A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data dissemination strategies for emerging wireless body-to-body networks based Internet of Humans
2015
2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
In this paper, we present the performance evaluation of the clustered and distributed data dissemination approaches in tactical WBBN. ...
We based our performance evaluation on relevant metrics according to the operational requirements for tactical networks such as packet reception ratio, latency, energy consumption and hop count. ...
The statements made herein are solely the responsibility of the authors. ...
doi:10.1109/wimob.2015.7347933
dblp:conf/wimob/ArbiaAAH15
fatcat:fm7m5qakxfajvl5e6noyjaueie
Data Dissemination Strategies for Emerging Wireless Body-to-Body Networks based Internet of Humans
[article]
2017
arXiv
pre-print
In this paper, we present the performance evaluation of the clustered and distributed data dissemination approaches in tactical WBBN. ...
We based our performance evaluation on relevant metrics according to the operational requirements for tactical networks such as packet reception ratio, latency, energy consumption and hop count. ...
The statements made herein are solely the responsibility of the authors. ...
arXiv:1711.10845v1
fatcat:rc22vwi4brgqxgm2c7zjeysv2y
DisService: Network state monitoring and prediction for opportunistic information dissemination in tactical networks
2010
2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE
Information dissemination is extremely difficult in tactical edge networks, which provide one of the most challenging environments for communication. ...
In particular, the paper investigates what kind of knowledge can be inferred about the interaction between nodes in a tactical network and how to use that knowledge to improve data dissemination algorithms ...
INTRODUCTION Tactical networks, the basis for Network Centric Operations, provide one of the most challenging environments for communications, with mobile nodes connected via limited bandwidth and highly ...
doi:10.1109/milcom.2010.5680429
fatcat:ukrdrqfrynf7jl7ucm5wdsjtdi
Peer-to-peer communications for tactical environments: Observations, requirements, and experiences
2010
IEEE Communications Magazine
Tactical edge networks present extremely challenging environments for communications given their wireless ad hoc nature and the inherent node mobility. ...
This article reports on our observations from several tactical networking experiments in which we have deployed state-of-the-art applications and services that leverage P2P communications. ...
EXPERIMENTAL RESULTS This section presents results from two experiments that evaluate the performance of the Group Manager and DisService components. ...
doi:10.1109/mcom.2010.5594678
fatcat:wf3h6tazlnfodessbfzkcuixve
An experimental evaluation of peer-to-peer reliable multicast protocols
2011
2011 - MILCOM 2011 Military Communications Conference
In this paper, we experimentally evaluate four protocols (and corresponding implementations) that have been developed to support reliable multicast communications: NORM, JGroups, OpenPGM, and DisService ...
Therefore, multicast protocols are a suitable approach to perform efficient data dissemination in this context. ...
CONCLUSIONS AND FUTURE WORK In this paper we evaluated NORM and DisService, two protocols (with corresponding implementations) for reliable multicast communications in tactical network environments. ...
doi:10.1109/milcom.2011.6127429
dblp:conf/milcom/BenincasaRSTS11
fatcat:cr2f5wt7fvca7oojynkb6rvrb4
Dissemination of Reconfiguration Policies on Mesh Networks
[chapter]
2012
Lecture Notes in Computer Science
We evaluate a combination of gossip-based algorithms and vector clock techniques that are able to propagate these policies safely in order to preserve consistency of architecture configuration models among ...
This evaluation is done with a test-bed system running on a large size grid network. ...
For each indicator we have set up an experimental protocol, using the firefighter tactical information case study metrics to simulate the system behaviour on a grid in different configurations. ...
doi:10.1007/978-3-642-30823-9_2
fatcat:mqseaf6wlzgbjpoip7etcbxkj4
Simulation implementation and performance analysis for situational awareness data dissemination in a tactical MANET
2014
Proceedings of the Winter Simulation Conference 2014
Our simulation provides a flexible framework and evaluation platform for experimental studies of SA data dissemination in tactical MANETs. 2343 978-1-4799-7486-3/14/$31.00 ©2014 IEEE Li, Mason, Salmanian ...
We also propose specific metrics for the evaluation of efficiency, accuracy and freshness of the SA data sharing across the network, and demonstrate the importance of these metrics by analyzing experimental ...
The SA performance metrics we identified allow us to evaluate the quantity and quality of the SAs that are disseminated in particular scenarios. ...
doi:10.1109/wsc.2014.7020078
dblp:conf/wsc/LiMSB14
fatcat:s5lhrtj5vzedlbjgt7ifbc44bi
Dissemination of the nurse-administered Tobacco Tactics intervention versus usual care in six Trinity community hospitals: study protocol for a comparative effectiveness trial
2012
Trials
Trial registration: Dissemination of Tobacco Tactics for Hospitalized Smokers NCT01309217 ...
Methods/Design: This effectiveness study will be a quasi-experimental design of six Michigan community hospitals of which three will get the nurse-administered Tobacco Tactics intervention and three will ...
The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Heart, Lung, and Blood Institute or the National Institutes of Health (NIH) ...
doi:10.1186/1745-6215-13-125
pmid:22852834
pmcid:PMC3533810
fatcat:nirexy3vabgt5gtf3ttlf557eu
Content Centric Networking in tactical and emergency MANETs
2010
2010 IFIP Wireless Days
We prove feasibility and performance of the new design via implementation and experimentation. ...
Traditional IP networking and wireless protocols tend to perform poorly. In this paper, we propose Content Centric Networking (CCN) for emergency wireless ad hoc environments. ...
Communication devices provide a mobile ad hoc networking capability for ground combat operations and the support of voice/data communication services. ...
doi:10.1109/wd.2010.5657708
dblp:conf/wd/OhLG10
fatcat:onyj4cebvbhblfvo52fmyoky6q
Distributed chat in dynamic networks
2011
2011 - MILCOM 2011 Military Communications Conference
In this paper, we present our novel decentralized solution specially tailored for multi user chat in tactical mobile ad-hoc networks. ...
XMPP is intended for use in stable networks with high bit rate (e.g., LAN, Internet) and does not function well in military tactical networks where resources are scarce and disruptions are frequent. ...
In this paper, we present a decentralized multi user chat solution for tactical MANETs where an improved version of Mist is used as the message dissemination protocol. ...
doi:10.1109/milcom.2011.6127547
dblp:conf/milcom/SkjegstadLSJ11
fatcat:ykz5ik4k6zbadnfarahz7filvi
Predicting peer interactions for opportunistic information dissemination protocols
2012
2012 IEEE Symposium on Computers and Communications (ISCC)
Tactical edge networks provide one of the most challenging environments for communications, which significantly complicates the development of efficient and robust information dissemination solutions. ...
Opportunistic communications; information dissemination; tactical networks, statistical learning. I. ...
Army Research Laboratory, under cooperative agreement W911NF-11-2-0095 and by the Office of Naval Research and the Space and Naval Warface Systems Command, under contract N66001-11-C-0045. ...
doi:10.1109/iscc.2012.6249347
dblp:conf/iscc/MarchiniTBSS12
fatcat:jcjr3eq52bcvxe23gfcrdczley
Information Ubiquity in Austere Locations
2012
Procedia Computer Science
., due to the remoteness of the area, due to a disaster or combat situation, or due to insecurity or lack of access to available communications. ...
In today's world, connectivity is increasingly taken for granted. Wireless networks, cell towers, and satellites provide ubiquitous connectivity through a number of devices. ...
Marti has been evaluated in flight demonstrations and experiments, with multiple tactical users and client platforms, and in multiple realistic scenarios. ...
doi:10.1016/j.procs.2012.06.025
fatcat:jy5th2xj35dfjjddn2cf6bv7cy
Enhanced IoT-Based End-To-End Emergency and Disaster Relief System
2017
Journal of Sensor and Actuator Networks
The latter proposed solution approach would be perfect for selecting the optimal number of tactical nodes considering traffic uncertainty in discrete network optimization problems. ...
Thus, we reduced the number of deployed tactical nodes to four. It is important to note here that this given number of tactical devices must be carefully selected according to the area dimensions. ...
Elyes Ben Hamida advised on the conducted experiment and coded the C sources on the tactical devices. ...
doi:10.3390/jsan6030019
fatcat:ppbxolve4zc5jmynkhwb3ce6bi
Improving timeliness and reliability of data delivery in tactical wireless environments with Mockets communications library
2009
MILCOM 2009 - 2009 IEEE Military Communications Conference
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching data sources, gathering and maintaining ...
the data needed, and completing and reviewing the collection of information. ...
grouping of data (creating multiple streams). ...
doi:10.1109/milcom.2009.5379951
fatcat:iengrtbzdbgghmoyffmd5pznom
ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge
[chapter]
2015
Lecture Notes in Computer Science
Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. ...
We describe the motivation, features, and implementation of our architecture and briefly summarize the performance of this novel architecture 1 . ...
for deployment at the network edge of tactical and disaster response scenarios [11] , [10] . ...
doi:10.1007/978-3-319-23165-5_29
fatcat:sdt4w4bp55ambajsnixgfcueim
« Previous
Showing results 1 — 15 out of 6,963 results