Filters








15,237 Hits in 5.2 sec

Effect of the Degree of Neighborhood on Resource Discovery in Ad Hoc Grids [chapter]

Tariq Abdullah, Koen Bertels, Luc Onana Alima, Zubair Nawaz
2010 Lecture Notes in Computer Science  
Resource management is one of the important issues in the ecient use of grid computing, in general, and poses specic challenges in the context of ad hoc grids due to the heterogeneity, dynamism, and intermittent  ...  We show that the intermediate state of the ad hoc grid with multiple adaptive matchmakers outperforms both a completely centralized and a completely decentralized (P2P) infrastructure.  ...  Results were obtained for completely centralized, multiple adaptive matchmakers and for completely decentralized resource discovery approaches in an ad hoc grid.  ... 
doi:10.1007/978-3-642-11950-7_16 fatcat:biph3vmykndphdycio5k4xr75y

Multipath Routing protocol: NCPR and QAMR

Roopali Garg, Guneet Kaur
2012 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
Mobile ad hoc network is an assembly of mobile nodes with no centralized server.  ...  Due to mobility of nodes and decentralized network it is difficult to maintain the quality of service (QoS) in routing the packets from source to destination.  ...  MANET is a type of ad hoc network [3] . Ad hoc networks are of two types: static and dynamic. Dynamic ad hoc networks are also known as mobile ad hoc networks.  ... 
doi:10.24297/ijct.v11i10.2975 fatcat:lp23y5u2ergnzbo44qgac3w774

Mobile Ad-hoc Network using P-Encryption Scheme

H.O. Archita, Shraddhha Satpute, Pradnya Nandwalkar, K.S. Kumavat
2015 International Journal of Computer Applications  
A very important and necessary issue for mobile ad-hoc networks is to find the route between destination and source which is a major technical challenge due to the dynamic topology of the network.  ...  P-coding scheme is used for the mobile ad-hoc network(MANET).  ...  The bandwidth availability and computing resources like hardware and battery power are restricted in mobile ad hoc networks. An ad hoc network is a decentralized type of wireless network.  ... 
doi:10.5120/ijca2015906506 fatcat:vgfyj7k3mjbrze6brr4yhgnemm

Decentralizing Private Blockchain-IoT Network with OLSR

Xuan Chen, Shujuan Tian, Kien Nguyen, Hiroo Sekiya
2021 Future Internet  
The IoT devices use OLSR to form an ad hoc network. The environment data are collected and propagated in transactions to a pre-loaded smart contract periodically.  ...  With data transparency and immutability, the blockchain can provide trustless and decentralized services for Internet of Things (IoT) applications.  ...  Moreover, each node in an ad hoc mode can receive and forward messages, facilitating decentralization.  ... 
doi:10.3390/fi13070168 fatcat:5td3fvdaprbcdbeqiscos4fiuq

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

Simone Leggio, Hugo Miranda, Kimmo Raatikainen, Luis Rodrigues
2006 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops  
A solution for this problem is presented in this paper, which describes and evaluates a fully decentralized mechanism for locating SIP users in ad-hoc networks.  ...  The next step would be to reutilize the same applications to achieve ubiquitous communication, anytime and anywhere, also where network support is not available, such as in ad-hoc networks.  ...  PCache [4] is an algorithm for efficiently distributing and retrieving cached data items in ad-hoc networks.  ... 
doi:10.1109/mobiqw.2006.361724 fatcat:qb7c6uglvbenlk62qd5sgydzb4

Improving Route Selection Mechanism using Trust Factor in AODV Routing Protocol for MaNeT

R. S. Mangrulkar, Pallavi V Chavan, S. N. Dagadkar
2010 International Journal of Computer Applications  
An ad-hoc network comprises of mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network.  ...  As low transmission power of each ad-hoc node limits its communication range, the nodes must assist and trust each other in forwarding packets from one node to another.  ...  Ad-hoc networks can also be used for emergency, law enforcement, and rescue missions.  ... 
doi:10.5120/1282-1657 fatcat:t637plezebe2vmg3c2xihpipkm

Secure Multicast Key Distribution for Mobile Ad Hoc Networks [article]

D. SuganyaDevi, G.Padmavathi
2010 arXiv   pre-print
protocols in mobile ad hoc networks.  ...  Thus this paper shows the specific challenges towards multicast key management protocols for securing multicast key distribution in mobile ad hoc networks, and present relevant multicast key management  ...  CHALLENGES AND CONSTRAINTS OF SECURING MULTICAST KEY DISTRIBUTION FOR MOBILE AD HOC NETWORKS The principal constraints and challenges induced by the ad hoc environment [8] are as follows. • Wireless  ... 
arXiv:1003.1799v1 fatcat:5gcy3vdnybhcfpuydjrfzcimra

LocalAlert: Simulating Decentralized Ad-Hoc Collaboration in Emergency Situations [chapter]

Silvia Nittel, Christopher Dorr, John C. Whittier
2012 Lecture Notes in Computer Science  
Today, advances in short-range ad-hoc communication and mobile phone technologies allow people to engage in ad-hoc collaborations based solely on their spatial proximity.  ...  In this paper we explore the concept of decentralized ad-hoc collaboration across a range of emergency scenarios, its feasibility, and potentially effective communication protocols.  ...  The authors of this paper plan to continue exploring such interdisciplinary questions, and hope that this work serves to encourage other GIScience researchers to do the same, so that a real-world implementation  ... 
doi:10.1007/978-3-642-33024-7_11 fatcat:qaxgtmr5jfeodnvra3mrnuioya

A decentralized paradigm for resource-aware computing in wireless Ad hoc networks

Heerok Banerjee, S. Murugaanandam, V. Ganapathy
2018 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data.  ...  In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance.  ...  for ad hoc networks [20, 24] .  ... 
doi:10.12928/telkomnika.v17i2.9621 fatcat:4mnj62xpqfambp2fm2rueomc2y

Improvement of Service Discovery Algorithm Using Tree-based Architecture in Ad-hoc Grid Environment

Maysam Hedayati
2013 Advances in Networks  
Therefore, the geographical area of ad hoc network divide into a 2-D logical hierarchical grid and each cell in the grid, select a directory as agent cell.  ...  Grid computing is a new technology that using communication infrastructure facilities of computer networks and distributed systems features are able to connect to heterogeneous computing resources, so  ...  Intentional Naming System is a resource discovery and service location technology developed by the MIT Laboratory of Computer Sciences [12] , suitable for mobile devices and ad-hoc networks.  ... 
doi:10.11648/j.net.20130101.12 fatcat:fjm76yhqe5godd47spri5uerru

A Novel Approach of Service Discovery Based on Tree Di-Rectory Architecture in Ad-Hoc Grid

Maysam Hedayati
2013 Advances in Networks  
Therefore, the geographical area of ad hoc network divide into a 2-D logical hierarchical grid and each cell in the grid, select a directory as agent cell.  ...  Grid computing is a new technology that using communication infrastructure facilities of computer networks and distributed systems features are able to connect to heterogeneous computing resources, so  ...  Intentional Naming System is a resource discovery and service location technology developed by the MIT Laboratory of Computer Sciences [12] , suitable for mobile devices and ad-hoc networks.  ... 
doi:10.11648/j.net.20130101.11 fatcat:4mpfylcq6zctnopd32ug6pjl54

Cooperative caching techniques for mobile ad hoc networks

Preetha Theresa Joy, K. Poulose Jacob
2012 2012 International Conference on Data Science & Engineering (ICDSE)  
The ad hoc networks are multi hop networks without a central base station and are resource constrained in terms of channel bandwidth and battery power.  ...  This paper attempts to study the existing cooperative caching techniques and their suitability in mobile ad hoc networks.  ...  In ad hoc networks, due to frequent network partition, data availability is lower than that in traditional wired networks.  ... 
doi:10.1109/icdse.2012.6282317 fatcat:dm3wwv6if5fk5kefgwmpjv7mzm

On the Support of Ad-Hoc Semantic Web Data Sharing [chapter]

Jing Zhou, Kun Yang, Lei Shi, Zhongzhi Shi
2012 IFIP Advances in Information and Communication Technology  
Sharing Semantic Web datasets provided by different publishers in a decentralized environment calls for efficient support from distributed computing technologies.  ...  We propose an architecture that is based upon the peer-to-peer (P2P) paradigm for ad-hoc Semantic Web data sharing and identify the key technologies that underpin the implementation of the architecture  ...  The first author is grateful for the discussion with Prof.  ... 
doi:10.1007/978-3-642-32891-6_20 fatcat:ki2qsqgeera6pevfwnlvsor7ta

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

Simone Leggio, Hugo Miranda, Kimmo Raatikainen, Luis Rodrigues
2006 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services  
A solution for this problem is presented in this paper, which describes and evaluates a fully decentralized mechanism for locating SIP users in ad-hoc networks.  ...  The next step would be to reutilize the same applications to achieve ubiquitous communication, anytime and anywhere, also where network support is not available, such as in ad-hoc networks.  ...  PCache [4] is an algorithm for efficiently distributing and retrieving cached data items in ad-hoc networks.  ... 
doi:10.1109/mobiq.2006.340392 dblp:conf/mobiquitous/LeggioMRR06 fatcat:zcxandeuxvbkxp4e2lt7obm2nq

A novel secure routing scheme using probabilistic modelling for better resistivity against lethal attacks

Jyoti Neeli, N. K. Cauvery
2020 International Journal of Electrical and Computer Engineering (IJECE)  
Different from existing intrusion prevention system, the proposed system allows the malicious node to participate in the data forwarding process and exhaust its resources with no chance of launching an  ...  The simulated outcome of the study shows that the proposed secure routing scheme offers better data forwarding characteristic in contrast to the existing system in the aspect of intrusion detection and  ...  Due to this decentralized mechanism of communication establishment and routing, there is less possibility of the availing key distribution center in the ad-hoc wireless network [4] .  ... 
doi:10.11591/ijece.v10i5.pp4956-4964 fatcat:7zm5a6pfnbgifkholzbmdash7y
« Previous Showing results 1 — 15 out of 15,237 results