• Nenhum resultado encontrado

[PDF] Top 20 A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS

Has 10000 "A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS " found on our website. Below are the top 20 most common "A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS ".

A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS

A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS

... wireless networks were fully infrastructure based and hence imposed the necessity to install base ...of mobile adhoc networks, these problems are mitigated, by allowing certain ... See full document

8

A Novel Cache Resolution Technique for Cooperative Caching in Wireless Mobile Networks

A Novel Cache Resolution Technique for Cooperative Caching in Wireless Mobile Networks

... performance in cooperative cache, we propose a novel cache resolution scheme which uses a split table approach to resolve the cached data request which in turn reduces latency and ... See full document

7

Shared Information Based Security Solution for Mobile Ad hoc Networks

Shared Information Based Security Solution for Mobile Ad hoc Networks

... node in the network helps others by forwarding packets for ...However in the lack of fixed infrastructure and stringent rule for membership it is quite possible that malicious nodes also get a chance to ... See full document

12

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

... drawback in the existing protocols in dealing with energy management issues is that the time varying nature of the wireless channels among the ad hoc nodes is ...ignored. Approach: This study ... See full document

7

A Comparative Study of Location Management Schemes: Challenges and Guidelines

A Comparative Study of Location Management Schemes: Challenges and Guidelines

... role in evaluating the performance of LM ...move in fully random ...traffic in highways, but not suitable for pedestrian movements with stop-and-go ...movements. In Markovian-mobility model, ... See full document

7

Community sharing platform for mobile devices

Community sharing platform for mobile devices

... trend in the history of computing hardware: the number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two ...never in human history have the primary ... See full document

85

An evolutionary approach to improve connectivity prediction in mobile wireless sensor networks

An evolutionary approach to improve connectivity prediction in mobile wireless sensor networks

... differences in the simulation results we noticed that for Manhattan and RPGM mobility models the results for each GMLA version was quite ...accuracy in the worst case ...ahead) in the best and worst ... See full document

6

On the security of an anonymous roaming protocol in UMTS mobile networks

On the security of an anonymous roaming protocol in UMTS mobile networks

... desirable in an IBE system to reduce the workload of the master ...involved in a 2-HIBE scheme: a root PKG which possesses a master key s , the domain PKGs which gain their domain keys from the root PKG, ... See full document

8

An Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink

An Efficient Approach for Data Gathering and Sharing with Inter Node Communication in Mobile-Sink

... nodes in a densely deployed large-scale sensor network is known as ...aggregation in cluster based ...clustering in a wireless sensor ...taken in to a single ...cluster-head in a ... See full document

12

Application of time-series analysis for prediction of molding sand properties in production cycle

Application of time-series analysis for prediction of molding sand properties in production cycle

... The basic model used for residual data was simple linear mul- tivariate regression. However, for the 10 cases with largest pre- diction errors, also a regression tree model, based on the C&RT algorithm [8], ... See full document

5

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

... improvement in mobile computing device characteristics since Zimm erman’s research up to ...EDUCAUSE, in his article titled ―Executive Summary: Student Mobile Computing Practices—lessons ... See full document

5

Bridging Gaps For Better amp Smarter Mobile Applications

Bridging Gaps For Better amp Smarter Mobile Applications

... using mobile apps has been in rise. Augmented Reality based mobile apps have the ability to map real world environment with computer based virtual environments as in ... See full document

4

ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

... A mobile ad hoc network (MANETs) is a collection of wireless mobile nodes dynamically forming a temporary network without any existing network infrastructure or centralized ...for mobile ad hoc ... See full document

9

Enumeration of smallest intervention strategies in genome-scale metabolic networks.

Enumeration of smallest intervention strategies in genome-scale metabolic networks.

... overproduction in a smaller (core) network of ...exist in a genome-scale network which must all be ...contained in the smaller network which could ‘survive’ a cut set for blocking the low-yield ... See full document

13

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

... In mobile adhoc networks [3], the nodes can move while communicating, there are no fixed base stations and all the nodes in the network act as routers as well as hosts to facilitate the ... See full document

5

DYNAMIC PLANNING BASED SCHEDULING APPROACH FOR WIRELESS SENSOR NETWORKS

DYNAMIC PLANNING BASED SCHEDULING APPROACH FOR WIRELESS SENSOR NETWORKS

... maximization in an Additive White Gaussian Noise (AWGN) channel (Gong et ...idle time when no sensing events happen, by turning off the radio periodically (Bhapnagar and Robertezi, ...vertex in the ... See full document

5

QOS EVALUATION OF HETEROGENEOUS NETWORKS: APPLICATION-BASED APPROACH

QOS EVALUATION OF HETEROGENEOUS NETWORKS: APPLICATION-BASED APPROACH

... over mobile networks is expected to reach ...billion mobile-connected devices by 2018, which will exceed the world’s expected population at that time ...increases in traffic, the ... See full document

14

NEW APPROACH OF THE ANN METHODOLOGY FOR FORECASTING TIME SERIES: USE OF TIME INDEX

NEW APPROACH OF THE ANN METHODOLOGY FOR FORECASTING TIME SERIES: USE OF TIME INDEX

... registered in the last years for values never seen in the time series rises a difficulties for the ANN forecast models due to its typically ...have in entrance values registered in ... See full document

6

IMPULSE RADIO ULTRA WIDE BAND BASED MOBILE ADHOC NETWORK ROUTING PERFORMANCE ANALYSIS

IMPULSE RADIO ULTRA WIDE BAND BASED MOBILE ADHOC NETWORK ROUTING PERFORMANCE ANALYSIS

... Gerharz, M., C. de Waal, M. Frank and P. Martini, 2002. Link stability in mobile wireless ad hoc networks. Proceedings of the 27th Annual IEEE Conference Local Computer Network, Nov. 6-8, IEEE Xplore ... See full document

6

A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks

A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks

... "peer" mobile nodes that are capable of communicating with each other without help from a fixed ...it. In other type, a malicious node sends a forged Route REPly (RREP) packet to a source node that ... See full document

5

Show all 10000 documents...