A study of design requirements for mobile learning environments

D Parsons, H Ryu, M Cranshaw - Sixth IEEE International …, 2006 - ieeexplore.ieee.org
This paper proposes a conceptual framework for mobile learning applications that provides
systematic support for mobile learning experience design. It is based on a combination of a …

Resilient wireless sensor networks using topology control: A review

Y Huang, JF Martínez, J Sendra, L López - Sensors, 2015 - mdpi.com
Wireless sensor networks (WSNs) may be deployed in failure-prone environments, and
WSNs nodes easily fail due to unreliable wireless connections, malicious attacks and …

On connectivity and robustness in random intersection graphs

J Zhao, O Yağan, V Gligor - IEEE Transactions on Automatic …, 2016 - ieeexplore.ieee.org
Random intersection graphs have received much attention recently and been used in a wide
range of applications ranging from key predistribution in wireless sensor networks to …

Zero-one laws for connectivity in inhomogeneous random key graphs

O Yağan - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We introduce a new random key predistribution scheme for securing heterogeneous
wireless sensor networks. Each of the n sensors in the network is classified into r classes …

Determining source–destination connectivity in uncertain networks: Modeling and solutions

L Fu, X Fu, Z Xu, Q Peng, X Wang… - IEEE/ACM Transactions …, 2017 - ieeexplore.ieee.org
Determination of source-destination connectivity in networks has long been a fundamental
problem, where most existing works are based on deterministic graphs that overlook the …

Topological Properties of Secure Wireless Sensor Networks Under the -Composite Key Predistribution Scheme With Unreliable Links

J Zhao - IEEE/ACM Transactions on Networking, 2017 - ieeexplore.ieee.org
Security is an important issue in wireless sensor networks (WSNs), which are often deployed
in hostile environments. The q-composite key predistribution scheme has been recognized …

Collaborative authentication in decentralized dense mobile networks with key predistribution

X Zha, W Ni, K Zheng, RP Liu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Challenges of authentication in decentralized mobile networks arise from frequently
changing topologies and unreliable contention-based transmissions. We propose a new …

Toward -Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links

F Yavuz, J Zhao, O Yağan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We study the secure and reliable connectivity of wireless sensor networks. Security is
assumed to be ensured by the random pairwise key predistribution scheme of Chan, Perrig …

[图书][B] Random graph modeling of key distribution schemes in wireless sensor networks

O Yagan - 2011 - search.proquest.com
Wireless sensor networks (WSNs) are distributed collections of sensors with limited
capabilities for computations and wireless communications. It is envisioned that such …

-Connectivity in Random -Out Graphs Intersecting Erdős-Rényi Graphs

F Yavuz, J Zhao, O Yağan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We investigate k-connectivity in secure wireless sensor networks under the random pairwise
key predistribution scheme with unreliable links. When wireless communication links are …