A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Unilateral Wakeup for Mobile Ad Hoc Networks
2011
2011 International Conference on Parallel Processing
In this paper we examine the applicability of asynchronous wakeup schemes to the Mobile Ad Hoc NETworks (MANETs). ...
Asynchronous wakeup schemes have been proposed for ad hoc networks to increase the energy efficiency of wireless communication. ...
INTRODUCTION Mobile Ad Hoc NETworks (MANETs) are self-organizing networks that allow mobile nodes (or stations) to communicate with each other in the situations, such as battlefield commanding, disaster ...
doi:10.1109/icpp.2011.78
dblp:conf/icpp/WuSK11
fatcat:g4i7nuxfhnhgfjsuzjnchxpyim
Unilateral Wakeup for Mobile Ad Hoc Networks with Group Mobility
2013
IEEE Transactions on Mobile Computing
Index Terms-Mobile ad hoc networks, energy conservation, quorum systems, unilateral wakeup, group mobility . The authors are with the ...
Asynchronous wakeup schemes have been proposed for ad hoc networks to increase the energy efficiency of wireless communication. ...
Ç
INTRODUCTION M OBILE Ad Hoc NETworks (MANETs) are self-organizing networks that allow mobile nodes (or stations) to communicate with each other in the situations, such as battlefield commanding, disaster ...
doi:10.1109/tmc.2012.243
fatcat:dcg7dgvn2vgdzl24brebkroexm
Energy-efficient wireless information retrieval
2007
Journal of computer and system sciences (Print)
Background and related work The target network is the IEEE 802.11 infrastructure wireless LAN (as opposed to the IEEE 802.11 ad hoc network) [7] , in which all stations communicate with an access point ...
When PSM is disabled, the NIC is in the continuous awake mode (CAM) and the AP forwards data packets destined for the mobile device without delay. ...
A mobile station has full control over its NICs operational modes; however, it cannot perform the transition unilaterally. It must negotiate with the AP and reach an agreement. ...
doi:10.1016/j.jcss.2007.02.004
fatcat:7keqrwpshvartd54oscbofyjeq
Energy-Efficient Selective Activation in Femtocell Networks
2015
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems
Provisioning the capacity of wireless networks is difficult when peak load is significantly higher than average load, for example, in public spaces like airports or train stations. ...
To reduce the energy consumption of over-provisioned femtocell networks, we formulate a femtocell selective activation problem, which we formalize as an integer nonlinear optimization problem. ...
Current solutions to serving temporary flash crowds include over-provisioning networks and mobile cell sites, but both are ill-suited for recurring flash crowds. ...
doi:10.1109/mass.2015.16
dblp:conf/mass/LinSBP15
fatcat:73vl3hin7ffalojge6d4m3wlfu
Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends
2018
IEEE Communications Surveys and Tutorials
Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage ...
vs. evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game model evaluation, and how the model results can be applied for ...
Acknowledgement The authors are grateful to the anonymous reviewers for their constructive comments to improve the quality of the paper. ...
doi:10.1109/comst.2018.2863030
fatcat:xxsvobkdbzgizm5obvnz5eqatu
Exchange power management for mobile ad hoc networks
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
A practical method for negotiation in mobile ad hoc networks is detailed and then evaluated in a realistic simulation environment. ...
Our work is the first to take a systems view of mechanism design application to ad hoc networks. ...
devices are all well-suited for ad hoc networking. ...
doi:10.1109/infcom.2005.1497882
dblp:conf/infocom/DorseyS05
fatcat:dmf6so2uvrdtldsbm6pr45fxtq
The New Leviathan
2003
Michigan law review
Life in The Meadow might be best characterized as a permanent state of impermanence when it comes to questions of government policy, as ad hoc decisionmaking replaces broad and long-range policy agendas ...
[here] it must sometimes act unilaterally, not out of a passion for unilateralism but only because, given a weak Europe that has moved beyond power, the United States has no choice but to act uni laterally ...
As the European Union's Commissioner for External Affairs wrote: "We are all about to have our way of looking at the world turned upside down by a superb book."68 To describe Bobbitt's accomplishment, ...
doi:10.2307/3595329
fatcat:t7s3gs7iffd45hm76facthuziq
The power of war: Why Europe needs it
2010
International Politics
Box 93080 2509 AB The Hague Email: ddavidse@clingendael.nl Website: http://www.clingendael.nl The Netherlands Institute of International Relations 'Clingendael' is an independent institute for research ...
for its military operations on an ad hoc basis. 17 This is not surprising. ...
The ensuing European discourse on the Balkans/Kosovo has reformulated the EU's feebleness into a mythical 'wakeup call', sparking a jetzt erst recht mentality [in English: let's go for it!] ...
doi:10.1057/ip.2010.31
fatcat:v3jj2cvn3vggnainmhtkr4kgai
Consensus-Seeking, Distrust, and Rhetorical Entrapment: The WTO Decision on Access to Medicines
2009
Social Science Research Network
their part, recognized the legitimacy of patent protection, stopped arguing for the total exclusion of pharmaceutical products from patentability, and advocated, instead, for simple for ad hoc exceptions ...
Rhetoric could be a powerful tool if used unilaterally. ...
doi:10.2139/ssrn.1435747
fatcat:db3mpjm3aff4jjhpbkpik6lnpu
Hacking Trademark Law for Collaborative Communities
2014
Social Science Research Network
As it turns out, many communities have developed a number of ad hoc solutions to deal with this problem. ...
While mostly developed on an ad hoc basis, these hacks share similar features and can therefore be categorized into four main groups. ...
trademark license · for events and conferences, · publications, movies, and TV shows, · for things that you want to sell, and · other uses. ...
doi:10.2139/ssrn.2476779
fatcat:m7wqa2qxyrgvtj2yq4yd255vru
Consensus-seeking, distrust and rhetorical entrapment: The WTO decision on access to medicines
2010
European Journal of International Relations
their part, recognized the legitimacy of patent protection, stopped arguing for the total exclusion of pharmaceutical products from patentability, and advocated, instead, for simple for ad hoc exceptions ...
Rhetoric could be a powerful tool if used unilaterally. ...
doi:10.1177/1354066110366054
fatcat:vvetxp2dlrbbdo5xslvguqmrka
Design, development and performance evaluation of ultra low-power wireless sensor network devices
[article]
2021
A common approach for saving energy in sensor networks is the duty-cycle concept, since overhearing and idle listening are major sources of energy wastage. ...
Department of Electrical and Computer Engineering Design, Development and Performance Evaluation of Ultra Low-Power Wireless Sensor Network Devices by Giannis KAZDARIDIS Energy-efficiency in the domain ...
Notably, LoRa does not support ad-hoc topologies but only star networks. ...
doi:10.26253/heal.uth.13539
fatcat:os56t3vbkvg7tpgpy4yhi3bbqi
ICWMC 2016 Committee ICWMC Advisory Committee
unpublished
networks. ...
We hope that ICWMC 2016 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of wireless and mobile communications ...
In order to find ad-hoc networks, many protocols use Hello Messages for discovering neighbor nodes and automatically create a network. ...
fatcat:t6alooghi5cnfep4hiepaeb75y
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs ...
In this work, a novel approach is designed to secure the RFID-Sensor based MANET that uses ECC for assigning identification to resource constrained mobile nodes. ...
The authors gratefully acknowledge the anonymous reviewers for their valuable comments.
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
fatcat:ez6kvrzkuzg75nulaxycvfvxcq
Modularity in the design of robust distributed algorithms
2014
Experience has shown that it is not practical to combine several strategies ad-hoc, without strong guiding principles. ...
By clearly separating each strategy, the Speculative Linearizability framework eliminates the complexity blowup that makes ad-hoc approaches impractical. ...
Acknowledgements I would like to thank my advisors, Rachid Guerraoui and Viktor Kuncak, for giving me the opportunity to pursue a PhD and for their guidance towards its completion. ...
doi:10.5075/epfl-thesis-6085
fatcat:7wklhve3ibc4jczayg7ywldmmi
« Previous
Showing results 1 — 15 out of 39 results