Search Results - (( protocol distributed max algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- distributed max »
- max algorithm »
-
1
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
2
Security Zone and Key Derivation Management in Centralized Security Control in Wimax Multihop Relay System
Published 2010“…In order to operate efficiently, communication must be scheduled either by a distributed, centralized or hybrid algorithms. A WiMAX network usually operates in a highly dynamic and open environment therefore it is known to be more vulnerable to security holes. …”
Get full text
Get full text
Proceeding -
3
A new model of application response time for VoIP over WLAN and fixed WiMAX
Published 2015“…In this paper we provide an overview and develops a new distributed model to improve QoS performance for VoIP over WLAN and Fixed WiMAX network with respect to Application Response Time (ART). …”
Get full text
Get full text
Conference or Workshop Item -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
