Πλοήγηση ανά Θέμα "Network protocols"
Αποτελέσματα 1-17 από 17
-
Backbone formation in military multi-layer ad hoc networks using complex network concepts
(2016)Modern battlefields are characterized by increasing deployment of ad hoc communications among allied entities. These networks can be seen as a complex multi-layer ad hoc network, where each layer may be an independently ... -
Cooperation and directionality: A co-opdirectional MAC for wireless ad hoc networks
(2007)Advances in cooperative communications and directional antenna design so far have taken place in parallel, if not in isolation from each other. To explore the role they may play in the next generation of wireless networks, ... -
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
(2007)Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the ... -
Distributed dynamic scheduling for end-to-end rate guarantees in wireless ad hoc networks
(2005)We present a framework for the provision of deterministic end-to-end bandwidth guarantees in wireless ad hoc networks. Guided by a set of local feasibility conditions, multi-hop sessions are dynamically offered allocations, ... -
Distributed on-line schedule adaptation for balanced slot allocation in wireless ad hoc networks
(2004)We propose an algorithm for design and on the fly modification of the schedule of a wireless ad hoc network for provision of fair service guarantees under topological changes. The primary objective is to derive a distributed ... -
An experimental framework for channel sensing through USRP/GNU radios
(2012)In the last decade testbeds have been set-up to evaluate network protocols and algorithms under realistic settings. In order to draw solid conclusions about the corresponding experimental results, it is important for the ... -
An experimental framework for data gathering and analysis in wireless sensor networks
(2011)In the last decade testbeds have been set-up to evaluate network protocols and algorithms under realistic settings. Moreover, wireless sensors have lately been integrated into testbeds in order to simulate application ... -
A framework for MAC protocol misbehavior detection in wireless networks
(2005)The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue ... -
The geodesic broadcast scheme for wireless ad hoc networks
(2006)Broadcasting is an effective means for disseminating information in wireless ad hoc networks. In this paper we propose a novel distributed broadcasting protocol in wireless ad hoc networks, which is based on an highly ... -
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks
(2003)Directional antennas in ad hoc networks offer many benefits compared with classical omnidirectional antennas. The most important include significant increase of spatial reuse, coverage range and subsequently network capacity ... -
PLATO - Intelligent middleware platform for the collection, analysis, processing of data from multiple heterogeneous sensor systems and application development for business intelligence
(2012)The "Internet of Things" along with the "Internet ofServices" is expected to undertake a significant role in our lives for the years to come. The versatility of its components and the ability to harvest, as well as consume, ... -
Query sensitive storage for wireless sensor networks
(2009)Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS), Data-Centric Storage (DCS) and more recently ... -
A role-based infrastructure for customised agent system development in supply networks
(2004)This paper presents a methodology for generic role identification and role reuse together with an infrastructure enabling rapid development of role-based multi-agent system (MAS) applications. The infrastructure includes ... -
Routing-aware channel selection in multi-radio mesh networks
(2009)Efficient channel selection is essential in 802.11 mesh deployments, for minimizing contention and interference among co-channel devices and thereby supporting a plurality of QoS-sensitive applications. In this paper, we ... -
Topology control algorithms for wireless sensor networks: A critical survey
(2010)In a densely deployed wireless sensor network, a single node has many neighbouring nodes with which direct communication would be possible when using sufficiently large transmission power. This is, however, not beneficial; ... -
Towards dynamic and cooperative multi-device personal computing
(2007)In the 2WEAR project we have explored the paradigm of cooperative multi-device personal computing, where different wearable, portable and infrastructure elements communicate with each other in an ad-hoc fashion. The physical ... -
Voice interactive personalized security protocol: Definition and security analysis
(2007)Security is a major issue in VoIP communications over the Internet, especially in mobile environments. Voice Interactive Personalized Security (VIPSec) constitutes a method for leveraging the security for Internet ...