Filters








2,278 Hits in 9.2 sec

MobiSN: Semantics-Based Mobile Ad Hoc Social Network Framework

Juan Li, Samee Ullah Khan
2009 GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference  
Mobile ad hoc social networks are self-configuring social networks that connect users using mobile devices, such as laptops, PDAs, and cellular phones.  ...  This paper proposes a concrete, generalized, and novel framework to develop a fully functional mobile ad hoc social network.  ...  For instance, a user interested in "mobile networks" (superclass of "ad hoc network") can be matched with another user interested in "ad hoc networks".  ... 
doi:10.1109/glocom.2009.5425993 dblp:conf/globecom/LiK09 fatcat:3ghlqzgwkvdcvonsl7ahfveoyy

Middleware for pervasive computing: A survey

Vaskar Raychoudhury, Jiannong Cao, Mohan Kumar, Daqiang Zhang
2013 Pervasive and Mobile Computing  
First, PvC environments often showcase far greater heterogeneity, in terms of devices, network protocols, and operating systems, than traditional distributed and mobile environments.  ...  The key contributions of the paper are as follows. Firstly, a reference model has been proposed for analyzing the functionalities and key services of PvC-middleware.  ...  The broadcasting nature of this model is grossly unsuitable for the mobile ad hoc networks due to their high demand of bandwidth and energy.  ... 
doi:10.1016/j.pmcj.2012.08.006 fatcat:ogmuj2mr25cfdd2voh2v7b26zq

An Enhanced Associativity Based Routing With Fuzzy Based Trust To Mitigate Network Attacks

K. Geetha, P. Thangaraj
2015 Zenodo  
Mobile Ad Hoc Networks (MANETs) is a collection of mobile devices forming a communication network without infrastructure.  ...  The impact of node mobility on trust establishment is considered and its use to propagate trust through a network is investigated in this paper.  ...  The simulation evaluated ATR performance in a heterogeneous wireless network environment in a vehicle ad hoc network, wireless mesh networks, and a MANET.  ... 
doi:10.5281/zenodo.1108717 fatcat:odmttgnx5rblfaceho7w3nlace

A Review of AI-enabled Routing Protocols for UAV Networks: Trends, Challenges, and Future Outlook [article]

Arnau Rovira-Sugranes, Abolfazl Razi, Fatemeh Afghah, Jacob Chakareski
2021 arXiv   pre-print
An important challenge is developing efficient sensing, communication, and control algorithms that can accommodate the requirements of highly dynamic UAV networks with heterogeneous mobility levels.  ...  We also address, with an AI emphasis, the closely related topics of mobility and networking models for UAV networks, simulation tools and public datasets, and relations to UAV swarming, which serve to  ...  , (vi) distributed structure-free extension of asymmetric security protocols based on key pre-distribution, hardware-driven keys, blockchain, and distributed certificate methods, (vii) ML methods to recognize  ... 
arXiv:2104.01283v2 fatcat:p2vgtckponfm5flwz4dscf7dju

A Cooperative Network Framework for Multi-UAV Guided Ground Ad Hoc Networks

Vishal Sharma, Rajesh Kumar
2014 Journal of Intelligent and Robotic Systems  
The use of UAVs provides key management and key distribution over the sensor network. Data encryption and authentication are attained using the UAV based key management scheme.  ...  The security enhancement is provided over the mobile ad hoc networks using aerial vehicles that form the mobile backbone.  ...  A cooperative network framework is developed for efficient transmission between the unmanned aerial vehicles and the ground ad hoc networks. (ii).  ... 
doi:10.1007/s10846-014-0091-0 fatcat:uvcsvijwa5egxl5bwh4adsxugu

A Survey on Security in Vehicular Ad Hoc Networks [chapter]

Saira Gillani, Farrukh Shahzad, Amir Qayyum, Rashid Mehmood
2013 Lecture Notes in Computer Science  
Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems.  ...  We also provide taxonomy and critically review the notable security solutions -available for VANETs in literature.  ...  In this protocol a master key is divided mathematically into number of parts and these parts are distributed in whole network. This protocol is based on probabilistic random key distribution.  ... 
doi:10.1007/978-3-642-37974-1_5 fatcat:3cqgkwnp4ngwrjfdobsaq4jdfe

A mobility-based framework for adaptive clustering in wireless ad hoc networks

A.B. McDonald, T.F. Znati
1999 IEEE Journal on Selected Areas in Communications  
A mobility model for ad-hoc networks is developed and is used to derive expressions for the probability o f path availability as a function of time.  ...  Abstract| This paper presents a n o vel framework for dynamically organizing mobile nodes in wireless ad-hoc networks into clusters in which the probability o f path availability can be bounded.  ...  Sclabassi of the Departments of Electrical Engineering and Neurosurgery at the University of Pittsburgh for his support and continuing guidance in the completion of this work.  ... 
doi:10.1109/49.780353 fatcat:smhmk4vmyra6npqgealhpeex24

Recommendation System based on Semantic Scholar Mining and Topic modeling: A behavioral analysis of researchers from six conferences [article]

Hamed Jelodar, Yongli Wang, Mahdi Rabbani, Ru-xin Zhao, Seyedvalyallah Ayobi, Peng Hu, Isma Masood
2018 arXiv   pre-print
Recommendation Systems in computer science are of very practical use these days in various aspects of the Internet portals, such as social networks, and library websites.  ...  In fact, We apply probabilistic topic modeling based on Gibbs sampling algorithms for a semantic mining from six conference publications in computer science from DBLP dataset.  ...  For example (Topic 98, ACM SIGIR, in Table 2 ), the word of 'ad' ! Is for 'advertisement' or 'ad hoc network' ?  ... 
arXiv:1812.08304v1 fatcat:ql264icqmnamzbyz45fweujuxi

Gander: Mobile, Pervasive Search of the Here and Now in the Here and Now

Jonas Michel, Christine Julien, Jamie Payton
2014 IEEE Internet of Things Journal  
Employing this Gander framework, we describe a concrete middleware implementation for wirelessly networked environments.  ...  of Gander in large pervasive computing spaces through network simulation.  ...  ACKNOWLEDGMENT The authors would like to thank Gruia-Catalin Roman for all of his support, guidance, and collaboration on the Gander project.  ... 
doi:10.1109/jiot.2014.2347132 fatcat:c7535brl65gvfjqqgajpwx3tk4

Middleware and architectures for space-based and situated computing

Valentin Cristea, Ciprian Dobre, Alexandru Costan, Florin Pop
2011 International Journal of Space-Based and Situated Computing (IJSSC)  
Situated computing is an actual research area that gathers the knowledge and investigation in mobile, wearable, ubiquitous and augmented computing.  ...  Middleware issues for situated computing, embedded devices, autonomic space management, proactive services, context awareness, and smart spaces are tackled as well.  ...  Acknowledgements The research presented in this paper is supported by national project 'DEPSYS -models and techniques for ensuring reliability, safety, availability and security of large-scale distributess  ... 
doi:10.1504/ijssc.2011.039106 fatcat:o3x6jis77bdhxl3cm57oah6oye

Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks

Tae DEMPSEY, Gokhan SAHIN, Yu T. (Jade) MORTON
2009 IEICE transactions on information and systems  
We model size and time as probability distributions and use direction as a supporting metric to produce a 99.4% accurate classifier. INTELLIGENT SENSING AND CLASSIFICATION IN DSR-BASED AD HOC NETWORKS  ...  This thesis investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate  ...  ad hoc networks using AODV/TCP, as we discuss later in this chapter.  ... 
doi:10.1587/transinf.e92.d.818 fatcat:looiqlkl5bfo5hwvp2uy2jrrfa

Classification and Review of Security Schemes in Mobile Computing

Sathish Alampalayam Kumar
2010 Wireless Sensor Network  
We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model.  ...  Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority.  ...  The central administrator can be pre-designated by the human initiator of the ad hoc network or can be assigned by programming.  ... 
doi:10.4236/wsn.2010.26054 fatcat:gpcyj6ede5bexatbg6eqeda3v4

A survey of security issues in mobile ad hoc and sensor networks

D. Djenouri, L. Khelladi, A.N. Badache
2005 IEEE Communications Surveys and Tutorials  
Earlier studies on mobile ad hoc networks (MANETs) aimed at proposing protocols for some fundamental problems, such as routing, and tried to cope with the challenges imposed by the new environment.  ...  Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence  ...  Special thanks to the anonymous referees for their comments and suggestions, which considerably helped us to improve this article.  ... 
doi:10.1109/comst.2005.1593277 fatcat:rs4nd35to5g63fzvplgg75ftu4

A Survey on Measuring Anonymity in Anonymous Communication Systems

Tianbo Lu, Zeyu Du, Z. Jane Wang
2019 IEEE Access  
As an important aspect of privacy, anonymity ensures that a subject may use resources or services without disclosing user identity or corresponding relationships.  ...  In recent years, anonymous communication systems have evolved from academic tools used by specialists to mass-market software used by millions of ordinary people.  ...  This method is a kickoff initiative for measuring the anonymity of wireless mobile ad-hoc networks.  ... 
doi:10.1109/access.2019.2919322 fatcat:y6z5mfulzbekjpwabpelsjbfuu

A survey on bio-inspired networking

Falko Dressler, Ozgur B. Akan
2010 Computer Networks  
networks, their dynamic nature, resource constraints, heterogeneous architectures, absence or impracticality of centralized control and infrastructure, need for survivability, and unattended resolution  ...  are presented along with open research issues for the bio-inspired networking.  ...  efficient routing mechanisms for large-scale mobile ad hoc networks [20] .  ... 
doi:10.1016/j.comnet.2009.10.024 fatcat:hkc3vn42pfdfddkwxff7ojwrzu
« Previous Showing results 1 — 15 out of 2,278 results