Results 31 to 40 of about 1,790,881 (270)

Specification-based Intrusion Detection Method for Greedy Perimeter Stateless Routing [PDF]

open access: yesJisuanji gongcheng, 2017
Aimming at the problem that Greedy Perimeter Stateless Routing(GPSR) protocol is widely applied in Mobile Ad Hoc Network(MANET) and there is no proper intrusion detection technology for it,based on the analysis of intrusion detection technology for MANET,
XU Fu
doaj   +1 more source

A stateless approach to connection-oriented protocols [PDF]

open access: yesACM Transactions on Computer Systems, 2008
Traditional operating system interfaces and network protocol implementations force some system state to be kept on both sides of a connection. This state ties the connection to its endpoints, impedes transparent failover, permits denial-of-service attacks, and limits scalability.
Alan Shieh   +2 more
openaire   +1 more source

GPSR Protocol Based on Neighbor Node Screening in Unmanned Aerial Vehicle Ad Hoc Network [PDF]

open access: yesJisuanji gongcheng, 2019
In the Unmanned Aerial Vehicle Ad Hoc Network(UANET),a Greedy Perimeter Stateless Routing based on Neighbor Node Screening(GPSR-NS) protocol is proposed to solve the problems of inaccurate neighbor node location and low data forwarding efficiency in GPSR
LIANG Qing, SHANGGUAN Yiwei, ZHANG Wenfei, XIONG Wei
doaj   +1 more source

Efficient coverage greedy packet stateless routing in wireless sensor networks

open access: yesMeasurement + Control, 2020
Wireless sensor network is a collection of sensor nodes designed with different routing capabilities to operate on real-world applications. In extreme environments, real-time applications of wireless sensor network ensure exchange of data, a difficult ...
M Sivaram   +6 more
doaj   +1 more source

Algorithms and protocols for stateless constrained-based routing [PDF]

open access: yesComputer Communications, 2003
Quality of service (QoS) routing has generally been addressed in the context of reservation-based network services (e.g. ATM, IntServ), which require explicit (out of band) signaling of reservation requests and maintenance of per-flow state information. It has been recognized that the processing of per-flow state information poses scalability problems,
Baoxian Zhang, Marwan Krunz
openaire   +1 more source

A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management

open access: yesTransport and Telecommunication, 2022
The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively.
Punia Divya, Kumar Rajender
doaj   +1 more source

GPSR Improvement Protocol Based on Road Network and QoS Model [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the problems of traditional Greedy Perimeter Stateless Routing(GPSR) protocol,such as low link quality,high effects of delivery rate,and poor adaptability of low node density under urban traffic conditions,an LRGR routing protocol is proposed ...
GAO Tianxiang,SHI Ying,LIU Ziwei,WU Longchang
doaj   +1 more source

Legal analysis of status of women’s nationality and statelessness In point of view human rights [PDF]

open access: yesمطالعات زن و خانواده, 2017
The international human rights law on nationality and statelessness has developed through the adoption of a number of international and regional instruments during the twentieth century.
latifeh hosseini
doaj   +1 more source

Speed Up-Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks (SU-GPSR)

open access: closedInternational Conference on High Performance Switching and Routing, 2017
Yan Sun, Junpeng Guo, Yuhui Yao
openalex   +2 more sources

Family Socialization and Experiences of Early Childhood Programs in the Rohingya Camps: Study Protocol

open access: yesInternational Journal of Qualitative Methods, 2022
Objective of Protocol: The primary objective of this protocol is to record the process of conceptualizing a semi-structured interview protocol, training enumerators on the protocol, collecting data, translating findings into English, and analyzing data ...
Yeshim Iqbal   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy