localized ad hoc routes for scalability

Báo cáo hóa học: " Research Article Scalable Ad Hoc Networks for Arbitrary-Cast: Practical Broadcast-Relay Transmission Strategy Leveraging Physical-Layer Network Coding" pot

Báo cáo hóa học: " Research Article Scalable Ad Hoc Networks for Arbitrary-Cast: Practical Broadcast-Relay Transmission Strategy Leveraging Physical-Layer Network Coding" pot

Ngày tải lên : 21/06/2014, 22:20
... 10 Fram es b 0 Distance 10 n (a) Traditional rectangular broadcast (b) Traditional hexagonal broadcast (c) Traditional unicast (d) PNC unicast, multicast, broadcast Figure 14: The comparison of ... 2b − time slots for our transmission strategy and n + 3b − time slots for the traditional strategy Therefore, for an arbitrary-cast case, including unicast, multicast, and broadcast, in a full ... sending information) (3) for the sending nodes, each of them will send information to their four neighbors, (4) for receiving node (i, j), if |i| + | j | < s, it will receive four additive signals...
  • 15
  • 114
  • 0
Efficient core selection for multicast routing in mobile ad hoc networks

Efficient core selection for multicast routing in mobile ad hoc networks

Ngày tải lên : 23/11/2012, 15:03
... acquire in mobile ad hoc networks There are many proposed protocol for multicast routing in mobile ad hoc networks, such as PUMA, ODMRP or MAODV In those protocols, PUMA (Protocol for unified multicasting ... of a core is significant for the effectiveness in performance of PUMA Frequent rate of core changes, in addition to leading to overload of control message, would also lead to a dramatic rise in ... environment The motivation for this work comes from the challenges of mobile ad hoc networks to support reliable and efficient communication for distributed computing Mobile Ad Hoc networks present...
  • 62
  • 341
  • 0
Tài liệu Báo cáo khoa học: "Improving the Scalability of Semi-Markov Conditional Random Fields for Named Entity Recognition" pdf

Tài liệu Báo cáo khoa học: "Improving the Scalability of Semi-Markov Conditional Random Fields for Named Entity Recognition" pdf

Ngày tải lên : 20/02/2014, 12:20
... structure for propagating non-local information in advance In a recent study by Finkel et al., (2005), nonlocal information is encoded using an independence model, and the inference is performed ... the (non-adjacent) information about “Sp1” being “protein” to classify “CP1” as “protein” On the other hand, information about adjacent labels does not necessarily provide useful information ... abstracts, and the former was used as the training data and the latter as the development data For semi-CRFs, we used amis3 for training the semiCRF with feature-forest We used GENIA taggar4 for POS-tagging...
  • 8
  • 527
  • 0
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks potx

Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks potx

Ngày tải lên : 15/03/2014, 04:20
... http://gunpowder.stanford.edu/˜laik/projects/adhoc/mitigating.pdf [5] L Buttyan and J P Hubaux, “Enforcing service availability in mobile ad- hoc WANs,” in IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, ... We thank Joan Feigenbaum for many valuable suggestions Message success rate 0.8 R EFERENCES 0.6 [1] C Perkins, Ad Hoc Networking Addison-Wesley, 2000 [2] C.-K Toh, Ad Hoc Mobile Wireless Networks: ... increased overhead is the digital signature for message authentication For RSA with a modulus of 1024 bits, the authentication header is about 128 bytes; for ECNR GF(p) with 168 bits, the header is about...
  • 11
  • 916
  • 0
Báo cáo khoa học: ThermoFAD, a ThermofluorÒ-adapted flavin ad hoc detection system for protein folding and ligand binding pdf

Báo cáo khoa học: ThermoFAD, a ThermofluorÒ-adapted flavin ad hoc detection system for protein folding and ligand binding pdf

Ngày tải lên : 23/03/2014, 04:21
... named this modified ThermofluorÒ approach ‘ThermoFAD’ (ThermofluorÒ-adapted flavin ad hoc detection system) Results The ThermoFAD technique A ThermoFAD analysis requires only 20 lL of protein sample, ... ª 2009 FEBS 2835 A ThermofluorÒ-adapted flavin ad hoc detection system F Forneris et al Table Comparison of unfolding temperature using ThermofluorÒ and ThermoFAD for various flavoproteins ND, not ... higher affinity to FMO compared to NADP:3-acetylpiridine ADP, thioNADP and nicotinic acid ADP These compounds were then tested as FMO crystallisation additives, leading to high-quality crystals,...
  • 8
  • 464
  • 0
security for wireless ad hoc networks

security for wireless ad hoc networks

Ngày tải lên : 25/03/2014, 12:07
... SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros Mouchtaris SECURITY FOR WIRELESS AD HOC NETWORKS SECURITY FOR WIRELESS AD HOC NETWORKS Farooq Anjum and Petros ... Proactive vs Reactive Routing 70 Ad Hoc On-Demand Distance Vector 72 4.2.1 Secure AODV 73 4.2.2 Authenticated Routing for Ad Hoc Networks (ARAN) 77 4.2.3 Security-Aware Ad Hoc Routing 79 Dynamic Source ... system administration, and physical security Without adequate security, enterprises will shy away from the use of wireless ad hoc networks, governmental agencies will ban the use of wireless ad hoc...
  • 266
  • 325
  • 0
Báo cáo toán học: " Probabilistic framework for opportunistic spectrum management in cognitive ad hoc networks" potx

Báo cáo toán học: " Probabilistic framework for opportunistic spectrum management in cognitive ad hoc networks" potx

Ngày tải lên : 20/06/2014, 21:20
... Radio An Integrated Agent Architecture for Software Defined Radio Ph.D dissertation (KTH Royal Institute of Technology, 2000) IF Akyildiz, W-Y Lee, KR Chowdhury, Crahns: cognitive radio ad hoc ... used for any sort of inter-flow coordination Rate-adaptive probabilistic approach for opportunistic spectrum access In this section, we propose the rate-adaptive probabilistic (RAP) framework for ... Crahns: cognitive radio ad hoc networks Ad Hoc Netw Elsevier 7(5), 810–836 (2009) doi:10.1016/j adhoc.2009.01.001 HB Salameh, M Krunz, Channel access protocols for multihop opportunistic networks:...
  • 15
  • 404
  • 0
Báo cáo hóa học: " Probabilistic framework for opportunistic spectrum management in cognitive ad hoc networks" pdf

Báo cáo hóa học: " Probabilistic framework for opportunistic spectrum management in cognitive ad hoc networks" pdf

Ngày tải lên : 20/06/2014, 22:20
... Radio An Integrated Agent Architecture for Software Defined Radio Ph.D dissertation (KTH Royal Institute of Technology, 2000) IF Akyildiz, W-Y Lee, KR Chowdhury, Crahns: cognitive radio ad hoc ... used for any sort of inter-flow coordination Rate-adaptive probabilistic approach for opportunistic spectrum access In this section, we propose the rate-adaptive probabilistic (RAP) framework for ... Crahns: cognitive radio ad hoc networks Ad Hoc Netw Elsevier 7(5), 810–836 (2009) doi:10.1016/j adhoc.2009.01.001 HB Salameh, M Krunz, Channel access protocols for multihop opportunistic networks:...
  • 15
  • 335
  • 0
Báo cáo hóa học: " A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks" pot

Báo cáo hóa học: " A fast iterative localized re-authentication protocol for UMTS-WLAN heterogeneous mobile communication networks" pot

Ngày tải lên : 20/06/2014, 22:20
... session loads and processing loads in the RADIUS server to APs In addition, the iterative process is designed to enable the execution of localized re-authentication process iteratively and for completing ... (2) a huge amount of processing loads are concentrated on the HAAA/RADIUS server, and (3) both re-authentication session loads and processing loads in the HAAA/RADIUS server are increased due to ... requests not only made a great impact on the authentication session loads and processing loads in the RADIUS and HLR/HSS, but these 4.2 Bandwidth cost To validate the best performance in bandwidth...
  • 16
  • 398
  • 0
Báo cáo hóa học: " Clustering and OFDMA-based MAC protocol (COMAC) for vehicular ad hoc networks" pot

Báo cáo hóa học: " Clustering and OFDMA-based MAC protocol (COMAC) for vehicular ad hoc networks" pot

Ngày tải lên : 20/06/2014, 22:20
... field Type has four values: is for cluster member’s status message; is for cluster head’s first message; is for cluster head’s invitation message; is for cluster head’s last message The vehicle ... Ma, Performance analysis of broadcast messages in VANETs safety applications Proc IEEE Globecommun Conf, 1–5 (2010) X Ma, X Chen, Performance analysis of IEEE 802.11 broadcast scheme in ad hoc wireless ... Krishnan, T Talty, Performance evaluation of safety applications over DSRC vehicular ad hoc networks ACM-Veh Ad hoc Netw 1, 1–9 (2004) F Yu, S Biswas, A self reorganizing MAC protocol for inter-vehicle...
  • 16
  • 362
  • 0
Báo cáo hóa học: " Coherence time-based cooperative MAC protocol 1 for wireless ad hoc networks" doc

Báo cáo hóa học: " Coherence time-based cooperative MAC protocol 1 for wireless ad hoc networks" doc

Ngày tải lên : 21/06/2014, 03:20
... duration information from the RTS, CTS packets, and from MAC layer headers which are transmitted at Mbps Two points are worth mentioning when ad hoc network operates under heavy load and fast fading ... throughput performance is compared for increasing number of source nodes in the ad hoc network All the nodes are randomly placed in a radius of 200 m Concurrent transmissions always lead to collisions ... or indirect path for packet transmission based on updated table Korakis et al [6] extended CoopMACI for ad hoc network environment It is very similar to CoopMACI approach, but adds some minor...
  • 12
  • 279
  • 0
Báo cáo hóa học: " Research Article Multiobjective Reinforcement Learning for Traffic Signal Control Using Vehicular Ad Hoc Network" docx

Báo cáo hóa học: " Research Article Multiobjective Reinforcement Learning for Traffic Signal Control Using Vehicular Ad Hoc Network" docx

Ngày tải lên : 21/06/2014, 08:20
... Section Traffic Information Exchange System Using Vehicular Ad Hoc Network We need to exchange a lot of information during the signal control process Thus, a wireless traffic information exchange ... model the road network with an agentbased structure; Section describes how to exchange traffic data using the ad hoc network; in Section 4, a multiagent traffic control strategy using reinforcement ... des] for short) to denote the state of each vehicle [13] Vehicles follow the shortest path through the road network to their destinations As mentioned before, a multiobjective control scheme is adopted...
  • 7
  • 320
  • 0
Báo cáo hóa học: " Research Article Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks" doc

Báo cáo hóa học: " Research Article Efficient Key Agreements in Dynamic Multicast Height Balanced Tree for Secure Multicast Communications in Ad Hoc Networks" doc

Ngày tải lên : 21/06/2014, 11:20
... 1) (4, 1) (m − 1, 1) (m, 1) Figure 11: The mobile ad hoc networks model For clarity, an example is presented for explanatory purposes Let the ad hoc networks be represented by a × model, while ... schemes outperform GDH and DH ones This advantage is owing to that each cluster head is responsible for its cluster member key controller Therefore, each pair of the cluster heads must only exchange ... multiplications when performing ECDH, thus reducing the CPU overhead significantly Therefore, the proposed scheme is highly promising for dynamic key operations in large-scale ad hoc networks This study...
  • 15
  • 324
  • 0
Báo cáo hóa học: " Research Article Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation" doc

Báo cáo hóa học: " Research Article Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation" doc

Ngày tải lên : 21/06/2014, 11:20
... Traffic-related information is denoted as INFO, and its signature is created using ECDSA is (r, t) The vehicle forms a message as shown in (14) to broadcast the information Included are the information, ... verify a certificate before the use of a public key for signature verification It takes PM for certificate verification and PM for message verification, resulting in a total of PM for signature verification ... the proposed protocol drop messages for a smaller number of vehicles; for example, 190 vehicles for ECPP and 100 vehicles for the proposed protocol However, as for GSIS and BLS, which dispense with...
  • 15
  • 385
  • 0
Báo cáo hóa học: " Research Article A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking" pdf

Báo cáo hóa học: " Research Article A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking" pdf

Ngày tải lên : 21/06/2014, 11:20
... eight 3-d cubes, their leaders should perform a 3-d aggressive cube algorithm In this case, the leading nodes can use the first two digits of their addressees as a 2-d address for the 2-d aggressive ... key exchange is performed These pairwise operations are performed in parallel during every round For example, during the ith round of the protocol a node with address a performs a two party Diffie-Hellman ... establish an ad hoc non infrastructural network During the first step, each entity is assigned to a vertex in the hypercube, and it is given a unique d-bit address The deployment of the address arrangement...
  • 17
  • 382
  • 0
Báo cáo hóa học: " Research Article Efficient Public Key Certificate Management for Mobile Ad Hoc Networks" potx

Báo cáo hóa học: " Research Article Efficient Public Key Certificate Management for Mobile Ad Hoc Networks" potx

Ngày tải lên : 21/06/2014, 11:20
... revocation scheme for mobile ad hoc networks,” Ad Hoc Networks, vol 6, no 1, pp 17–31, 2008 [25] T Moore, J Clulow, S Nagaraja, and R Anderson, “New strategies for revocation in ad- hoc networks,” ... multipoint relay (mpr) extension for ad hoc networks,” IETF Request for Comments: 5449, February [9] B Mans and N Shrestha, “Performance evaluation of approximation algorithms for multipoint relay selection,” ... management scheme for mobile ad hoc networks: an analysis,” EURASIP Journal on Wireless Communications and Networking, vol 2005, no 4, pp 579– 589, 2005 [14] L Zhou and Z J Haas, “Securing ad hoc networks,”...
  • 10
  • 319
  • 0
Báo cáo hóa học: "Research Article A Random Ant-Like Unicast Routing Protocol for Wireless Ad Hoc Sensor Networks and Performance Evaluation" pdf

Báo cáo hóa học: "Research Article A Random Ant-Like Unicast Routing Protocol for Wireless Ad Hoc Sensor Networks and Performance Evaluation" pdf

Ngày tải lên : 21/06/2014, 17:20
... necessary for nodes to conduct route discovery operations to look for routes that lead to desired destinations This can happen in one of the following cases: (1) a source node needs to find a path for ... outperforms in most of the simulations With higher traffic load, RAUR has shown more tolerance to the increase of network traffic load, it is scalable as the routing load change is small and gradual ... in ad hoc wireless networks,” in Mobile Computing, T Imielinski and H F Korth, Eds., chapter 5, Kluwer Academic Publishers, Dodrecht, The Netherlands, 1996 [4] C E Perkins and E M Royer, Ad hoc...
  • 7
  • 441
  • 0
Báo cáo hóa học: " Research Article Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks" pot

Báo cáo hóa học: " Research Article Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks" pot

Ngày tải lên : 21/06/2014, 22:20
... DCF is relevant to ad hoc operation The DCF specifies that a node needs to sense the medium before transmitting If the medium is idle, the node waits for a random deferral time before transmitting ... suffers from a degradation of the throughput, which is noticeable in mobile ad hoc scenarios After all, maintaining the NPT table with “fresh” data is not realistic in a mobile ad hoc environment ... Romaszko and C Blondia, “A MAC protocol for wireless ad hoc networks with power control,” in Proceedings of the International Workshop on Wireless Ad- hoc Networks (IWWAN ’05), no 54, London,...
  • 13
  • 437
  • 0
Báo cáo hóa học: " Research Article Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks'''' doc

Báo cáo hóa học: " Research Article Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks'''' doc

Ngày tải lên : 21/06/2014, 22:20
... Exponential Fade Duration We assume arbitrary distributions for both nonfade and fade durations As a special case, we consider fixed l for nonfade duration and exponentially distributed fade duration ... transmit, leading to even lower efficiency Hence, the exponential backoff of IEEE 802.11 is unsuitable for such ad hoc forwarding of packets, which is also shown in [36] Lastly, the fading channel leads ... than that of its IEEE 802.11 counterpart for all channel conditions As shown in [36], IEEE 802.11 backoff mechanism is unsuitable for ad hoc forwarding For example, during a transmission from node...
  • 17
  • 302
  • 0