نتایج جستجو برای: hoc
تعداد نتایج: 50395 فیلتر نتایج به سال:
چکیده ندارد.
Recent advancements in wireless communication technologies have attracted ad-hoc networking, which enables mobile users to communicate with each other without any infrastructure. While many ad-hoc routing protocols have been proposed, ad-hoc communication and its applications are not widespread. To expedite the widespread use of ad-hoc communications, we turn our attention to the handiest wirel...
Ad hoc networks enable network creation on the fly without support of any predefined infrastructure. The spontaneous erection of networks in anytime and anywhere fashion enables development of various novel applications based on ad hoc networks. However, ad hoc networks present several new challenges. Different research proposals have came forward to resolve these challenges. This chapter provi...
These days ad-hoc network research has focused on supplying routing services without considering security. In this report, we are providing the information on security threats against ad hoc routing protocols. In light of these threats, we identify three different environments with distinct security requirements. We advise a solution to one; the managed-open scenario where no network substructu...
Many synchronizations in existing multi-threaded programs are implemented in an ad hoc way. The first part of this paper does a comprehensive characteristic study of ad hoc synchronizations in concurrent programs. By studying 229 ad hoc synchronizations in 12 programs of various types (server, desktop and scientific), including Apache, MySQL, Mozilla, etc., we find several interesting and perha...
Ad hoc sensor networks are ad hoc networks that are characterized by decentralized structure and ad hoc deployment. Sensor networks have all the basic features of ad hoc networks but to different degrees – for example, much lower mobility and much more stringent energy requirements. We analyze the current state of research and evaluate open issues in development of routing techniques in wireles...
Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. In this chapter, a security framework for authentication and authenticated key exchange in ad hoc networks is introduced. The framework is applicable to general ad hoc networks and formalizes network phases, protocol stages, and design goals. To cope with the divers...
Much progress has been made toward solving the problem of routing packets inside an ad hoc network, but there are presently no complete proposals for connecting ad hoc networks together to form larger networks, or for integrating them with wired internets. This paper describes a technique that allows a single ad hoc network to span across heterogeneous link layers. Using this technique, we can ...
This paper talks about an emerging and exciting application of ad-hoc network where vehicles are serving as nodes. This area has certain promised aspects and activities to be offered, which are broadly related with the safety, convenience, entertainment, and various other topics of interest. It is an ad hoc network of vehicles, known as ‘Vehicular Ad Hoc Network (VANET).’ Vehicular Ad-Hoc netwo...
با توجه به وجود عوامل بسیار در تخریب سیگنال گفتار، بهسازی این سیگنال از اهمیت زیادی برخوردار شده است. شکل دهی پرتو یکی از روش های مطرح برای بهسازی گفتار است که با استفاده از آرایه های میکروفونی صورت می پذیرد. با توجه به محدودیت های موجود در نحوه چینش میکروفون ها، پنجره ای به سوی بحث آرایه های میکروفونی با چیدمان نامنظم (ad-hoc) گشوده شده است. با فرض عدم شناخت نسبت به مکان و چینش میکروفون ها و ه...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید