نتایج جستجو برای: rebroadcasting

تعداد نتایج: 56  

Journal: :J. Inf. Sci. Eng. 2011
Yan-Jing Wu Wei-Cheng Sung Tsang-Ling Sheu

In this paper, we present a dynamic navigation approach (DNA) that can be combined with GPS receivers, digital maps, and wireless technologies such as DSRC, 802.11p, and WiMAX. By calculating the score, a weighted sum of average vehicle speed, average inter-vehicle distance, road type, and road gain, for each candidate road, the DNA can generate a road score table and choose the road with the h...

2015
Mohd Umar Farooq Khaleel Ur Rahman Khan

For efficient data dissemination over a network, the most commonly used solution is broadcasting the messages by flooding the data over the network. Issues concerned with flooding are redundant rebroadcasting of messages and collision leading to broadcast storm problem. This paper proposes a strategy to overcome the broadcast storm problem in an Vanets using the bounding algorithm. Our analysis...

2015
M. Chitra S. Siva Sathya

Vehicular Ad-Hoc Networks (VANETs) are the networks of vehicles which are characterized with high mobility and dynamic changing topology. Most of the communication interchanges in VANETs take place in broadcasting mode, which is supposed to be the simplest way to disseminate (spread) emergency messages all over the vehicular network. This broadcasting technique assures the optimal delivery of e...

Journal: :Journal of Pragmatics 2021

Social media networking sites such as Facebook or Twitter depend, for their success, on the willingness of users to share digital content with other in network. To this end, they often have sharing functionality built into each new post by default. With one two clicks, a user can rebroadcast another user's own followers subscribers. In article, I consider pragmatics online third-party content, ...

Journal: :The Journal of the Institute of Television Engineers of Japan 1974

Journal: :IJDCF 2009
Hongxia Jin

This article discusses a forensic technology that is used to defend against piracy for secure multimedia content distribution. In particular we are interested in anonymous rebroadcasting type of attack where the attackers redistribute the per-content encrypting key or decrypted plain content. Traitor tracing technology can be used to defend against this attack by identifying the original users ...

Journal: :The Journal of Korea Information and Communications Society 2012

2003
Dongkyun Kim Chai-Keong Toh Juan-Carlos Cano Pietro Manzoni

Many protocols used in Mobile Ad Hoc Networks rely on the broadcasting capability, especially when performing a route discovery process. However, an efficient broadcasting protocol should be devised to reduce the unnecessary redundant rebroadcasting at some nodes (redundancy) as well as to increase the coverage area as much as possible (reachability). A few approaches have been developed in the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید