Results 51 to 60 of about 95,945 (104)
Some of the next articles are maybe not open access.
2021
The proliferation of communication devices and networks is the result of the exponential development of wireless components for computing devices. This development allowed the diffusion of services and new alternatives for users to interact with new technologies, with each other, and with the development of social networks and applications to stream ...
Diego Alexis Romero Rincón+5 more
openaire +2 more sources
The proliferation of communication devices and networks is the result of the exponential development of wireless components for computing devices. This development allowed the diffusion of services and new alternatives for users to interact with new technologies, with each other, and with the development of social networks and applications to stream ...
Diego Alexis Romero Rincón+5 more
openaire +2 more sources
On network coding in wireless ad-hoc networks
International Journal of Ad Hoc and Ubiquitous Computing, 2005Network coding has been proven to be an effective way to achieve the maximum flow capacity in a multicast network, which is bounded by the famous maximum-flow minimum-cut theorem. This technique is specially fit for some new types of network, e.g., ad-hoc, sensor network etc.
Jingyao Zhang, Pingyi Fan
openaire +3 more sources
Priority Scheduling in Wireless Ad Hoc Networks
Wireless Networks, 2002Ad hoc networks formed without the aid of any established infrastructure are typically multi-hop networks. Location dependent contention and hidden terminal problem make priority scheduling in multi-hop networks significantly different from that in wireless LANs.
Xue Yang, Nitin H. Vaidya
openaire +3 more sources
Routing and scheduling in wireless ad hoc networks
2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2009Computing capacity bounds of ad hoc networks, as well as optimizing radio resource allocation in order to approach those bounds is a hard task that have recently attracted the interest of the research community. In this paper we address the problem of jointly optimizing the routing of flows, the transmission scheduling over wireless links along the ...
A. Capone+3 more
openaire +4 more sources
Security in wireless ad-hoc networks – A survey
Computer Communications, 2014Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there
Di Pietro R+3 more
openaire +2 more sources
2004
A Lifetime-Optimizing Approach to Routing Messages in Ad-hoc Networks.- Improving TCP Performance in Mobile Ad hoc Networks.- Energy Efficient Approaches in Wireless Networking.- Position Based Routing Algorithms For Ad Hoc Networks: A Taxonomy.- Location Discovery in Ad-hoc Wireless Sensor Networks.- Ad Hoc Wireless Networks: From Theory to Protocols.-
Xiao H. Huang+2 more
openaire +2 more sources
A Lifetime-Optimizing Approach to Routing Messages in Ad-hoc Networks.- Improving TCP Performance in Mobile Ad hoc Networks.- Energy Efficient Approaches in Wireless Networking.- Position Based Routing Algorithms For Ad Hoc Networks: A Taxonomy.- Location Discovery in Ad-hoc Wireless Sensor Networks.- Ad Hoc Wireless Networks: From Theory to Protocols.-
Xiao H. Huang+2 more
openaire +2 more sources
Growth of wireless ad hoc networks
GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), 2004The utility of a node in an energy-limited wireless ad hoc network is defined as a positive linear function of the number of bits that the node sends as a source and the number of bits that it receives as a destination. First, we show that under the one-to-one traffic model in which every node wants to send traffic to a randomly chosen destination node,
Teresa H. Meng, Volkan Rodoplu
openaire +2 more sources
Routing in wireless ad hoc networks
International Journal of Internet Protocol Technology, 2012A routing strategy that finds a path to be followed by packets from a source node to a destination node used in traditional wired networks cannot be directly applied in ad hoc wireless networks due to their highly dynamic topology, absence of established infrastructure for centralised administration, bandwidth constrained wireless links, and energy ...
Vinay Rishiwal, Mano Yadav
openaire +2 more sources
Security in Wireless Ad Hoc Networks [PDF]
Operating in open and shared media, wireless communication is inherently less secure than wired communication. Even worse, mobile wireless devices usually have limited resources, such as bandwidth, storage space, processing capability, and energy, which makes security enforcement hard.
Klara Nahrstedt, Wenbo He, Ying Huang
openaire +1 more source
2005
Mobile ad hoc networks represent a new form of communication consisting of mobile wireless terminals (e.g., handset, PDAs, notebooks). These type of networks are wireless multi-hop packet networks without any fixed infrastructure and centralized administration, in contrast to today’s wireless communications, which is based on a fixed, pre-established ...
openaire +2 more sources
Mobile ad hoc networks represent a new form of communication consisting of mobile wireless terminals (e.g., handset, PDAs, notebooks). These type of networks are wireless multi-hop packet networks without any fixed infrastructure and centralized administration, in contrast to today’s wireless communications, which is based on a fixed, pre-established ...
openaire +2 more sources