Academic literature on the topic 'Ad-hoc network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ad-hoc network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ad-hoc network"

1

P R, Shinde, and Sutar A J. "Bluetooth Ad hoc Network." IARJSET 4, no. 4 (January 27, 2017): 125–27. http://dx.doi.org/10.17148/iarjset/nciarcse.2017.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumari, Seema, and Dr M. U. Kharat. "Delay analysis of multihop wireless ad hoc network using queuing network model." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 4 (August 15, 2013): 1503–9. http://dx.doi.org/10.24297/ijct.v10i4.3250.

Full text
Abstract:
Ad hoc wireless network is a self configurable infrastructure less network. The lack of infrastructure support in ad hoc networks makes them useful in various applications such as at the disaster site, highway, vast forest, battle field, oceans, etc. Since there is no centralized control in ad hoc network, each node can act as a source, a destination or a router. Ad hoc wireless networks therefore, experience congestion more than the wired networks, leading to jitter and high end to end delays even for moderate traffic which may lead to performance degradation. So it is crucial to analyze the factors which affect the capacity and end-to-end delay in wireless ad-hoc networks. In this paper a G/G/1queuing network model is proposed togain insights into the end-to-end delay in a multi hop wireless ad hoc networks. Queuing network model is unique as it providesclosed form expressions for average end-to-end delay in multihop wireless ad hoc networks. NS2 simulation is conducted in order to verify and compare the theoretical results.
APA, Harvard, Vancouver, ISO, and other styles
3

.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.

Full text
Abstract:
A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Ragab, Ahmed Refaat Sobhy Ahmed. "A New Classification for Ad-Hoc Network." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 14 (August 28, 2020): 214. http://dx.doi.org/10.3991/ijim.v14i14.14871.

Full text
Abstract:
<span>This paper focus on developing a new practical classification for ad-hoc networks, were all the past classifications revolve upon three main categories respectively, mobile ad- hoc network (MANET), Vehicle ad-hoc network (VANET) and Flying ad-hoc network (FANET). My new classification will illustrate Underwater vehicle ad-hoc network (UWVANET) as the fourth category in ad-hoc main classification, showing the powerful and the weakness of each category defined.</span>
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Hai Yan, Jun Qiang Yang, and Hui Li. "Research for Network Security Mechanism of Ad Hoc Network." Advanced Materials Research 926-930 (May 2014): 2006–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2006.

Full text
Abstract:
Ad Hoc network is a special kind of mobile multi-hop wireless networks, which has been widely used various occasions. In this paper, the main characters of Ad Hoc network are presented. Meanwhile, based on the inherent defect and security threats of Ad Hoc network, the corresponding security mechanism and strategy are proposed.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaur, Manjit, Sahil Verma, and Kavita. "Flying Ad-Hoc Network (FANET): Challenges and Routing Protocols." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2575–81. http://dx.doi.org/10.1166/jctn.2020.8932.

Full text
Abstract:
Flying Ad-hoc Networks (FANET) play a vital part in military (defence), environment and civilian areas, for examples surveillance, traffic monitoring, search, rescue, weather monitoring, fire fighting, agriculture, videography, photography and delivery goods or product from one place to another place etc. Flying Ad-hoc Network is mainly ad-hoc network between unmanned air vehicles. There are several difficulties in flying ad-hoc network. The primary problem is in the communication between unmanned air vehicles. UAV are also known as Unmanned Aircraft Systems (UAS). The problem of Flying Ad-hoc Network is routing of multiple unmanned air vehicles. The reason behind is high speed which required highly dynamic routing protocols. The designing of routing protocol is a complicated for various parameters such as traffic monitoring, load balancing etc. Here, flying ad-hoc networks are described along with mobility models, features and routing protocols. This paper presented various routing protocols used to resolve these types of problems in Flying Ad-hoc Networks. Finally, some open research challenges in developing efficient routing protocols in the Flying Ad-hoc Networks are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
7

Ragab, Ahmed Refaat, and Pablo Flores. "Adapting Ad-hoc Routing Protocol for Unmanned Aerial Vehicle Systems." International Journal of Data Science 2, no. 1 (April 8, 2021): 1–8. http://dx.doi.org/10.18517/ijods.2.1.1-8.2021.

Full text
Abstract:
The field of the ad-hoc network and its routing protocols had attracted a lot of researchers for many years, due to the various usage of the ad-hoc networks in many fields and especially the field of Unmanned Aerial Vehicles (UAVs). Routing protocols in the ad-hoc network are the main focused problem, for their characteristics and role during the communication process of the ad-hoc networks, with its different types. In this paper, we are going to analyze and sheds the light on the performance of ad-hoc routing protocols, for both Flying ad-hoc network (FANET) and vehicle ad-hoc network (VANET) when applying three different ad-hoc routing protocols, respectively Reactive routing protocol, Proactive routing protocol, and Hybrid routing protocol, in order to shed light on the ambiguous misunderstanding of ad-hoc routing protocols functionality and to choose the best routing protocol to be used and adapted for UAVs.
APA, Harvard, Vancouver, ISO, and other styles
8

Wei, Zhiqing, Ziyu Wang, Xin Yuan, Huici Wu, and Zhiyong Feng. "Information density–based energy-limited capacity of ad hoc networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877324. http://dx.doi.org/10.1177/1550147718773242.

Full text
Abstract:
In this article, the inhomogeneous energy consumption is characterized by the concept of information density, which is defined as the number of bits per unit time passing through a specific region. With information density, it is possible to derive the energy consumption of each region and determine the energy configuration scheme to maximize the network lifetime. The information density of pure ad hoc network and hybrid ad hoc network is derived. It is discovered that the information density of pure ad hoc network is inhomogeneous and the information density of hybrid ad hoc network is homogeneous, except for the regions near the edge of the entire area. With information density, the energy-limited capacity of pure and hybrid ad hoc networks is derived. The information density introduced in this article provides more insights into the information transfer of ad hoc networks, which may be applied in the energy configuration of ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Nayana K, Nayana K., and Dr Sangeethaa Sukumaran. "Spontaneous Ad HoC Network Creation Using Distributed Dns." International Journal of Scientific Research 3, no. 5 (June 1, 2012): 207–9. http://dx.doi.org/10.15373/22778179/may2014/62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shin, Kwang-Sig, Joon-Dal Kwon, Young-Dong Lee, and Wan-Young Chung. "Ad-hoc home network system using wireless sensor network technology." Journal of Sensor Science and Technology 16, no. 2 (March 31, 2007): 142–49. http://dx.doi.org/10.5369/jsst.2007.16.2.142.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Ad-hoc network"

1

Suh, Kyungjoo. "CRYPTO-AD-HOC network an ad hoc network protocol embedded cryptography /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000164.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains x, 80 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
2

Han, Seon Yeong. "Shadowing effect on ad hoc network." Diss., Online access via UMI:, 2004. http://wwwlib.umi.com/dissertations/fullcit/1422359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mak, Wai Y. "Ad Hoc Network Architecture for Multi-Media Networks." Thesis, Monterey California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/2988.

Full text
Abstract:
The desire for more intelligence in the battlefield has given rise to the idea of routing video images over wireless sensor networks. This would apprise combat decision makers with actual images of battlefield developments and allow them to make sound decisions. To achieve this objective, the characteristics of video traffic must be studied and understood. This thesis focuses on evaluating the possibility of routing video images over a wireless sensor network. Video traffic is modeled and simulations are performed via the use of the Sun Small Programmable Object Technology (Sun SPOT) Java development kits configured in three different network topologies: the star topology, binary tree topology and chain topology. It is known that video traffic is self similar and can be obtained by aggregating a large number of On-Off message sources. Hence, an On-Off model using Pareto distribution function is used to model video traffic over the network. In this thesis four self-similar shaping parameters, i.e., alpha(On) = 1.2, 1.4, 1.7 and 1.9 are used in the simulations. The performance of each topology is evaluated based on parameters like mean throughput, mean interarrival time, mean packet drop, and mean delay.
Singapore Armed Forces author.
APA, Harvard, Vancouver, ISO, and other styles
4

ISHII, Yoji, Koichi ASAKURA, and Toyohide WATANABE. "Information Services with Ad-hoc Network." INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Graarud, Espen Grannes. "Implementing a Secure Ad Hoc Network." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14474.

Full text
Abstract:
In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication infrastructure, or accessto centralized administration. Additionally the established communication needsauthentication in order to handle access control so only trusted parties canpartake. A suitable medium for such communication is wireless ad hoc networks,but their flat structure make authentication a very challenging task.In this thesis a system design for an ad hoc routing protocol combined withaccess control is proposed, and implemented extending a popular routing protocolcalled BATMAN. The proposed authentication scheme relies on special public keycertificates called proxy certificates, and combined with a neighbor trustmechanism both authentication and access control are managed in a secure manner.Tests using mobile nodes running this implementation shows that the performanceof the proposed design is comparable to the original routing protocol (BATMAN)used, and that the authentication process is manageable even for mobile ad hocnetworks.
APA, Harvard, Vancouver, ISO, and other styles
6

Giang, Anh Tuan. "Capacity of vehicular Ad-hoc NETwork." Phd thesis, Université Paris Sud - Paris XI, 2014. http://tel.archives-ouvertes.fr/tel-00989836.

Full text
Abstract:
In recent years, Inter Vehicle Communication (IVC) has become an intensive research area, as part of Intelligent Transportation Systems. It supposes that all, or a subset of the vehicles is equipped with radio devices, enabling communication between them. IEEE 802.11p (standardized for vehicular communication) shows a great deal of promise. By using ad hoc mode, this radio technology allows vehicles to extend their scopes of communication and thus forming a Multi-hop wireless Ad-hoc NETwork, also called Vehicular Ad-hoc NETwork (VANET). This thesis addresses a fundamental problem of VANET: the network capacity. Two simple theoretical models to estimate this capacity have been proposed: a packing model and a Markovian point process model. They offer simple and closed formulae on the maximum number of simultaneous transmitters, and on the distribution of the distance between them. An accurate upper bound on the maximum capacity had been derived. An analytical formula on distribution of the transmitters had been presented. This distribution allows us to optimize Clear Channel Assessment (CCA) parameters that leads to an optimization of the network capacity.In order to validate the approach of this thesis, results from the analytical models are compared to simulations performed with the network simulator NS-3. Simulation parameters was estimated from real experimentation. Impact of different traffic distributions (traffic of vehicles) on the network capacity is also studied. This thesis also focuses on extended perception map applications, which use information from local and distant sensors to offer driving assistance (autonomous driving, collision warning, etc.). Extended perception requires a high bandwidth that might not be available in practice in classical IEEE 802.11p ad hoc networks. Therefore, this thesis proposes an adaptive power control algorithm optimized for this particular application. It shows through an analytical model and a large set of simulations that the network capacity is then significantly increased.
APA, Harvard, Vancouver, ISO, and other styles
7

Sundaresan, Karthikeyan. "Network Protocols for Ad-Hoc Networks with Smart Antennas." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14122.

Full text
Abstract:
Multi-hop wireless networks or ad-hoc networks face several limiting characteristics that make it difficult to support a multitude of applications. It is in this context that we find smart antennas to find significant applications in these networks, owing to their ability to alleviate most of these limitations. The focus of my research is thus to investigate the use of smart antennas in ad-hoc networks and hence efficiently design network protocols that best leverage their capabilities in communication. There are two parts to the proposed objective of designing efficient network protocols that pertain to the nature of the smart antenna network considered, namely, homogeneous and heterogeneous smart antenna networks. Unlike heterogeneous smart antenna networks, where different devices in the network employ different antenna technologies, homogeneous smart antenna networks consist of devices employing the same antenna technology. Further, in homogeneous smart antenna networks, different antenna technologies operating in different strategies tend to perform the best in different network architectures, conditions and application requirements. This motivates the need for developing a {em unified} framework for designing efficient communication (medium access control and routing) protocols for homogeneous smart antenna networks in general. With the objective of designing such a unified framework, we start by designing efficient MAC and routing protocols for the most sophisticated of the smart antenna technologies, namely multiple-input multiple-output (MIMO) links. The capabilities of MIMO links form a super-set of those possible with other antenna technologies. Hence, the insights gained from the design of communication protocols for MIMO links are then used to develop unified MAC and routing frameworks for smart antennas in general. For heterogeneous smart antenna networks, we develop theoretical performance bounds by studying the impact of increasing degree of heterogeneity on network throughput performance. Given that the antenna technologies are already unified in the network, unified solutions are not required. However, we do develop efficient MAC and routing protocols to best leverage the available heterogeneous capabilities present in the network. We also design efficient cooperation strategies that will further help the communication protocols in exploiting the available heterogeneous capabilities in the network to the best possible extent.
APA, Harvard, Vancouver, ISO, and other styles
8

Brännström, Robert. "Network-layer mobility in wireless ad hoc access networks." Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17093.

Full text
Abstract:
This thesis proposes and discusses solutions to enable network-layer mobility in wireless ad hoc access networks. The deployment of wireless access networks has made them ubiquitous and current research strives to make them pervasive. Users having wireless access to wired IP networks and the Internet are driving the demand for mobile and heterogeneous solutions. To enable all kinds of mobility in heterogeneous All-IP networks there are many issues to be solved. This thesis focuses on network-layer mobility and connectivity of wireless multi-hop ad hoc networks to the Internet. In a wireless environment with overlapping service areas, mobile hosts need to select which gateway(s) to use to access the wireless infrastructure. The signal-to-noise ratio of an access point, which is part of a wireless LAN, does not reflect the number of attached hosts or the traffic between them. The throughput of the access point could be low while the signal is strong. At the same time an access point with weaker signal could allow higher throughput. In ad hoc routing, hop count is the most common metric and the selection of a route to a gateway is affected by the same utilization problem. This could lead to a situation where a short route is used by more hosts and performing worse than a longer route serving fewer hosts. This thesis proposes and discusses solutions to calculating network-layer metrics and using them in gateway selection and handover decisions. To enable connectivity of a mobile ad hoc network (MANET) to the Internet, a gateway must support the wired single-hop and wireless multi-hop approaches. To deploy network-layer mobility in a MANET, the Mobile IP protocol needs to be adapted for the multi-hop environment. A MANET enables connectivity to more than one gateway at a time and combined with multihoming it provides seamless handover between subnets. The gateway selection and handover decisions are complicated by the multihoming capabilities. This thesis proposes and discusses solutions to deploying multihomed mobility into MANETs and thereby handling multi-hop gateway discovery, registration of multiple gateways and tunneling to selected gateway(s). Traffic patterns in wired LANs generally follow the 80/20 ratio of Internet destined vs. local traffic. The same traffic patterns generally hold true for wireless hosts. Therefore it is important to maintain the route to the gateway for the Internet destined traffic. This thesis proposes and discusses a solution to maintaining gateway connectivity in MANETs by installing routes to gateways using advertisements. Deciding the locality of a peer and setting up the forwarding route differs between single-hop and multi-hop networks. In single-hop networks a source matches the destination prefix with its own to decide what forwarding policy to use. Local traffic is sent directly to the destination with the link- layer protocol while global traffic is forwarded to a default gateway. In multi-hop networks the ad hoc routing protocol finds the route to a destination either proactively or on-demand. This thesis proposes and discusses a solution to deciding on the mobile host destination locality in a MANET.
Godkänd; 2005; 20060916 (ysko)
APA, Harvard, Vancouver, ISO, and other styles
9

Brännström, Robert. "Network-layer mobility in wireless ad hoc access networks/." Luleå : Luleå tekniska universitet, 2005. http://epubl.ltu.se/1402-1757/2005/68/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Ad-hoc network"

1

Cichoń, Jacek, Maciej Gȩbala, and Marek Klonowski, eds. Ad-hoc, Mobile, and Wireless Network. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39247-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chadha, Ritu, and Latha Kant. Policy-Driven Mobile Ad hoc Network Management. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2007. http://dx.doi.org/10.1002/9780470227718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Xiaodong, and Rongxing Lu, eds. Vehicular Ad Hoc Network Security and Privacy. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119082163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wireless sensor and ad hoc networks under diversified network scenarios. Boston, Mass: Artech House, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Security Management for Mobile Ad hoc Network of Networks (MANoN): Mobile Ad hoc Networks (MANET), Security Management, Security Architecture. Saarbrücken: VDM Verlag Dr. Müller, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Günes, M., D. G. Reina, J. M. Garcia Campos, and S. L. Toral. Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62740-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ji hui wang luo: Gao xiao shu ju fen fa ji shu = JIHUI WANGLUO : GAOXIAO SHUJU FENFA JISHU. Chengdu: Dian zi ke ji da xue chu ban she, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dhillon, Santpal Singh. Ant routing, searching and topology estimation algorithms for ad hoc netwoks. Amsterdam: IOS Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dhillon, Santpal Singh. Ant routing, searching and topology estimation algorithms for ad hoc netwoks. Amsterdam: IOS Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ding, Wei. Synergy of peer-to-peer networks and mobile ad-hoc networks: Boot strapping and routing. New York: Nova Science, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Ad-hoc network"

1

Amaxilatis, Dimitrios, Ioannis Chatzigiannakis, Shlomi Dolev, Christos Koninis, Apostolos Pyrgelis, and Paul G. Spirakis. "Adaptive Hierarchical Network Structures for Wireless Sensor Networks." In Ad Hoc Networks, 65–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29096-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cao Minh, Trang, Boris Bellalta, and Miquel Oliver. "DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks." In Ad Hoc Networks, 149–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36958-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shirazipourazad, Shahrzad, Arun Das, and Arunabha Sen. "On Delay Tolerant Airborne Network Design." In Ad Hoc Networks, 357–68. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-51204-4_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mariño, P., F. P. Fontán, M. A. Domínguez, and S. Otero. "Sensor Network in the Wireless UHF Band." In Ad Hoc Networks, 523–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garg, Kamini, Anna Förster, Daniele Puccinelli, and Silvia Giordano. "Towards Realistic and Credible Wireless Sensor Network Evaluation." In Ad Hoc Networks, 49–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29096-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Merlino, Giovanni, Dario Bruneo, Francesco Longo, Salvatore Distefano, and Antonio Puliafito. "Cloud-Based Network Virtualization: An IoT Use Case." In Ad Hoc Networks, 199–210. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25067-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wälchli, Markus, and Torsten Braun. "Building Intrusion Detection with a Wireless Sensor Network." In Ad Hoc Networks, 607–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Fan. "Vehicular Ad Hoc Network." In Encyclopedia of Wireless Networks, 1443–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Fan. "Vehicular Ad Hoc Network." In Encyclopedia of Wireless Networks, 1–5. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_308-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Araujo, Filipe, and Hugo Miranda. "Ad Hoc Routing." In Middleware for Network Eccentric and Mobile Applications, 63–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-89707-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ad-hoc network"

1

Maakar, Sunil Kr, Yudhvir Singh, and Rajeshwar Singh. "Flying Ad Hoc Network: A Newest Research Area for Ad Hoc Networks." In 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2019. http://dx.doi.org/10.1109/icct46177.2019.8969032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Enneya, N., K. Oudidi, and M. Elkoutbi. "Network Mobility in Ad hoc Networks." In 2008 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2008. http://dx.doi.org/10.1109/iccce.2008.4580751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yi, Seung, Jeff Meegan, and Jae H. Kim. "Network Autoconfiguration for Mobile Ad Hoc Networks." In MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ismail, Datuk Prof Ir Ishak, and Mohd Hairil Fitri Ja'afar. "Mobile ad hoc network overview." In 2007 Asia-Pacific Conference on Applied Electromagnetics (APACE). IEEE, 2007. http://dx.doi.org/10.1109/apace.2007.4603864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheong, Se-Hang, Kai-Ip Lee, Yain-Whar Si, and Leong Hou U. "Lifeline: Emergency Ad Hoc Network." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa, and Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks." In Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.

Full text
Abstract:
Nowadays, data security is an important issue in telecommunication network to be considered in its implementation and operation, mainly in wireless network without infrastructure as the Ad Hoc networks. This paper presents the Godzuk symmetric cryptographic algorithm, as a possible standard for this kind of mobile communication.
APA, Harvard, Vancouver, ISO, and other styles
7

Chatzidakis, Michail, and Stathes Hadjiefthymiades. "Trust management in mobile ad hoc networks." In 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 2014. http://dx.doi.org/10.1109/netwks.2014.6958525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Feeney, Laura Marie, Michael Frey, Viktoria Fodor, and Mesut Gunes. "Modes of inter-network interaction in beacon-enabled IEEE 802.15.4 networks." In 2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). IEEE, 2015. http://dx.doi.org/10.1109/medhocnet.2015.7173294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, You, Zhiyang Wang, Yu-Ting Yu, Ruolin Fan, and Mario Gerla. "Social network based security scheme in mobile information-centric network." In 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). IEEE, 2013. http://dx.doi.org/10.1109/medhocnet.2013.6767402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stoian, Rodica, Lucian Andrei Perisoara, and Radu Stoica. "Random network coding for wireless ad-hoc networks." In 2009 International Symposium on Signals, Circuits and Systems - ISSCS 2009. IEEE, 2009. http://dx.doi.org/10.1109/isscs.2009.5206142.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Ad-hoc network"

1

Chen, Biao. Robust Connectivity in Sensory and Ad Hoc Network. Fort Belvoir, VA: Defense Technical Information Center, February 2011. http://dx.doi.org/10.21236/ada538299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Joneckis, Lance, Corinne Kramer, David Sparrow, and David Tate. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada618314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Mingyan. Building Sound Mobility Models for AD HOC Network Simulation. Fort Belvoir, VA: Defense Technical Information Center, August 2005. http://dx.doi.org/10.21236/ada437092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clausen, T., C. Dearlove, J. Dean, and C. Adjih. Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format. RFC Editor, February 2009. http://dx.doi.org/10.17487/rfc5444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chakeres, I. IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols. RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Clausen, T., C. Dearlove, and J. Dean. Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP). RFC Editor, April 2011. http://dx.doi.org/10.17487/rfc6130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Peacock, Brent A. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, April 2007. http://dx.doi.org/10.21236/ada497761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fitzgibbons, Patrick W., Digen Das, and Larry J. Hash. Constraints and Approaches for Distributed Mobile AD-HOC Network Security. Fort Belvoir, VA: Defense Technical Information Center, November 2005. http://dx.doi.org/10.21236/ada442043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cerf, V. G. Report of the second Ad Hoc Network Management Review Group. RFC Editor, August 1989. http://dx.doi.org/10.17487/rfc1109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Frew, Eric, and Timothy Brown. An Integrated Framework for Controlled Mobility in Ad-hoc Network. Fort Belvoir, VA: Defense Technical Information Center, July 2009. http://dx.doi.org/10.21236/ada575556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography