Mobile Ad Hoc Networks Applications Part 6 potx

Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks potx

Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks potx

... http://icawww.epfl.ch/Publications/Buttyan/ButtyanH00.ps [6] L. Buttyan and J. P. Hubaux, “Stimulating cooperation in self-organizing mobile ad hoc networks, ” ACM Journal for Mobile Networks (MONET), special issue on Mobile Ad Hoc Networks, ... recent years, mobile ad hoc networks have received much attention due to their potential applications and the proliferati...
Ngày tải lên : 15/03/2014, 04:20
  • 11
  • 916
  • 0
Efficient core selection for multicast routing in mobile ad hoc networks

Efficient core selection for multicast routing in mobile ad hoc networks

... core migrating algorithms for mobile ad hoc networks has been presented and debated. Because of the unrestricted node movements, the topologies of the mobile ad hoc networks are always under changing. ... discovery mechanism. In mobile ad hoc networks, node movement results in failure of the old links and network topology of new connections. A new CBT protocol for mo...
Ngày tải lên : 23/11/2012, 15:03
  • 62
  • 341
  • 0
Advanced Radio Frequency Identification Design and Applications Part 6 potx

Advanced Radio Frequency Identification Design and Applications Part 6 potx

... simulated radiation characteristics are in good agreement. The E θ component corresponds to the radiation from the electric current Advanced Radio Frequency Identification Design and Applications ... 0.0790 0.2378 0 .63 80 0.9548 -4.7911 N = 5 H = 0.02λ Sim. 0.2537 0.5 862 0.8399 -5.1988 Eq. 0.0790 0. 065 6 0.8008 0.9453 -8.1554 N = 15 H = 0.02λ Sim. 0.1987 0.7988 0.9975 -7.0 067...
Ngày tải lên : 19/06/2014, 23:20
  • 20
  • 357
  • 0
Security in Ad Hoc Networks potx

Security in Ad Hoc Networks potx

... requirement for nodes in ad hoc networks, in ad hoc networks there may exist static and wired nodes, which may make use of services offered by fixed infrastructure. Ad hoc networks may be very different ... Protecting Ad Hoc Networks 3.1 Physical Security In ad hoc networks especially mobile nodes are typically significantly more susceptible to physical attacks th...
Ngày tải lên : 22/03/2014, 15:21
  • 16
  • 453
  • 0

Xem thêm

Từ khóa: