34 Hits in 11.2 sec

A Pragmatic Evaluation of Distance Vector Proactive Routing in MANETs via Open Space Real-World Experiments [chapter]

Thomas D. Lagkas, Arbnor Imeri, George Eleftherakis
2015 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The main purpose of this paper is to pragmatically evaluate a promising, complete, and finalized MANET protocol via real-world experimentation in open space environment.  ...  The considered protocol, with the acronym B.A.T.M.A.N, which is based on distance vector proactive routing, was tested in different networking scenarios that revealed its ability to satisfactorily handle  ...  Our goal is the evaluation of the performance of B.A.T.M.A.Nadv, as a representative ready-to-use distance vector proactive routing protocol for MANETs, via comparative experimental results under realistic  ... 
doi:10.1007/978-3-319-25479-1_26 fatcat:uub74y3vqzbrvjxljzxn4fnyde

Lessons from experimental MANET research

Christian Tschudin, Per Gunningberg, Henrik Lundgren, Erik Nordström
2005 Ad hoc networks  
We find that simulations have to be complemented to a much higher degree by real-world experiments, that there is a lack of mature implementations and integration and that efforts should be focused on  ...  After almost a decade of research into ad hoc networking, MANET technology has not yet affected our way of using wireless networks.  ...  Acknowledgements We wish to thank Richard Gold for his careful editing help and Evgeny Osipov for the port of LUNAR to the ns-2 simulator.  ... 
doi:10.1016/j.adhoc.2004.07.007 fatcat:ropgpydgpje3lgcfgtxex4cxku

Building Realistic Mobility Models for Mobile Ad Hoc Networks

Adrian Pullin, Colin Pattinson, Ah-Lian Kor
2018 Informatics  
These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR), destination-sequenced distance-vector routing (DSDV), and ad hoc n-demand distance vector  ...  MANET simulations require models that reflect the world in which the MANET is to operate.  ...  Lopez And Colleagues (2010) [59] Present an Implementation Whereby The MANET Routing Protocols Are Moved from The Kernel To The User Space And Evaluated Using A Range Of Real-World Experiments Involving  ... 
doi:10.3390/informatics5020022 fatcat:nc7fzyxhkzazhaykpbiyp45rty

Principles and applications of swarm intelligence for adaptive routing in telecommunications networks

Frederick Ducatelle, Gianni A. Di Caro, Luca M. Gambardella
2010 Swarm Intelligence  
This will provide the reader with a deeper insight into the basic workings of the approach and open the door for new Swarm intelligence for routing in telecommunications networks 3 applications of these  ...  Then, in Section 4, we discuss AntNet, a prototypical example of a SI algorithm for routing in wired networks, and we derive from it a basic recipe for the construction of SI routing algorithms.  ...  In a set of extensive simulation and real world experiments, BeeAdHoc has shown performance superior to AODV and DSR.  ... 
doi:10.1007/s11721-010-0040-x fatcat:b6n3djko2fbgxdggoraiauwh4y

From MANET to people-centric networking: Milestones and open research challenges

Marco Conti, Chiara Boldrini, Salil S. Kanhere, Enzo Mingozzi, Elena Pagani, Pedro M. Ruiz, Mohamed Younis
2015 Computer Communications  
world.  ...  a people-centric revolution in computing and communications.  ...  These multi-hop ad hoc networking paradigms, by learning from the MANET experience, emerged from MANET by avoiding the main weaknesses of the MANET research by following a more pragmatic development strategy  ... 
doi:10.1016/j.comcom.2015.09.007 fatcat:lulxgenaj5aijii5wwi3dncoby

Security and privacy issues in middleware for emergency and rescue applications

Matija Puzar, Thomas Plagemann, Yves Roudier
2008 2008 Second International Conference on Pervasive Computing Technologies for Healthcare  
In this thesis, we analyze in detail the requirements for usage of MANETs in emergency and rescue operations, with particular focus on security and data sharing.  ...  The final contribution of this thesis is a network emulation test-bed implemented to facilitate development of specialized applications and protocols for MANETs.  ...  Acknowledgments This work has been performed in the Ad-Hoc InfoWare project and we would like to thank all project team members and related colleagues for many fruitful discussions and other contributions  ... 
doi:10.1109/pcthealth.2008.4571037 dblp:conf/ph/PuzarPR08 fatcat:xqkyel3klbeshcphmky7e5itku

The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency

Paolo Bellavista, Giuseppe Cardone, Antonio Corradi, Luca Foschini
2012 Journal of Network and Computer Applications  
The wide availability of new devices and the large amount of data they can access enable a wide range of novel services in different areas, spanning from simple data collection systems to socially-aware  ...  The ease of mapping from the proposed logical model to the real implementations and the positive performance result campaigns prove the quality of the proposed approach and offer a reliable reference model  ...  real-world scenarios.  ... 
doi:10.1016/j.jnca.2011.05.003 fatcat:3iprgfdvmjfxxey67qtflilnri

Adoption of Vehicular Ad Hoc Networking Protocols by Networked Robots

Wim Vandenberghe, Ingrid Moerman, Piet Demeester
2012 Wireless personal communications  
Typically, this integration of wireless communication is tackled in a quite pragmatic manner.  ...  In a large amount of published studies, the robots are equipped with IEEE 802.11 technology, in combination with an existing Mobile Ad Hoc Network (MANET) protocol.  ...  Original MANET protocols When investigating the capabilities of unchanged existing MANET protocols, several authors focused on the Ad hoc On-demand Distance Vector (AODV) protocol.  ... 
doi:10.1007/s11277-012-0598-2 fatcat:6olcfuic3jg7rgjau4cefw5joa

Intelligent Computing Research Studies in Life Science

Dr. Thilagamani S
2019 International Journal of Pharma and Bio Sciences  
In addition, the present task involves just a smaller part of SMS imparted on either of the wellbeing versatile including different gatherings that play out a protected multiple correspondences. II.  ...  Cloud security is nowadays a vital part in healthcare system as the health information is highly sensitive.  ...  the twofold vector-space display and each record is a parallel vector in the term space.  ... 
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142 fatcat:6fc5ghwmjbgrphetiablavajxm

Exploiting the Power of Multiplicity: A Holistic Survey of Network-Layer Multipath

Junaid Qadir, Anwaar Ali, Kok-Lim Alvin Yau, Arjuna Sathiaseelan, Jon Crowcroft
2015 IEEE Communications Surveys and Tutorials  
The main contribution of this paper is a systematic articulation of the main design issues in network-layer multipath routing along with a broad-ranging survey of the vast literature on network-layer multipathing  ...  This opens up a new vista of opportunities promising increased throughput (through concurrent usage of multiple paths) and increased reliability and fault-tolerance (through the use of multiple paths in  ...  the real-world in a practical network; v) standardized as RFCs or in the form of IETF drafts (that describe work in progress).  ... 
doi:10.1109/comst.2015.2453941 fatcat:pvatolih4ngwrooewos2rgeaoe

Software engineering for mobility

Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Murphy
2000 Proceedings of the conference on The future of Software engineering - ICSE '00  
The term distributed computing conjures the image of a fixed network structure whose nodes support the execution of processes that communicate with each other via messages traveling along links.  ...  Stability is the ideal mode of operation; changes are relatively slow; even in the case of failure, nodes and links are expected eventually to come back up.  ...  Rapidly changing topology renders impractical many well-established routing strategies such as link-state and distance-vector. New variants are being proposed and evaluated.  ... 
doi:10.1145/336512.336567 dblp:conf/icse/RomanPM00 fatcat:pf6scj6h4neepjnquwzh7rq53q

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano, Oscar M. Caicedo
2018 Journal of Internet Services and Applications  
In this way, readers will benefit from a comprehensive discussion on the different learning paradigms and ML techniques applied to fundamental problems in networking, including traffic prediction, routing  ...  Therefore, this is a timely contribution of the implications of ML for networking, that is pushing the barriers of autonomic network operation and management.  ...  This work is supported in part by the Royal Bank of Canada, NSERC Discovery Grants Program, the Quebec FRQNT postdoctoral research fellowship, the ELAP scholarship, and the COLCIENCIAS Scholarship Program  ... 
doi:10.1186/s13174-018-0087-2 fatcat:jvwpewceevev3n4keoswqlcacu

International Research Conference on Smart Computing and Systems Engineering SCSE 2020 Proceedings [Full Conference Proceedings]

2020 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE)  
ACKNOWLEDGMENT The authors would like to extend their heartfelt gratitude and acknowledgment to all the language experts, Sinhala teachers from different schools and especially, the Sinhala Department in  ...  the University of Kelaniya for their immense support and encouragement they gave throughout the development phase of the data sets.  ...  Above mentioned systems should be re-evaluated when a node from another MANET joins a new MANET as the reputations of the node in the previous MANET cannot be imported to the new MANET.  ... 
doi:10.1109/scse49731.2020.9313027 fatcat:gjk5az2mprgvrpallwh6uhvlfi

Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

2008 ChoiceReviews  
And technologists promise us a world of ubiquitous computing, in which myriads of tiny, untethered sensors and actuators will communicate with each other, promptly taking care of our various needs and  ...  In addition to this pervasiveness, we are witnessing a change of paradigm: initially, wireless devices had limited or no programmability and were managed (and secured) in a highly centralized fashion.  ...  2 and 12; SrdjanČapkun and MarioČagalj, whose research shaped significantly the material of Chapter 5; Mario again, as his research was also a direct source of inspiration for Chapter 9, as was also the  ... 
doi:10.5860/choice.46-1524 fatcat:3bkyxjix2vcabcn3f45pqd4vn4

Semantic Communications for 6G Future Internet: Fundamentals, Applications, and Challenges [article]

Wanting Yang, Hongyang Du, Ziqin Liew, Wei Yang Bryan Lim, Zehui Xiong, Dusit Niyato, Xuefen Chi, Xuemin Sherman Shen, Chunyan Miao
2022 arXiv   pre-print
In a nutshell, this paper investigates the fundamentals of SemCom, its applications in 6G networks, and the existing challenges and open issues for further direction.  ...  to become a new core paradigm in 6G.  ...  Each element in the output vector is a scaling factor of a feature channel.  ... 
arXiv:2207.00427v1 fatcat:uju2oufi25d7jdyh7zynjvbsii
« Previous Showing results 1 — 15 out of 34 results