Results 211 to 220 of about 75,178 (256)
Gossip protocols have emerged as a powerful technique for implementing highly scalable and robust services, such as information dissemination and aggregation. The fact that gossip protocols require very little or no structure to operate makes them particularly appealing to apply in dynamic systems, where topology changes are common (for instance, due ...
Friedman, Roy+4 more
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
InterMR: Inter-MANET routing in heterogeneous MANETs
The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), 2010The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of communications and operations often requires that these heterogeneous MANETs to be interoperable. Nonetheless, the existing interconnection protocols designed for the Internet
Kang-Won Lee+5 more
openaire +2 more sources
PIM-MANET: Extension to PIM for multicast routing in MANETs
MILCOM 2015 - 2015 IEEE Military Communications Conference, 2015This paper presents a novel multicast routing protocol for wireless mobile ad hoc networks (MANETs) that uses distribution trees to efficiently forward multicast traffic. The proposed multicast routing protocol is built as a MANET extension to the popular Protocol Independent Multicast (PIM) routing protocol used in wired networks; hence, we call our ...
Rahul Amin, Greg Kuperman
openaire +2 more sources
Philosophy Today, 2007
Throughout Foucault's work references to Manet surface and resurface, sometimes more or less obscure, but always in the context of the dawn of modernity, that point in history in which the objects and discourses that we are today so familiar with first came into existence.
openaire +2 more sources
Throughout Foucault's work references to Manet surface and resurface, sometimes more or less obscure, but always in the context of the dawn of modernity, that point in history in which the objects and discourses that we are today so familiar with first came into existence.
openaire +2 more sources
Manet, Guéroult and Chrysippos
The Art Bulletin, 1964him unique among his Italian contemporaries of comparable or greater fame, yet he did belong with them, and perhaps even set an example for them, by virtue of his pointedly fine technique and his essays in what might be called "la maniera grande alla maniera piccolissima." To Lomazzo's saying in so a y words that Clovio raised the art of miniature to ...
openaire +2 more sources
International Journal of Pervasive Computing and Communications, 2006
Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far (1), all these protocols are proactive, thus wasting bandwidth when their function is not currently needed. To reduce the signalling traffic load, reactive clustering may be employed.We have developed a clustering protocol ...
Cramer, Curt+3 more
openaire +3 more sources
Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far (1), all these protocols are proactive, thus wasting bandwidth when their function is not currently needed. To reduce the signalling traffic load, reactive clustering may be employed.We have developed a clustering protocol ...
Cramer, Curt+3 more
openaire +3 more sources
Testbed on MANET (ToM): Private Testbed Facility for MANET Experiment
2020This article aims to share how to create a minimum MANET testbed facility as a requirement for evaluation of MANET research. Testbed facility that we have developed is called as Testbed on MANET or abbreviation ToM. We chose to use single board computer (SBC) to represent mobile devices in MANET.
Muchtar, Farkhana+6 more
openaire +3 more sources
Survival multipath routing for MANETs
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, 2008Many efforts have been made to develop security solutions for MANETs. These networks are vulnerable to diverse types of attacks, where routing is a critical operation. Current secure routing protocols are based on preventive or reactive security mechanisms, monitoring node behavior or controlling the access to networks and information. These mechanisms
Nogueira Lima, Michèle+3 more
openaire +3 more sources
Requirements for survivable routing in MANETs
2008 3rd International Symposium on Wireless Pervasive Computing, 2008MANETs are highly vulnerable to attacks due to their characteristics such as the lack of infrastructure and wireless communication. Considerable improvements have been made towards providing ad hoc network security and existent solutions apply cryptography, intrusion detection systems or reputation systems. However, these conventional defense lines are
Nogueira Lima, Michèle+3 more
openaire +2 more sources