Ad hoc networking, markov random fields, and decision making
نویسندگان
چکیده
منابع مشابه
Cost Metrics for Decision Problems in Wireless ad hoc Networking
The main contributions of the presented paper are an in-depth discussion of the special conditions existing for multiple wireless connection scenarios. We evaluate reasonable structures for cost functions and optimized decision processes and present a simulation to demonstrate the influence of the various parameters. Finally we discuss controller strategies that implement these cost functions.
متن کاملAd Hoc Networking An Introduction
In recent years, mobile computing has enjoyed a tremendous rise in popularity. The continued miniaturization of mobile computing devices and the extraordinary rise of processing power available in mobile laptop computers combine to put more and better computer-based applications into the hands of a growing segment of the population. At the same time, the markets for wireless telephones and comm...
متن کاملAd Hoc Networking Pattern Language
Ad hoc networking is based on the principle of spontaneous addition, discovery, and usage of services in a network. Various technologies such as JiniTM [Sun01], UPnP [Micr01], and .NET are built around the concept of ad hoc networking. While each technology is either platform or language dependent, they share a common underlying architecture which can be expressed using a pattern language. The ...
متن کاملAd Hoc Mobile Wireless Networking
The growing interest in mobile ad hoc network techniques has resulted in many routing protocol proposals. Scalability issues in ad hoc networks are attracting increasing attention these days. In this article a survey brings out the different routing protocols that address scalability. Quality of Service (QoS) in ad hoc networks seldom considers the scalability issues. So, at the end of the pape...
متن کاملAuthentication in Ad hoc Networking
Authentication is an aspect of communication network security that deals with ensuring that the principals with whom one interacts are the expected ones. Informally, authentication allows the receiver to verify that the claimed sender really sent the data. Authentication inherently secures other aspects of ad hoc wireless communication such as freshness, availability, integrity and confidential...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Signal Processing Magazine
سال: 2006
ISSN: 1053-5888
DOI: 10.1109/msp.2006.1708413