Showing 5,141 - 5,150 results of 5,150 for search '"Contemporary R', query time: 0.58s Refine Results
  1. 5141
  2. 5142
  3. 5143
  4. 5144
  5. 5145
  6. 5146
  7. 5147

    The world of child labor : an historical and regional survey / Hugh D. Hindman, editor.

    Published 2009
    Table of Contents: “…Aderinto -- Child labor in Nigeria: historical perspective / Adelaja Odutola Odukoya -- Child labor in Senegal: contemporary and historical perspective / Loretta E. …”
    Full text (Wentworth users only)
    Electronic eBook
  8. 5148
  9. 5149
  10. 5150

    Security, privacy and reliability in computer communications and networks / editors, Kewei Sha, Aaron Striegel, Min Song.

    Published 2017
    Table of Contents: “…Preface xv -- Acknowledgments xvii -- List of Contributors xix -- List of Figures xxiii -- List of Tables xxxi -- List of Algorithms xxxv -- List of Abbreviations xxxvii PART I: Privacy 1 Distributed Beamforming Relay Selection to Increase Base Station Anonymity inWireless Ad Hoc Networks 3 Jon R.Ward and Mohamed Younis 1.1 Introduction 4 -- 1.2 Anonymity Definition, Metrics, and Contemporary Measures 8 -- 1.2.1 Anonymity Definition and Assessment 8 -- 1.2.2 Antitraffic Analysis Measures 11 -- 1.3 System Assumptions and Attack Model 13 -- 1.3.1 Network Model 14 -- 1.3.2 Adversary Model 15 -- 1.3.3 Evidence Theory and Belief Metric 16 -- 1.4 Distributed Beamforming to Increase the BS Anonymity 21 -- 1.4.1 Overview of the DiBAN Protocol 21 -- 1.4.2 DiBAN Illustrative Example 25 -- 1.4.3 DiBAN Energy Analysis 26 -- 1.5 Distributed Beamforming Relay Selection Approach 28 -- 1.6 Validation Experiments 32 -- 1.6.1 Simulation Environment 32 -- 1.6.2 Simulation Results 32 -- 1.7 Conclusions and FutureWork 38 Appendix I: Numerical Evidence Theory Belief Calculation Example 39 -- References 42 -- 2 Privacy-Preserving and Efficient Information Sharing Scheme for VANET Secure Communication 49 Cong Guo, Liehuang Zhu and Zijian Zhang 2.1 Introduction 50 -- 2.2 RelatedWorks 52 -- 2.3 System Model and Preliminaries 54 -- 2.3.1 Network Model 54 -- 2.3.2 Attack Model 55 -- 2.3.3 Security Requirements 55 -- 2.4 The Proposed PETS Scheme 56 -- 2.4.1 Scheme Overview 56 -- 2.4.2 System Initiation 56 -- 2.4.3 Vehicle-RSU Key Agreement 58 -- 2.4.4 Traffic Information Collection and Aggregation 59 -- 2.4.5 Traffic Jam Message Propagation 61 -- 2.5 Security Analysis 63 -- 2.6 Performance Evaluation 64 -- 2.6.1 Traffic Information Sending/Collection Overhead 65 -- 2.6.2 Traffic Information Propagation/Verification Overhead 66 -- 2.6.3 Scheme Simulation 68 -- 2.7 Conclusion 74 -- References 74 PART II: Vulnerabilities, Detection and Monitoring 3 DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection 79 Maciej Korczy?…”
    Full text (WIT users only)
    Electronic eBook