Results 211 to 220 of about 75,178 (256)

Gossiping on MANETs [PDF]

open access: possibleACM SIGOPS Operating Systems Review, 2007
Gossip protocols have emerged as a powerful technique for implementing highly scalable and robust services, such as information dissemination and aggregation. The fact that gossip protocols require very little or no structure to operate makes them particularly appealing to apply in dynamic systems, where topology changes are common (for instance, due ...
Friedman, Roy   +4 more
openaire   +3 more sources

InterMR: Inter-MANET routing in heterogeneous MANETs

The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010), 2010
The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of communications and operations often requires that these heterogeneous MANETs to be interoperable. Nonetheless, the existing interconnection protocols designed for the Internet
Kang-Won Lee   +5 more
openaire   +2 more sources

PIM-MANET: Extension to PIM for multicast routing in MANETs

MILCOM 2015 - 2015 IEEE Military Communications Conference, 2015
This paper presents a novel multicast routing protocol for wireless mobile ad hoc networks (MANETs) that uses distribution trees to efficiently forward multicast traffic. The proposed multicast routing protocol is built as a MANET extension to the popular Protocol Independent Multicast (PIM) routing protocol used in wired networks; hence, we call our ...
Rahul Amin, Greg Kuperman
openaire   +2 more sources

Divisions of Manet

Philosophy Today, 2007
Throughout Foucault's work references to Manet surface and resurface, sometimes more or less obscure, but always in the context of the dawn of modernity, that point in history in which the objects and discourses that we are today so familiar with first came into existence.
openaire   +2 more sources

Manet, Guéroult and Chrysippos

The Art Bulletin, 1964
him unique among his Italian contemporaries of comparable or greater fame, yet he did belong with them, and perhaps even set an example for them, by virtue of his pointedly fine technique and his essays in what might be called "la maniera grande alla maniera piccolissima." To Lomazzo's saying in so a y words that Clovio raised the art of miniature to ...
openaire   +2 more sources

Reactive clustering in MANETs

International Journal of Pervasive Computing and Communications, 2006
Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far (1), all these protocols are proactive, thus wasting bandwidth when their function is not currently needed. To reduce the signalling traffic load, reactive clustering may be employed.We have developed a clustering protocol ...
Cramer, Curt   +3 more
openaire   +3 more sources

Testbed on MANET (ToM): Private Testbed Facility for MANET Experiment

2020
This article aims to share how to create a minimum MANET testbed facility as a requirement for evaluation of MANET research. Testbed facility that we have developed is called as Testbed on MANET or abbreviation ToM. We chose to use single board computer (SBC) to represent mobile devices in MANET.
Muchtar, Farkhana   +6 more
openaire   +3 more sources

Survival multipath routing for MANETs

NOMS 2008 - 2008 IEEE Network Operations and Management Symposium, 2008
Many efforts have been made to develop security solutions for MANETs. These networks are vulnerable to diverse types of attacks, where routing is a critical operation. Current secure routing protocols are based on preventive or reactive security mechanisms, monitoring node behavior or controlling the access to networks and information. These mechanisms
Nogueira Lima, Michèle   +3 more
openaire   +3 more sources

Requirements for survivable routing in MANETs

2008 3rd International Symposium on Wireless Pervasive Computing, 2008
MANETs are highly vulnerable to attacks due to their characteristics such as the lack of infrastructure and wireless communication. Considerable improvements have been made towards providing ad hoc network security and existent solutions apply cryptography, intrusion detection systems or reputation systems. However, these conventional defense lines are
Nogueira Lima, Michèle   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy