메뉴 건너뛰기




Volumn 12, Issue 11, 2013, Pages 5620-5630

How to select optimal gateway in multi-domain wireless networks: Alternative solutions without learning

Author keywords

Gateway selection; Multi domain networks; Optimization

Indexed keywords


EID: 84895059023     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2013.100113.121828     Document Type: Article
Times cited : (10)

References (28)
  • 1
    • 38549136891 scopus 로고    scopus 로고
    • Gateway placement for throughput optimization in wireless mesh networks
    • F. Li, Y. Wang, and X.-Y. Li, "Gateway placement for throughput optimization in wireless mesh networks," in Proc. 2007 IEEE ICC, pp. 4955-4960.
    • Proc. 2007 IEEE ICC , pp. 4955-4960
    • Li, F.1    Wang, Y.2    Li, X.-Y.3
  • 2
    • 77955914908 scopus 로고    scopus 로고
    • Distributed gateway placement for cost minimization in wireless mesh networks
    • X. Xu, S. Tang, X. Mao, and X.-Y. Li, "Distributed gateway placement for cost minimization in wireless mesh networks," in Proc. 2010 IEEE ICDCS, pp. 507-515.
    • Proc. 2010 IEEE ICDCS , pp. 507-515
    • Xu, X.1    Tang, S.2    Mao, X.3    Li, X.-Y.4
  • 3
    • 77955098947 scopus 로고    scopus 로고
    • Utility-based gateway deployment for supporting multi-domain dtns
    • T. He, K.-W. Lee, N. Sofra, and K. K. Leung, "Utility-based gateway deployment for supporting multi-domain dtns," in Proc. 2010 IEEE SECON, pp. 341-349.
    • Proc. 2010 IEEE SECON , pp. 341-349
    • He, T.1    Lee, K.-W.2    Sofra, N.3    Leung, K.K.4
  • 4
    • 80053603420 scopus 로고    scopus 로고
    • Optimal gateway selection in multi-domain wireless networks: A potential game perspective
    • P. Ramanathan, T. Nandagopal, and B. N. Levine, Eds.
    • Y. Song, S. H. Y. Wong, and K.-W. Lee, "Optimal gateway selection in multi-domain wireless networks: a potential game perspective," in Proc. 2011 ACM MOBICOM, P. Ramanathan, T. Nandagopal, and B. N. Levine, Eds., pp. 325-336.
    • Proc. 2011 ACM MOBICOM , pp. 325-336
    • Song, Y.1    Wong, S.H.Y.2    Lee, K.-W.3
  • 6
    • 70349188636 scopus 로고    scopus 로고
    • Gateway selection in back-bone wireless mesh networks
    • U. Ashraf, S. Abdellatif, and G. Juanole, "Gateway selection in back-bone wireless mesh networks," in Proc. 2009 IEEE WCNC, pp. 2548-2553.
    • Proc. 2009 IEEE WCNC , pp. 2548-2553
    • Ashraf, U.1    Abdellatif, S.2    Juanole, G.3
  • 7
    • 77953312094 scopus 로고    scopus 로고
    • VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones
    • Y. Zhao, J. Wu, F. Li, and S. Lu, "VBS: maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones," in Proc. 2010 IEEE INFOCOM, pp. 1-5.
    • Proc. 2010 IEEE INFOCOM , pp. 1-5
    • Zhao, Y.1    Wu, J.2    Li, F.3    Lu, S.4
  • 8
    • 70349756784 scopus 로고    scopus 로고
    • Heterogeneous multi domain network architecture for military communications
    • L. Barolli, F. Xhafa, and H.-H. Hsu, Eds.
    • A. Durresi, M. Durresi, and L. Barolli, "Heterogeneous multi domain network architecture for military communications," in Proc. 2009 IEEE CISIS, L. Barolli, F. Xhafa, and H.-H. Hsu, Eds., pp. 382-387.
    • Proc. 2009 IEEE CISIS , pp. 382-387
    • Durresi, A.1    Durresi, M.2    Barolli, L.3
  • 9
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • W. Chen, J. F. Naughton, and P. A. Bernstein, Eds.
    • R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. 2000 ACM SIGMOD Conference, W. Chen, J. F. Naughton, and P. A. Bernstein, Eds., pp. 439-450.
    • Proc. 2000 ACM SIGMOD Conference , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 10
    • 84927517111 scopus 로고    scopus 로고
    • Privacy-preserving cooperative statistical analysis
    • W. Du and M. J. Atallah, "Privacy-preserving cooperative statistical analysis," in Proc. 2001 IEEE ACSAC, pp. 102-110.
    • Proc. 2001 IEEE ACSAC , pp. 102-110
    • Du, W.1    Atallah, M.J.2
  • 11
    • 0242698195 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • P. Buneman, Ed.
    • D. Agrawal and C. C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. 2001 ACM PODS, P. Buneman, Ed.
    • Proc. 2001 ACM PODS
    • Agrawal, D.1    Aggarwal, C.C.2
  • 12
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. 2003 IEEE ICDM, pp. 99-106.
    • Proc. 2003 IEEE ICDM , pp. 99-106
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 13
    • 84958048324 scopus 로고    scopus 로고
    • Data swapping: Balancing privacy against precision in mining for logic rules
    • Proc. 1999 Springer DaWaK, ser. M. K. Mohania and A. M. Tjoa, Eds.
    • V. Estivill-Castro and L. Brankovic, "Data swapping: balancing privacy against precision in mining for logic rules," in Proc. 1999 Springer DaWaK, ser. Lecture Notes in Computer Science, M. K. Mohania and A. M. Tjoa, Eds., vol. 1676, pp. 389-398.
    • Lecture Notes in Computer Science , vol.1676 , pp. 389-398
    • Estivill-Castro, V.1    Brankovic, L.2
  • 14
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • E. Royer and C. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Pers. Commun., vol. 6, no. 2, pp. 46-55, 1999.
    • (1999) IEEE Pers. Commun. , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.1    Toh, C.2
  • 18
    • 84895056718 scopus 로고    scopus 로고
    • Convex quadratic programming for exact solution of 0-1 quadratic programs
    • A. Billionnet, S. Elloumi, and M. Plateau, "Convex quadratic programming for exact solution of 0-1 quadratic programs," RAIRO-Operations Research, 2005.
    • (2005) RAIRO-Operations Research
    • Billionnet, A.1    Elloumi, S.2    Plateau, M.3
  • 19
    • 78751523747 scopus 로고    scopus 로고
    • I. IBM ILOG. Available
    • I. IBM ILOG. (2009) IBM ILOG CPLEX v12.1 User's Manual for CPLEX. Available: ftp://public.dhe.ibm.com/software/websphere/ilog/docs/optimization/ cplex/ps$\$usrmancplex.pdf
    • (2009) IBM ILOG CPLEX V12.1 User's Manual for CPLEX
  • 21
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multi-authority election scheme
    • Proc. 1997 Springer EUROCRYPT, ser. W. Fumy, Ed.
    • R. Cramer, R. Gennaro, and B. Schoenmakers, "A secure and optimally efficient multi-authority election scheme," in Proc. 1997 Springer EUROCRYPT, ser. Lecture Notes in Computer Science, W. Fumy, Ed., vol. 1233, pp. 103-118.
    • Lecture Notes in Computer Science , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 22
    • 4244053632 scopus 로고    scopus 로고
    • Efficient protocols based on probabilistic encryption using composite degree residue classes
    • I. Damg̊ard and M. Jurik, "Efficient protocols based on probabilistic encryption using composite degree residue classes," IACR Cryptology ePrint Archive, vol. 2000, p. 8, 2000.
    • (2000) IACR Cryptology ePrint Archive , vol.2000 , pp. 8
    • Damg̊ard, I.1    Jurik, M.2
  • 23
    • 0020312165 scopus 로고    scopus 로고
    • Protocols for secure computations (extended abstract)
    • A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in Proc. 1982 IEEE FOCS, pp. 160-164.
    • Proc. 1982 IEEE FOCS , pp. 160-164
    • Yao, A.C.-C.1
  • 24
    • 70449575839 scopus 로고    scopus 로고
    • Homomorphic encryption and secure comparison
    • I. Damg̊ard, M. Geisler, and M. Krøigaard, "Homomorphic encryption and secure comparison," IJACT, vol. 1, no. 1, pp. 22-31, 2008.
    • (2008) IJACT , vol.1 , Issue.1 , pp. 22-31
    • Damg̊ard, I.1    Geisler, M.2    Krøigaard, M.3
  • 25
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • Proc. 2007 Springer Public Key Cryptography, ser. T. Okamoto and X. Wang, Eds.
    • T. Nishide and K. Ohta, "Multiparty computation for interval, equality, and comparison without bit-decomposition protocol," in Proc. 2007 Springer Public Key Cryptography, ser. Lecture Notes in Computer Science, T. Okamoto and X. Wang, Eds., vol. 4450, pp. 343-360.
    • Lecture Notes in Computer Science , vol.4450 , pp. 343-360
    • Nishide, T.1    Ohta, K.2
  • 26
    • 85023809951 scopus 로고    scopus 로고
    • Threshold cryptosystems
    • Proc. 1989 Springer CRYPTO, ser. G. Brassard, Ed.
    • Y. Desmedt and Y. Frankel, "Threshold cryptosystems," in Proc. 1989 Springer CRYPTO, ser. Lecture Notes in Computer Science, G. Brassard, Ed., vol. 435, pp. 307-315.
    • Lecture Notes in Computer Science , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.