Results 141 to 150 of about 59,952 (150)
Emergent Distribution of Operating System Services in Wireless Ad Hoc Networks [PDF]
Despite the advances in wireless, energy-constrained ad hoc networks, there are still many challenges given the limited capabilities of the current hardware. Therefore, our aim is to develop a lightweight, yet powerful operating system (OS) for these networks.
Peter Janacik, Tales Heimfarth
openalex +3 more sources
Modified distributed quality-of-service routing in wireless mobile ad-hoc networks [PDF]
The QoS routing is a key function for the transmission and distribution of multimedia traffic across networks. However, their application in ad hoc networks is difficult because of the ever-changing nature of the network topology, and the inherently imprecision of routing state information. In this paper an efficient distributed routing algorithm based
Said Ghoniemy +2 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Distributed aggregation service for mobile wireless ad hoc sensor networks
International Journal of Mobile Communications, 2007This paper presents Cluster On-Demand Distance Vector Routing (CODV) algorithm for distributed aggregation service in mobile ad hoc sensor networks to achieve important networking requirements, including network scalability, load balancing, loss tolerance, and prolonged lifetime. CODV allows users to express simple queries and have them executed at the
Shun-Chih Hsu, Hsung-Pin Chang
openaire +2 more sources
Queueing Analysis of Distributed MAC in Wireless Ad Hoc Networks with Differentiated Services
2006 IEEE International Conference on Communications, 2006A queueing analysis of a distributed and energy-aware medium access control (MAC) protocol is presented for wireless ad hoc networks with service differentiation. We consider a battery-powered node in the network with two different types of traffic, and model the node as a MAP/PH/1/K non-preemptive priority queue with multiple vacations to model the ...
Afshin Fallahi, Ekram Hossain
openaire +2 more sources
Distributed Flow Admission Control for Multimedia Services Over Wireless Ad Hoc Networks
Wireless Personal Communications, 2006In this paper we propose a novel Priority-based Distributed flow Admission Control (PDAC) protocol to provide Quality of Service (QoS) to multimedia applications over the Dynamic Source Routing (DSR) protocol-based wireless ad hoc networks. In contrast to short-term packet forwarding, medium and long-term multimedia and real-time traffic may benefit ...
Viraj S. Ambetkar, Yong Pei
openaire +2 more sources
Distributed flow admission control for real-time multimedia services over wireless ad hoc networks
Proceedings of the 2nd international conference on Mobile multimedia communications - MobiMedia '06, 2006In this paper, we propose a novel Priority-based Distributed flow Admission Control (PDAC) protocol which adds enhancements to the existing Dynamic Source Routing (DSR) protocol in order to provide Quality of Service (QoS) to traffic flows belonging to realtime and multimedia applications in wireless ad hoc networks. PDAC allows a node to establish and/
Jianing Ma +4 more
openaire +2 more sources
Sequence Estimation over Finite-State Markov Channel via the Expectation Maximization Algorithm
10th International Conference on Information Technology (ICIT 2007), 2007Since an anchor is used in an HTML document to point to a related document/picture/media application, the existing approaches [3,4,5], to find out the information about an associated Web page, are based on the use of anchor-text contained in the anchor tag. The problem with this approach is that sometimes anchor-texts are either not present at all or a
Ramesh C. Joshi +3 more
openaire +10 more sources
International Journal of Wireless and Ad Hoc Communication
The increasing threat landscape of Distributed Denial-of-Service (DDoS) attacks makes network security a major concern. These attacks are a serious challenge to the stability and integrity of digital infrastructures. This research paper is an in-depth study on how to enhance network security through the detection and mitigation of DDoS attacks.
Mahmoud Mahmoud, Ahmed A. Metwaly
openaire +1 more source
The increasing threat landscape of Distributed Denial-of-Service (DDoS) attacks makes network security a major concern. These attacks are a serious challenge to the stability and integrity of digital infrastructures. This research paper is an in-depth study on how to enhance network security through the detection and mitigation of DDoS attacks.
Mahmoud Mahmoud, Ahmed A. Metwaly
openaire +1 more source

