SOC is different from the traditional Grid model (including P2P desktop Grid) in the resource consumption manner. Grids generally assume exclusive resource usage to ensure user QoS. The problem of job scheduling in Grids is usually categorized as a multiprocessor scheduling (MPS) problem (a kind of combinatorial optimization problem), which has been proved to be […]
Archives for February 2014
Visual cryptography is a secret sharing scheme
Visual cryptography (VC) is a secret sharing scheme, based on black and white or binary images. Secret images are divided into share images which, on their own, reveal no information of the original secret. Shares may be distributed to various parties so that only by collaborating with an appropriate number of other parties, can the […]
SOCIAL NETWORK ANALYSIS-BASED MOBILE NODE GROUPING
The proposed cooperative packet delivery approach is related to the concept of delay-tolerant networks (DTNs), in this section, we review the related work on delay tolerant and cooperative data transmission in wireless networks. DTNs are characterized by long transmission delay, high error rates, intermittent connectivity, and existence of multiple unreliable links . Vehicular delay tolerant […]