Xiangyan Lu

  • Citations Per Year
Learn More
To deal with the malicious behaviors of the aggregators and the malicious route behaviors of the nodes in the wireless sensor networks, the trusted value and residual energy for the nodes are used to choose the aggregators, a relatively reliable path is secretly selected to transfer the data aggregation results, and a secure clustering and reliable disjoint(More)
By taking into account communication startup overhead and the assigned processor distribution order and by applying hashing technique, a novel sequence distribution strategy is presented and the parallel local alignment algorithm for multiple sequences is designed on the heterogeneous cluster system that the computing nodes have different computing speeds(More)
  • 1