• No results found

ad-hoc environments

An Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments

An Approach for FIPA Agent Service Discovery in Mobile Ad Hoc Environments

... Mobile Ad Hoc Environments In addition to the approaches for mobile devices and slow mobile connections, men- tioned above, FIPA needs a solution for agents interoperating in Ubiquitous Comput- ing ...

8

A resource and qoS management framework for a real time event system in mobile ad hoc environments

A resource and qoS management framework for a real time event system in mobile ad hoc environments

... The CORTEX Project 1 is examining fundamental issues relating to the support of such applications, including the development of middleware for this domain. The CORTEX approach is based on anonymous and asynchronous event ...

8

Opportunistic service composition in dynamic ad hoc environments

Opportunistic service composition in dynamic ad hoc environments

... dynamic ad hoc environments such information is unlikely to be available because ser- vice providers are autonomous and not obliged to disclose their ...

179

Anomaly Detection for Wireless Ad-Hoc Routing Protocols

Anomaly Detection for Wireless Ad-Hoc Routing Protocols

... For example, the current MAC protocols for wireless ad-hoc networks are all vulnera- ble. Although there are many MAC protocols, the basic working principles are similar. In a contention-based method, each ...

69

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

... second ad-hoc network contains 6-nodes only as shown in figure 4, and also we got the same results, the number of packets lost was higher with DSDV routing protocol than AODV routing protocol, because in ...

6

PERFORMANCE ANALYSIS OF WLAN UNDER VARIABLE NUMBER OF NODES USING THE ADJUSTABLE 
PARAMETERS IN EDCA

PERFORMANCE ANALYSIS OF WLAN UNDER VARIABLE NUMBER OF NODES USING THE ADJUSTABLE PARAMETERS IN EDCA

... In [18] the authors proposed Improved Greedy Traffic-aware Routing Protocol (GyTAR). It is a new intersection-based geographical routing protocol capable of finding robust routes within city environments. It is ...

10

Routing in Multi-Hop Cognitive Radio Ad-Hoc Networks: A Review

Routing in Multi-Hop Cognitive Radio Ad-Hoc Networks: A Review

... radio ad hoc networks (CRAHNs) are classified and reviewed, and then challenges and open issues in multi- hop cognitive radio ad-hoc ...

8

Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols

Performance analysis of Black Hole Attack on Vanet’s Reactive Routing Protocols

... “A Survey of black hole attacks in Wireless Mobile Ad Hoc Networks ”, SPRINGER Human-centric Computing and Information Sciences, 2011, 22 Nov. 2011, pp. 1-16 . [3] Vimal Bibhu et al., “Performance Analysis ...

5

IMPROVING USER-PERCEIVED QOS IN MOBILE AND WIRELESS IP NETWORKS USING REAL-TIME ADAPTIVE MULTIMEDIA APPLICATIONS

IMPROVING USER-PERCEIVED QOS IN MOBILE AND WIRELESS IP NETWORKS USING REAL-TIME ADAPTIVE MULTIMEDIA APPLICATIONS

... mobile environments, in which network conditions may change abruptly and not always due to congestion –as it happens in fixed networks– but also to interference, mobility and so ...typical ad-hoc ...

5

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

... communication environments need to become more intelligent, robust, scalable and ...difficult environments and support for the integration of heterogeneous networks is ...

5

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

... In ad hoc network it does not depend on a pre-existing infrastructure, such as routers in wired networks or access points in managed wireless ...networks. Ad hoc network is a peer to peer ...

6

Ad hoc Cloud computing

Ad hoc Cloud computing

... the ad hoc server and are recorded in the Job Service ...of ad hoc host failures are monitored by the VM Service’s availability checker daemon which sets an ad hoc host to ...

6

Acknowledgment of Ad Hoc Reviewers

Acknowledgment of Ad Hoc Reviewers

... Openshaw Tanja Opriessnig Journal of Virology Downloaded from http://jvi.asm.org/ on November 7, 2019 by guest John Johnson Kyle L.. Johnson Christine Johnston Clare Jolly Clinton J.[r] ...

5

Ad Hoc Metacomputing with Compeer

Ad Hoc Metacomputing with Compeer

... To deploy Compeer it is sufficient to supply each peer with a list of IP/name pairs it can use to find other peers. These can be supplied as a file when each Compeer is executed, or placed on a web page where they can be ...

16

Ad Hoc Treebank Structures

Ad Hoc Treebank Structures

... Positive evidence that a rule is legitimate is ob- tained by looking at similar classes in step #3, and then rules with the lowest scores are flagged as po- tentially ad hoc (see section 4.1). To determine ...

9

Collaborative Ad hoc Applications

Collaborative Ad hoc Applications

... The users of the JINI system contact the lookup service and download the service they require. All communication with the JINI architecture uses Java Remote Method Invocation (RMI), this allows data and code to be ...

71

Ad hoc Internet Connectivity

Ad hoc Internet Connectivity

... ëÔñïrñ-ð Àñ-ë!°ë [û;ëíõ ëÔñézïrôöôöìGî‘ëð‚þ;ìréCêïrû-û-íìïrüÅê-ëóé]ìUAí -ñÓècì5ípïáû;ëí]õöì*ðìrèé]õ é]ê-ëõöízû;ëíècì5íA Zïrñ-üë!éCëó]é]ëðïrÿïrõöñ-ó]é–üÅê-ïrñ-ÿ5õöñ-ÿüÔïrôöôûEïkéé]ëÔ[r] ...

22

Acknowledgment of Ad Hoc Reviewers

Acknowledgment of Ad Hoc Reviewers

... Hiscott, John Hislop, Andrew Hjelle, Brian jvi.asm.org 13089 Downloaded from http://jvi.asm.org/ on November 7, 2019 by guest Chisari, Francis V.. Chodosh, James Chun, Tae-Wook Cicin-Sai[r] ...

5

Acknowledgment of Ad Hoc Reviewers

Acknowledgment of Ad Hoc Reviewers

... Staeheli, Peter Stambas, John Stamminger, Thomas Stanton, Richard James Stapleton, Jack T.. Steitz, Joan Stenglein, Mark D.[r] ...

5

Acknowledgment of Ad Hoc Reviewers

Acknowledgment of Ad Hoc Reviewers

... 12234 jvi.asm.org Journal of Virology December 2015 Volume 89 Number 24 Downloaded from http://jvi.asm.org/ on November 7, 2019 by guest Abravanel, Florence Ackermann, Mathias Admon, Ari[r] ...

7

Show all 10000 documents...

Related subjects