The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Connected Dominating Set (CDS) is a subset V′ of V for the graph G(V, E) and induces a connected sub graph, such that each node in V -- V′ is at least adjacent to one node in V′. CDSs have been proposed to formulate virtual backbones in wireless ad-hoc sensor networks to design routing protocols for alleviating the serious broadcast storms problem. It...
A connected dominating set (CDS) performs a vital role in wireless ad-hoc sensor networks, which can establish virtual backbones and thus leads to less maintenance overhead and information exchanges in wireless communications. In the literature, many distributed algorithms applied in wireless ad-hoc sensor networks have been proposed. However, we find many of these algorithms are divided into different...
Node localization technology is one of the important supporting technology for wireless sensor network??DIn most applications??Csuch as object monitor and track, location router, determining the physical positions of sensor nodes is the basic requirements??DThe paper proposes a localization algorithm for wireless sensor networks base on location information between multiple nodes, The simulation results...
Due to the high flexibility, mobility and low cost features, wireless ad hoc networks are widely used. A particularly challenging problem is how to feasibly detect and defend the major attacks against routing protocols of such networks that have susceptible links and dynamic topology. Most of the existing secure routing protocols for ad hoc networks either avoid the most challenging internal attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.