Results 311 to 320 of about 1,086,078 (347)
Some of the next articles are maybe not open access.
2007
This entry presents architectures and protocols for ad hoc networks—IEEE 802.11 and Bluetooth.
Donal O'Mahony, Patroklos Argyroudis
openaire +4 more sources
This entry presents architectures and protocols for ad hoc networks—IEEE 802.11 and Bluetooth.
Donal O'Mahony, Patroklos Argyroudis
openaire +4 more sources
2002 IEEE Conference on Ultra Wideband Systems and Technologies (IEEE Cat. No.02EX580), 2003
We propose a new strategy for path selection in a UWB based ad-hoc network which by minimizing a power-dependent global cost function, can potentially lead to an optimal network organization characterized by low emitted power levels and high network performance.
DE NARDIS, LUCA+2 more
openaire +2 more sources
We propose a new strategy for path selection in a UWB based ad-hoc network which by minimizing a power-dependent global cost function, can potentially lead to an optimal network organization characterized by low emitted power levels and high network performance.
DE NARDIS, LUCA+2 more
openaire +2 more sources
A calculus of trustworthy ad hoc networks
Formal Aspects of Computing, 2010AbstractWe propose aprocess calculusformobile ad hoc networkswhich relies on an abstract behaviour-based multileveltrust model. The operational semantics of the calculus is given in terms of a labelled transition system, where actions are executed at a certain security level.
MERRO, Massimo, SIBILIO, Eleonora
openaire +6 more sources
Ad Hoc Networks: To Spread or Not to Spread? [Ad Hoc and Sensor Networks]
IEEE Communications Magazine, 2007Spread spectrum communication - often called code-division multiple access - has been widely adopted over the years for many types of interference-challenged wireless communication systems including cellular and cordless telephones, wireless LANs and PANs, military applications, and global positioning systems.
Jeffrey G. Andrews+2 more
openaire +2 more sources
Performability in ad hoc networks
2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514), 2005In mobile ad hoc networks, protocols are distributed and rely on the cooperative participation of all nodes in the network. Since the wireless technology implies node resource constraints, it may not be convenient for a node to relay requests on behalf of others.
Marco Conti+2 more
openaire +3 more sources
Multicasting in Mobile Ad Hoc Networks [PDF]
The success of wireless ad hoc networks and the increasing interest in multimedia applications explain the need of multicast protocols adapted to the wireless environment. In this chapter, we first introduce the design considerations for a multicast protocol in a wireless ad hoc network.
Minet, Pascale, Laouiti, Anis
openaire +2 more sources
Flying Ad Hoc Network: A Newest Research Area for Ad Hoc Networks
2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), 2019Flying Ad-hoc Network (FANET) is a special class of MANET that provides the communication among small flying drones called UAVs (Unmanned Aerial Vehicle) enable with camera, sensor and communication system. The FANET nodes communicate with each others in the air; transfer the data and signals between each other without any human experts and without any
Sunil Kr. Maakar+2 more
openaire +2 more sources
Ad–hoc Filesystem: A Novel Network Filesystem for Ad-hoc Wireless Networks
2001In this paper, we propose a new filesystem named Ad-hoc Filesystem which targets ad-hoc wireless networks. Ad-hoc Filesystem is a serverless filesystem which automatically generates temporary shared space among multiple mobile machines when they gather in a communicable range. The generated space is kept stable as long as possible even if some machines
Kinuko Yasuda, Tatsuya Hagino
openaire +2 more sources
2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006
Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol.
openaire +2 more sources
Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol.
openaire +2 more sources
2005
Mobile ad hoc networks represent a new form of communication consisting of mobile wireless terminals (e.g., handset, PDAs, notebooks). These type of networks are wireless multi-hop packet networks without any fixed infrastructure and centralized administration, in contrast to today’s wireless communications, which is based on a fixed, pre-established ...
openaire +2 more sources
Mobile ad hoc networks represent a new form of communication consisting of mobile wireless terminals (e.g., handset, PDAs, notebooks). These type of networks are wireless multi-hop packet networks without any fixed infrastructure and centralized administration, in contrast to today’s wireless communications, which is based on a fixed, pre-established ...
openaire +2 more sources