• Nenhum resultado encontrado

[PDF] Top 20 Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Has 10000 "Cache Based Distributed Query Processing in Mobile Ad hoc Networks" found on our website. Below are the top 20 most common "Cache Based Distributed Query Processing in Mobile Ad hoc Networks".

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

... secure query processing in mobile databases has been presented in (Saha and Chowdhury, ...the mobile database server for broadcasting through a channel of larger ...The ... See full document

6

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

A new Hierarchical Group Key Management based on Clustering Scheme for Mobile Ad Hoc Networks

... trend in the past few decades be- cause they provide anytime-anywhere networking ...wireless networks are rapidly deployed in the future, secure wireless environment will be ...possible in ... See full document

12

A Globally Accessible List (GAL) Based Recovery Concept In Mobile Ad-hoc Network

A Globally Accessible List (GAL) Based Recovery Concept In Mobile Ad-hoc Network

... on-demand ad hoc network routing protocol composed of two parts: Route Discovery and Route ...Maintenance. In this section, we describe the basic form of Route Discovery and Route Maintenance ... See full document

9

Intrusion detection in mobile ad hoc network

Intrusion detection in mobile ad hoc network

... Mobile ad hoc networks are IP networks made up of a collection of wireless and mobile nodes communicating via radio ...applications in the case of networks created ... See full document

7

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... techniques. In [7], Gurpreet et al. proposed a MANET optimization method in which Ad-hoc on –demand Distance Vector (AOVD) was used to rapid adaptation to dynamic link conditions, low ... See full document

14

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... only in the network, on top of that we highlighted the special considerations for security in MANETs and provided an extensive overview of related work and the state of the art in this ...messages ... See full document

12

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... relays in which each forward node determine the status of it neighbors based on its partial 2-hop information through node ...for distributed broadcasting in ad hoc wireless ... See full document

6

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

... A mobile ad-hoc network is a collection of autonomous nodes that communicate with each ...other. Ad-hoc network needs of security mechanisms for secure ...for ad-hoc ... See full document

9

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

... used in this study is based on characteristics similar to commercial radio interface, Lucent’s Wavelan Card with a 2Mbps bit rate ...The distributed coordination function (DCF) of the IEEE ...models ... See full document

5

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

... nodes in the total ...attackers. In this way, the attackers would be isolated, and then ...AODV based routing protocol, named DelPHI, to defend against wormhole ...counts in transmitting RREQ ... See full document

20

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... algorithm. Based on the input which is distance and size, time that used to send data to receiver and throughput could be ...done in the MATLAB programming and the output produces time of data ...transfer. ... See full document

13

Rebroadcasting for Routing Reduction based upon Neighbor coverage in Ad Hoc Networks

Rebroadcasting for Routing Reduction based upon Neighbor coverage in Ad Hoc Networks

... mobility in mobile ad hoc networks (MANETs), there are frequent link breakages exist which escort to frequent route discoveries and path ...ignored. In a route finding, broad ... See full document

5

J. Braz. Comp. Soc.  vol.8 número1

J. Braz. Comp. Soc. vol.8 número1

... Query User Interface Data visualizer visualization query result scan data message:result Query processor (mediator) metadata processor metadata processor metadata processor ad-hoc query [r] ... See full document

11

A Simulation Study on the Strong Neighborhood-Based Stable Connected Dominating Sets For Mobile Ad Hoc Networks

A Simulation Study on the Strong Neighborhood-Based Stable Connected Dominating Sets For Mobile Ad Hoc Networks

... shown in Figure 13) is a measure of the energy consumption that could be possibly incurred when a message is broadcast on the CDS-induced sub graph consisting of the edges between the CDS ...variations in ... See full document

19

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

... algorithms in case of networks that are ...records in a circuitous member interface regarding the alteration of surroundings educating ...immediate in a way that the nodes simply congregate ... See full document

6

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

... impact in the detection process of a fuzzy based hybrid IDS in detecting the black hole ...discussed in the next ...point in the input data set to a membership value that defines the ... See full document

5

Vehicular Ad-hoc Networks

Vehicular Ad-hoc Networks

... role in the development of Vehicular- centered applications where cars collect the local information about the road conditions distribute this information locally and overwhelm local information from the nearby ... See full document

8

Content delivery in vehicular ad hoc networks

Content delivery in vehicular ad hoc networks

... shown in Figure ...vehicles in the roads, and makes such information available to ...vehicles. In this case, content is pulled by vehicles interested in the traffic information from the WSN ... See full document

143

Secure Clustering in Vehicular Ad Hoc Networks

Secure Clustering in Vehicular Ad Hoc Networks

... hungry in the case of communication and computation. The accuracy in aggregation of vehicles depends upon the density of vehicles, the higher the density the greater the accurate ...Reduction in the ... See full document

7

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

... 3. Based on our model, researchers can easily determine the most suitable factor (key factor) to be addressed in their study to improve TCP performance in ...control. In addition, the ... See full document

8

Show all 10000 documents...