sensor NetworksYeo, M. / Yoo, J. et al. | 2012
- 799
-
A Study of Forest Fire Correlation to Based on Meteorological FactorsChung, Y.-S. / Kim, J.-M. / Park, K.-R. et al. | 2012
- 805
-
A Study on the Improvement of Interoperability in Rok C4I System for Future WarfareCha, H.-J. / Kim, J.-M. / Ryou, H.-B. / Jeong, H.-Y. et al. | 2012
- 813
-
Development Direction for Information Security in Network-Centric WarfareYang, H.-K. / Kim, J.-M. / Ryou, H.-B. / Park, J.-H. et al. | 2012
- 821
-
An IHD Authentication Protocol in Smart GridHsu, M.-Y. / Chen, Y.-H. / Chen, S.-S. / Tang, W. / Sun, H.-M. / Cheng, B.-C. et al. | 2012
- 831
-
Flexible Network Design for Wide Area Measurement Protection and ControlCao, D. / Dysko, A. / Michie, C. / Andonovic, I. et al. | 2012
- 843
-
Green Communication and Corporate Sustainability of Computer Aided Audit Techniques and Fraud DetectionAriwa, E. / Olasanmi, O.O. / Mauri, J.L. et al. | 2012
- 863
-
Green Communication and Consumer Electronics Sustainability in Delivering Cost Benefit Business Federation in Professional Service FirmsAriwa, E. / Syvertsen, C.M. / Mauri, J.L. et al. | 2012
- 875
-
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof MemoryPark, H. / Seo, D. / Lee, H. / Perrig, A. et al. | 2012
- 891
-
Design of a Structured Plug-in Smart Education SystemJo, J. / Yang, Y. / Lim, H. et al. | 2012
- 903
-
Impact of Background Utilization and Background Traffic on the Foreground Applications in a Wide Area NetworkUddin, J. / Kim, J.M. et al. | 2012
- 917
-
Load Balancing in Grid Computing Using AI TechniquesInam, N.T. / Awan, M.D. / Afzal, S.S. et al. | 2012
- 929
-
LiQR: A QR Code-Based Smart Phone Application Supporting Digital MarketingPark, J.-E. / Park, J. / Lee, M.-J. et al. | 2012
- 943
-
Ensuring Minimal Communication Overhead in Low Bandwidth Network FileHabib, M.A. / Nasar, W. / Ch, S.A. / Khan, A.J. et al. | 2012
- 953
-
Preventing Blackhole Attack in DSR-Based Wireless Ad Hoc NetworksShi, F. / Liu, W. / Jin, D. et al. | 2012
- 971
-
Fundamental Tradeoffs for Ubiquitous Wireless Service: A QoE, Energy and Spectral PerspectiveZhang, Y. / Liu, F. / Peng, Y. / Long, H. / Wang, W. et al. | 2012
- 981
-
Multi-Policy Collaborative Access Control Model for Composite ServicesYu, B. / Yang, L. / Wang, Y. / Zhang, B. / Ma, L. / Cao, Y. et al. | 2012