The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Some ad hoc network scenarios are characterized by frequent partitions and intermittent connectivity. A store-and-forward network architecture known as the disruption tolerant network (DTN) has been designed for such challenging network environments. To further improve the delivery performance, some researchers have proposed some network coding schemes for DTNs. However, not much papers discuss the...
Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption tolerant network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. Recently, network coding schemes for DTN has been proposed. However, these schemes work well only in scenarios...
Mobile nodes in some challenging network scenarios suffer from intermittent connectivity and frequent partitions e.g. battlefield and disaster recovery scenarios. Disruption tolerant network (DTN) technologies are designed to enable nodes in such environments to communicate with one another. In the past, we have proposed two intradomain multicast routing schemes, namely the context-aware multicast...
Several intrusion detection approaches have been proposed for mobile ad hoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected adhoc network, nodes usually have very small number of neighbors. In addition, new history based routing schemes...
Several approaches have been proposed for intrusion detection in mobile ad hoc networks. Most of the approaches assume that there are sufficient neighbors to help monitor the transmissions and receptions of data packets by other nodes to detect abnormality. However, in a sparsely connected ad hoc network, nodes usually have very small number of neighbors. Using a traditional intrusion detection and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.