Results 231 to 240 of about 236,756 (293)

Autonomous password generation and setting system with cosmic coding and transfer (COSMOCAT) and cosmic time calibrator (CTC). [PDF]

open access: yesSci Rep
Tanaka HKM   +9 more
europepmc   +1 more source

Wireless and Ad Hoc Networks

2021
The proliferation of communication devices and networks is the result of the exponential development of wireless components for computing devices. This development allowed the diffusion of services and new alternatives for users to interact with new technologies, with each other, and with the development of social networks and applications to stream ...
Diego Alexis Romero Rincón   +5 more
openaire   +2 more sources

On network coding in wireless ad-hoc networks

International Journal of Ad Hoc and Ubiquitous Computing, 2005
Network coding has been proven to be an effective way to achieve the maximum flow capacity in a multicast network, which is bounded by the famous maximum-flow minimum-cut theorem. This technique is specially fit for some new types of network, e.g., ad-hoc, sensor network etc.
Jingyao Zhang, Pingyi Fan
openaire   +3 more sources

Security in wireless ad hoc network

International Journal of Internet Protocol Technology, 2017
The mobile ad hoc network is open medium, easy to deploy and free of the centralised control network. But these features of mobile ad hoc network come along with security attacks, such as black hole attack and grey hole attack. In black hole attack malicious node degrades security and performance of network.
Sachin D. Ubarhande   +2 more
openaire   +2 more sources

Priority Scheduling in Wireless Ad Hoc Networks

Wireless Networks, 2002
Ad hoc networks formed without the aid of any established infrastructure are typically multi-hop networks. Location dependent contention and hidden terminal problem make priority scheduling in multi-hop networks significantly different from that in wireless LANs.
Xue Yang, Nitin H. Vaidya
openaire   +3 more sources

Routing and scheduling in wireless ad hoc networks

2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2009
Computing capacity bounds of ad hoc networks, as well as optimizing radio resource allocation in order to approach those bounds is a hard task that have recently attracted the interest of the research community. In this paper we address the problem of jointly optimizing the routing of flows, the transmission scheduling over wireless links along the ...
A. Capone   +3 more
openaire   +4 more sources

Security in wireless ad-hoc networks – A survey

Computer Communications, 2014
Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there
Di Pietro R   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy