Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The message delivery ratio of mobile opportunistic networks strongly depends on the transmission time, which is closely related either to the mobility of users and to the communication properties of the mobile devices. A larger radio transmission range allows longer contact durations, improving the message dissemination. Furthermore, user mobility is a crucial factor to be considered, especially when...
Detecting malicious and selfish nodes in mobile and wireless networks is a task that typically relies on watchdog techniques. However, such medium overhearing techniques are prone to cause a high energy consumption. In this paper we propose a distributed time division-based monitoring strategy to achieve the high security levels required while consuming less energy. Our proposal involves both trust...
Air pollution monitoring has become an essential requirement for cities worldwide. Currently, the most extended way to monitor air pollution is via fixed monitoring stations, which are expensive and hard to install. To solve this problem, we have developed EcoSensor, a solution to monitor air pollution through mobile sensors. It is deployed with off-the-shelf hardware such as Waspmote (based on the...
The duration of batteries is a key factor that must be considered in the design and deployment of applications and services on mobile devices. The users of this technology are not aware of the energetic impact of the applications executing in their devices, especially if these applications present an adaptive behavior.
Message oriented middleware (MOM) refers to the software infrastructure supporting sending and receiving messages between distributed systems. AMQP and MQTT are the two most relevant protocols in this context. They are extensively used for exchanging messages since they provide an abstraction of the different participating system entities, alleviating their coordination and simplifying the communication...
Research works regarding vehicular communications usually obviate assessing the proposals in scenarios including adverse vehicle densities, despite such scenarios are quite common in real urban environments. In this paper, we study the effect of these hostile conditions on the performance of different schemes providing warning message dissemination. We then propose the Junction Store and Forward (JSF)...
Mobile ad-hoc networks (MANETs) rely on network cooperation schemes to work properly. Nevertheless, if nodes have a selfish behaviour and are unwilling to cooperate, the overall network performance could be seriously affected. The use of watchdogs is a well-known mechanism to detect selfish nodes. In this paper we propose a collaborative watchdog approach, which is based on the fast diffusion of selfish...
Powered by digital transmission advances in recent years, wireless sensor networks (WSNs) are beginning to experience a boom in different areas. Of special interest are those applications offering real-time tracking and monitoring of objects in motion, both indoors and outdoors. A WSN can have a large number of nodes, each with multiple neighbor nodes. These nodes work together to create a self-configuring...
IP auto-configuration in mobile ad hoc networks has attracted much attention. Efficient DAD (duplicate address detection) techniques should be devised to provide each node with its unique address in the network. Generally, DAD schemes can be categorized into two classes: (a) active DAD and (b) passive DAD. In this paper, we focus on passive DAD schemes over on-demand ad-hoc routing protocols such...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.