Gotowa bibliografia na temat „Ad-hoc network”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Ad-hoc network”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Ad-hoc network"

1

P R, Shinde, i Sutar A J. "Bluetooth Ad hoc Network". IARJSET 4, nr 4 (27.01.2017): 125–27. http://dx.doi.org/10.17148/iarjset/nciarcse.2017.36.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kumari, Seema, i Dr M. U. Kharat. "Delay analysis of multihop wireless ad hoc network using queuing network model". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, nr 4 (15.08.2013): 1503–9. http://dx.doi.org/10.24297/ijct.v10i4.3250.

Pełny tekst źródła
Streszczenie:
Ad hoc wireless network is a self configurable infrastructure less network. The lack of infrastructure support in ad hoc networks makes them useful in various applications such as at the disaster site, highway, vast forest, battle field, oceans, etc. Since there is no centralized control in ad hoc network, each node can act as a source, a destination or a router. Ad hoc wireless networks therefore, experience congestion more than the wired networks, leading to jitter and high end to end delays even for moderate traffic which may lead to performance degradation. So it is crucial to analyze the factors which affect the capacity and end-to-end delay in wireless ad-hoc networks. In this paper a G/G/1queuing network model is proposed togain insights into the end-to-end delay in a multi hop wireless ad hoc networks. Queuing network model is unique as it providesclosed form expressions for average end-to-end delay in multihop wireless ad hoc networks. NS2 simulation is conducted in order to verify and compare the theoretical results.
Style APA, Harvard, Vancouver, ISO itp.
3

.S, Bodhy Krishna. "Study of Ad hoc Networks with Reference to MANET, VANET, FANET". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 7 (30.07.2017): 390. http://dx.doi.org/10.23956/ijarcsse/v7i7/0159.

Pełny tekst źródła
Streszczenie:
A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.
Style APA, Harvard, Vancouver, ISO itp.
4

Ragab, Ahmed Refaat Sobhy Ahmed. "A New Classification for Ad-Hoc Network". International Journal of Interactive Mobile Technologies (iJIM) 14, nr 14 (28.08.2020): 214. http://dx.doi.org/10.3991/ijim.v14i14.14871.

Pełny tekst źródła
Streszczenie:
<span>This paper focus on developing a new practical classification for ad-hoc networks, were all the past classifications revolve upon three main categories respectively, mobile ad- hoc network (MANET), Vehicle ad-hoc network (VANET) and Flying ad-hoc network (FANET). My new classification will illustrate Underwater vehicle ad-hoc network (UWVANET) as the fourth category in ad-hoc main classification, showing the powerful and the weakness of each category defined.</span>
Style APA, Harvard, Vancouver, ISO itp.
5

Zhao, Hai Yan, Jun Qiang Yang i Hui Li. "Research for Network Security Mechanism of Ad Hoc Network". Advanced Materials Research 926-930 (maj 2014): 2006–9. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2006.

Pełny tekst źródła
Streszczenie:
Ad Hoc network is a special kind of mobile multi-hop wireless networks, which has been widely used various occasions. In this paper, the main characters of Ad Hoc network are presented. Meanwhile, based on the inherent defect and security threats of Ad Hoc network, the corresponding security mechanism and strategy are proposed.
Style APA, Harvard, Vancouver, ISO itp.
6

Kaur, Manjit, Sahil Verma i Kavita. "Flying Ad-Hoc Network (FANET): Challenges and Routing Protocols". Journal of Computational and Theoretical Nanoscience 17, nr 6 (1.06.2020): 2575–81. http://dx.doi.org/10.1166/jctn.2020.8932.

Pełny tekst źródła
Streszczenie:
Flying Ad-hoc Networks (FANET) play a vital part in military (defence), environment and civilian areas, for examples surveillance, traffic monitoring, search, rescue, weather monitoring, fire fighting, agriculture, videography, photography and delivery goods or product from one place to another place etc. Flying Ad-hoc Network is mainly ad-hoc network between unmanned air vehicles. There are several difficulties in flying ad-hoc network. The primary problem is in the communication between unmanned air vehicles. UAV are also known as Unmanned Aircraft Systems (UAS). The problem of Flying Ad-hoc Network is routing of multiple unmanned air vehicles. The reason behind is high speed which required highly dynamic routing protocols. The designing of routing protocol is a complicated for various parameters such as traffic monitoring, load balancing etc. Here, flying ad-hoc networks are described along with mobility models, features and routing protocols. This paper presented various routing protocols used to resolve these types of problems in Flying Ad-hoc Networks. Finally, some open research challenges in developing efficient routing protocols in the Flying Ad-hoc Networks are highlighted.
Style APA, Harvard, Vancouver, ISO itp.
7

Ragab, Ahmed Refaat, i Pablo Flores. "Adapting Ad-hoc Routing Protocol for Unmanned Aerial Vehicle Systems". International Journal of Data Science 2, nr 1 (8.04.2021): 1–8. http://dx.doi.org/10.18517/ijods.2.1.1-8.2021.

Pełny tekst źródła
Streszczenie:
The field of the ad-hoc network and its routing protocols had attracted a lot of researchers for many years, due to the various usage of the ad-hoc networks in many fields and especially the field of Unmanned Aerial Vehicles (UAVs). Routing protocols in the ad-hoc network are the main focused problem, for their characteristics and role during the communication process of the ad-hoc networks, with its different types. In this paper, we are going to analyze and sheds the light on the performance of ad-hoc routing protocols, for both Flying ad-hoc network (FANET) and vehicle ad-hoc network (VANET) when applying three different ad-hoc routing protocols, respectively Reactive routing protocol, Proactive routing protocol, and Hybrid routing protocol, in order to shed light on the ambiguous misunderstanding of ad-hoc routing protocols functionality and to choose the best routing protocol to be used and adapted for UAVs.
Style APA, Harvard, Vancouver, ISO itp.
8

Wei, Zhiqing, Ziyu Wang, Xin Yuan, Huici Wu i Zhiyong Feng. "Information density–based energy-limited capacity of ad hoc networks". International Journal of Distributed Sensor Networks 14, nr 4 (kwiecień 2018): 155014771877324. http://dx.doi.org/10.1177/1550147718773242.

Pełny tekst źródła
Streszczenie:
In this article, the inhomogeneous energy consumption is characterized by the concept of information density, which is defined as the number of bits per unit time passing through a specific region. With information density, it is possible to derive the energy consumption of each region and determine the energy configuration scheme to maximize the network lifetime. The information density of pure ad hoc network and hybrid ad hoc network is derived. It is discovered that the information density of pure ad hoc network is inhomogeneous and the information density of hybrid ad hoc network is homogeneous, except for the regions near the edge of the entire area. With information density, the energy-limited capacity of pure and hybrid ad hoc networks is derived. The information density introduced in this article provides more insights into the information transfer of ad hoc networks, which may be applied in the energy configuration of ad hoc networks.
Style APA, Harvard, Vancouver, ISO itp.
9

Nayana K, Nayana K., i Dr Sangeethaa Sukumaran. "Spontaneous Ad HoC Network Creation Using Distributed Dns". International Journal of Scientific Research 3, nr 5 (1.06.2012): 207–9. http://dx.doi.org/10.15373/22778179/may2014/62.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Shin, Kwang-Sig, Joon-Dal Kwon, Young-Dong Lee i Wan-Young Chung. "Ad-hoc home network system using wireless sensor network technology". Journal of Sensor Science and Technology 16, nr 2 (31.03.2007): 142–49. http://dx.doi.org/10.5369/jsst.2007.16.2.142.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Ad-hoc network"

1

Suh, Kyungjoo. "CRYPTO-AD-HOC network an ad hoc network protocol embedded cryptography /". [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000164.

Pełny tekst źródła
Streszczenie:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains x, 80 p.; also contains graphics. Includes vita. Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
2

Han, Seon Yeong. "Shadowing effect on ad hoc network". Diss., Online access via UMI:, 2004. http://wwwlib.umi.com/dissertations/fullcit/1422359.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Mak, Wai Y. "Ad Hoc Network Architecture for Multi-Media Networks". Thesis, Monterey California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/2988.

Pełny tekst źródła
Streszczenie:
The desire for more intelligence in the battlefield has given rise to the idea of routing video images over wireless sensor networks. This would apprise combat decision makers with actual images of battlefield developments and allow them to make sound decisions. To achieve this objective, the characteristics of video traffic must be studied and understood. This thesis focuses on evaluating the possibility of routing video images over a wireless sensor network. Video traffic is modeled and simulations are performed via the use of the Sun Small Programmable Object Technology (Sun SPOT) Java development kits configured in three different network topologies: the star topology, binary tree topology and chain topology. It is known that video traffic is self similar and can be obtained by aggregating a large number of On-Off message sources. Hence, an On-Off model using Pareto distribution function is used to model video traffic over the network. In this thesis four self-similar shaping parameters, i.e., alpha(On) = 1.2, 1.4, 1.7 and 1.9 are used in the simulations. The performance of each topology is evaluated based on parameters like mean throughput, mean interarrival time, mean packet drop, and mean delay.
Singapore Armed Forces author.
Style APA, Harvard, Vancouver, ISO itp.
4

ISHII, Yoji, Koichi ASAKURA i Toyohide WATANABE. "Information Services with Ad-hoc Network". INTELLIGENT MEDIA INTEGRATION NAGOYA UNIVERSITY / COE, 2005. http://hdl.handle.net/2237/10433.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Graarud, Espen Grannes. "Implementing a Secure Ad Hoc Network". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14474.

Pełny tekst źródła
Streszczenie:
In emergency situations such as natural disasters the emergency personell shouldbe able to establish communication fast and reliably. Depending on the nature ofthe disaster one cannot rely on existing communication infrastructure, or accessto centralized administration. Additionally the established communication needsauthentication in order to handle access control so only trusted parties canpartake. A suitable medium for such communication is wireless ad hoc networks,but their flat structure make authentication a very challenging task.In this thesis a system design for an ad hoc routing protocol combined withaccess control is proposed, and implemented extending a popular routing protocolcalled BATMAN. The proposed authentication scheme relies on special public keycertificates called proxy certificates, and combined with a neighbor trustmechanism both authentication and access control are managed in a secure manner.Tests using mobile nodes running this implementation shows that the performanceof the proposed design is comparable to the original routing protocol (BATMAN)used, and that the authentication process is manageable even for mobile ad hocnetworks.
Style APA, Harvard, Vancouver, ISO itp.
6

Giang, Anh Tuan. "Capacity of vehicular Ad-hoc NETwork". Phd thesis, Université Paris Sud - Paris XI, 2014. http://tel.archives-ouvertes.fr/tel-00989836.

Pełny tekst źródła
Streszczenie:
In recent years, Inter Vehicle Communication (IVC) has become an intensive research area, as part of Intelligent Transportation Systems. It supposes that all, or a subset of the vehicles is equipped with radio devices, enabling communication between them. IEEE 802.11p (standardized for vehicular communication) shows a great deal of promise. By using ad hoc mode, this radio technology allows vehicles to extend their scopes of communication and thus forming a Multi-hop wireless Ad-hoc NETwork, also called Vehicular Ad-hoc NETwork (VANET). This thesis addresses a fundamental problem of VANET: the network capacity. Two simple theoretical models to estimate this capacity have been proposed: a packing model and a Markovian point process model. They offer simple and closed formulae on the maximum number of simultaneous transmitters, and on the distribution of the distance between them. An accurate upper bound on the maximum capacity had been derived. An analytical formula on distribution of the transmitters had been presented. This distribution allows us to optimize Clear Channel Assessment (CCA) parameters that leads to an optimization of the network capacity.In order to validate the approach of this thesis, results from the analytical models are compared to simulations performed with the network simulator NS-3. Simulation parameters was estimated from real experimentation. Impact of different traffic distributions (traffic of vehicles) on the network capacity is also studied. This thesis also focuses on extended perception map applications, which use information from local and distant sensors to offer driving assistance (autonomous driving, collision warning, etc.). Extended perception requires a high bandwidth that might not be available in practice in classical IEEE 802.11p ad hoc networks. Therefore, this thesis proposes an adaptive power control algorithm optimized for this particular application. It shows through an analytical model and a large set of simulations that the network capacity is then significantly increased.
Style APA, Harvard, Vancouver, ISO itp.
7

Sundaresan, Karthikeyan. "Network Protocols for Ad-Hoc Networks with Smart Antennas". Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14122.

Pełny tekst źródła
Streszczenie:
Multi-hop wireless networks or ad-hoc networks face several limiting characteristics that make it difficult to support a multitude of applications. It is in this context that we find smart antennas to find significant applications in these networks, owing to their ability to alleviate most of these limitations. The focus of my research is thus to investigate the use of smart antennas in ad-hoc networks and hence efficiently design network protocols that best leverage their capabilities in communication. There are two parts to the proposed objective of designing efficient network protocols that pertain to the nature of the smart antenna network considered, namely, homogeneous and heterogeneous smart antenna networks. Unlike heterogeneous smart antenna networks, where different devices in the network employ different antenna technologies, homogeneous smart antenna networks consist of devices employing the same antenna technology. Further, in homogeneous smart antenna networks, different antenna technologies operating in different strategies tend to perform the best in different network architectures, conditions and application requirements. This motivates the need for developing a {em unified} framework for designing efficient communication (medium access control and routing) protocols for homogeneous smart antenna networks in general. With the objective of designing such a unified framework, we start by designing efficient MAC and routing protocols for the most sophisticated of the smart antenna technologies, namely multiple-input multiple-output (MIMO) links. The capabilities of MIMO links form a super-set of those possible with other antenna technologies. Hence, the insights gained from the design of communication protocols for MIMO links are then used to develop unified MAC and routing frameworks for smart antennas in general. For heterogeneous smart antenna networks, we develop theoretical performance bounds by studying the impact of increasing degree of heterogeneity on network throughput performance. Given that the antenna technologies are already unified in the network, unified solutions are not required. However, we do develop efficient MAC and routing protocols to best leverage the available heterogeneous capabilities present in the network. We also design efficient cooperation strategies that will further help the communication protocols in exploiting the available heterogeneous capabilities in the network to the best possible extent.
Style APA, Harvard, Vancouver, ISO itp.
8

Brännström, Robert. "Network-layer mobility in wireless ad hoc access networks". Licentiate thesis, Luleå tekniska universitet, Datavetenskap, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-17093.

Pełny tekst źródła
Streszczenie:
This thesis proposes and discusses solutions to enable network-layer mobility in wireless ad hoc access networks. The deployment of wireless access networks has made them ubiquitous and current research strives to make them pervasive. Users having wireless access to wired IP networks and the Internet are driving the demand for mobile and heterogeneous solutions. To enable all kinds of mobility in heterogeneous All-IP networks there are many issues to be solved. This thesis focuses on network-layer mobility and connectivity of wireless multi-hop ad hoc networks to the Internet. In a wireless environment with overlapping service areas, mobile hosts need to select which gateway(s) to use to access the wireless infrastructure. The signal-to-noise ratio of an access point, which is part of a wireless LAN, does not reflect the number of attached hosts or the traffic between them. The throughput of the access point could be low while the signal is strong. At the same time an access point with weaker signal could allow higher throughput. In ad hoc routing, hop count is the most common metric and the selection of a route to a gateway is affected by the same utilization problem. This could lead to a situation where a short route is used by more hosts and performing worse than a longer route serving fewer hosts. This thesis proposes and discusses solutions to calculating network-layer metrics and using them in gateway selection and handover decisions. To enable connectivity of a mobile ad hoc network (MANET) to the Internet, a gateway must support the wired single-hop and wireless multi-hop approaches. To deploy network-layer mobility in a MANET, the Mobile IP protocol needs to be adapted for the multi-hop environment. A MANET enables connectivity to more than one gateway at a time and combined with multihoming it provides seamless handover between subnets. The gateway selection and handover decisions are complicated by the multihoming capabilities. This thesis proposes and discusses solutions to deploying multihomed mobility into MANETs and thereby handling multi-hop gateway discovery, registration of multiple gateways and tunneling to selected gateway(s). Traffic patterns in wired LANs generally follow the 80/20 ratio of Internet destined vs. local traffic. The same traffic patterns generally hold true for wireless hosts. Therefore it is important to maintain the route to the gateway for the Internet destined traffic. This thesis proposes and discusses a solution to maintaining gateway connectivity in MANETs by installing routes to gateways using advertisements. Deciding the locality of a peer and setting up the forwarding route differs between single-hop and multi-hop networks. In single-hop networks a source matches the destination prefix with its own to decide what forwarding policy to use. Local traffic is sent directly to the destination with the link- layer protocol while global traffic is forwarded to a default gateway. In multi-hop networks the ad hoc routing protocol finds the route to a destination either proactively or on-demand. This thesis proposes and discusses a solution to deciding on the mobile host destination locality in a MANET.
Godkänd; 2005; 20060916 (ysko)
Style APA, Harvard, Vancouver, ISO itp.
9

Brännström, Robert. "Network-layer mobility in wireless ad hoc access networks/". Luleå : Luleå tekniska universitet, 2005. http://epubl.ltu.se/1402-1757/2005/68/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks". Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Ad-hoc network"

1

Cichoń, Jacek, Maciej Gȩbala i Marek Klonowski, red. Ad-hoc, Mobile, and Wireless Network. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39247-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Chadha, Ritu, i Latha Kant. Policy-Driven Mobile Ad hoc Network Management. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2007. http://dx.doi.org/10.1002/9780470227718.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lin, Xiaodong, i Rongxing Lu, red. Vehicular Ad Hoc Network Security and Privacy. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119082163.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Wireless sensor and ad hoc networks under diversified network scenarios. Boston, Mass: Artech House, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Security Management for Mobile Ad hoc Network of Networks (MANoN): Mobile Ad hoc Networks (MANET), Security Management, Security Architecture. Saarbrücken: VDM Verlag Dr. Müller, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Günes, M., D. G. Reina, J. M. Garcia Campos i S. L. Toral. Mobile Ad Hoc Network Protocols Based on Dissimilarity Metrics. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62740-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Ji hui wang luo: Gao xiao shu ju fen fa ji shu = JIHUI WANGLUO : GAOXIAO SHUJU FENFA JISHU. Chengdu: Dian zi ke ji da xue chu ban she, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Dhillon, Santpal Singh. Ant routing, searching and topology estimation algorithms for ad hoc netwoks. Amsterdam: IOS Press, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Dhillon, Santpal Singh. Ant routing, searching and topology estimation algorithms for ad hoc netwoks. Amsterdam: IOS Press, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Ding, Wei. Synergy of peer-to-peer networks and mobile ad-hoc networks: Boot strapping and routing. New York: Nova Science, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Ad-hoc network"

1

Amaxilatis, Dimitrios, Ioannis Chatzigiannakis, Shlomi Dolev, Christos Koninis, Apostolos Pyrgelis i Paul G. Spirakis. "Adaptive Hierarchical Network Structures for Wireless Sensor Networks". W Ad Hoc Networks, 65–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29096-1_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cao Minh, Trang, Boris Bellalta i Miquel Oliver. "DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks". W Ad Hoc Networks, 149–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36958-2_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Shirazipourazad, Shahrzad, Arun Das i Arunabha Sen. "On Delay Tolerant Airborne Network Design". W Ad Hoc Networks, 357–68. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-51204-4_29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mariño, P., F. P. Fontán, M. A. Domínguez i S. Otero. "Sensor Network in the Wireless UHF Band". W Ad Hoc Networks, 523–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_35.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Garg, Kamini, Anna Förster, Daniele Puccinelli i Silvia Giordano. "Towards Realistic and Credible Wireless Sensor Network Evaluation". W Ad Hoc Networks, 49–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29096-1_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Merlino, Giovanni, Dario Bruneo, Francesco Longo, Salvatore Distefano i Antonio Puliafito. "Cloud-Based Network Virtualization: An IoT Use Case". W Ad Hoc Networks, 199–210. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25067-0_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wälchli, Markus, i Torsten Braun. "Building Intrusion Detection with a Wireless Sensor Network". W Ad Hoc Networks, 607–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_41.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Li, Fan. "Vehicular Ad Hoc Network". W Encyclopedia of Wireless Networks, 1443–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_308.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Li, Fan. "Vehicular Ad Hoc Network". W Encyclopedia of Wireless Networks, 1–5. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_308-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Araujo, Filipe, i Hugo Miranda. "Ad Hoc Routing". W Middleware for Network Eccentric and Mobile Applications, 63–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-540-89707-1_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Ad-hoc network"

1

Maakar, Sunil Kr, Yudhvir Singh i Rajeshwar Singh. "Flying Ad Hoc Network: A Newest Research Area for Ad Hoc Networks". W 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT). IEEE, 2019. http://dx.doi.org/10.1109/icct46177.2019.8969032.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Enneya, N., K. Oudidi i M. Elkoutbi. "Network Mobility in Ad hoc Networks". W 2008 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2008. http://dx.doi.org/10.1109/iccce.2008.4580751.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yi, Seung, Jeff Meegan i Jae H. Kim. "Network Autoconfiguration for Mobile Ad Hoc Networks". W MILCOM 2007 - IEEE Military Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/milcom.2007.4455336.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Ismail, Datuk Prof Ir Ishak, i Mohd Hairil Fitri Ja'afar. "Mobile ad hoc network overview". W 2007 Asia-Pacific Conference on Applied Electromagnetics (APACE). IEEE, 2007. http://dx.doi.org/10.1109/apace.2007.4603864.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Cheong, Se-Hang, Kai-Ip Lee, Yain-Whar Si i Leong Hou U. "Lifeline: Emergency Ad Hoc Network". W 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.70.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Vieira, Antônio Carlos Castañon, Sergio Luiz Cardoso Salomão, Aloysio de Castro Pinto Pedrosa i Antônio Carneiro de Mesquita Filho. "Security Applications for Ad Hoc Networks". W Workshop em Segurança de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2003. http://dx.doi.org/10.5753/sbseg.2003.21251.

Pełny tekst źródła
Streszczenie:
Nowadays, data security is an important issue in telecommunication network to be considered in its implementation and operation, mainly in wireless network without infrastructure as the Ad Hoc networks. This paper presents the Godzuk symmetric cryptographic algorithm, as a possible standard for this kind of mobile communication.
Style APA, Harvard, Vancouver, ISO itp.
7

Chatzidakis, Michail, i Stathes Hadjiefthymiades. "Trust management in mobile ad hoc networks". W 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 2014. http://dx.doi.org/10.1109/netwks.2014.6958525.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Feeney, Laura Marie, Michael Frey, Viktoria Fodor i Mesut Gunes. "Modes of inter-network interaction in beacon-enabled IEEE 802.15.4 networks". W 2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). IEEE, 2015. http://dx.doi.org/10.1109/medhocnet.2015.7173294.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Lu, You, Zhiyang Wang, Yu-Ting Yu, Ruolin Fan i Mario Gerla. "Social network based security scheme in mobile information-centric network". W 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET). IEEE, 2013. http://dx.doi.org/10.1109/medhocnet.2013.6767402.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Stoian, Rodica, Lucian Andrei Perisoara i Radu Stoica. "Random network coding for wireless ad-hoc networks". W 2009 International Symposium on Signals, Circuits and Systems - ISSCS 2009. IEEE, 2009. http://dx.doi.org/10.1109/isscs.2009.5206142.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Ad-hoc network"

1

Chen, Biao. Robust Connectivity in Sensory and Ad Hoc Network. Fort Belvoir, VA: Defense Technical Information Center, luty 2011. http://dx.doi.org/10.21236/ada538299.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Joneckis, Lance, Corinne Kramer, David Sparrow i David Tate. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, maj 2014. http://dx.doi.org/10.21236/ada618314.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Liu, Mingyan. Building Sound Mobility Models for AD HOC Network Simulation. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2005. http://dx.doi.org/10.21236/ada437092.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Clausen, T., C. Dearlove, J. Dean i C. Adjih. Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format. RFC Editor, luty 2009. http://dx.doi.org/10.17487/rfc5444.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chakeres, I. IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols. RFC Editor, marzec 2009. http://dx.doi.org/10.17487/rfc5498.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Clausen, T., C. Dearlove i J. Dean. Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP). RFC Editor, kwiecień 2011. http://dx.doi.org/10.17487/rfc6130.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Peacock, Brent A. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2007. http://dx.doi.org/10.21236/ada497761.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Fitzgibbons, Patrick W., Digen Das i Larry J. Hash. Constraints and Approaches for Distributed Mobile AD-HOC Network Security. Fort Belvoir, VA: Defense Technical Information Center, listopad 2005. http://dx.doi.org/10.21236/ada442043.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Cerf, V. G. Report of the second Ad Hoc Network Management Review Group. RFC Editor, sierpień 1989. http://dx.doi.org/10.17487/rfc1109.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Frew, Eric, i Timothy Brown. An Integrated Framework for Controlled Mobility in Ad-hoc Network. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2009. http://dx.doi.org/10.21236/ada575556.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii