The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since mobile ad hoc networks do not have fixedor predefined infrastructures, nodes need to frequently floodcontrol messages to discovery and maintain routes, whichcauses performance problems in traffic and energy consumption, contention, and collision. A general solution is to constructa virtual backbone as the basis of routing and broadcasting, and the Connected Dominating Set (CDS) has been widely...
Since ad hoc networks do not have fixed or predefined infrastructures, nodes need to frequently flood control messages to discover and maintain routes, which causes performance problems in terms of unnecessary traffic and energy consumption, contention, and collision. A general solution is to construct a virtual backbone as the basis of routing and broadcasting, and the Connected Dominating Set (CDS)...
In the disaster-hit area, communication supporting systems using the existing mobile ad hoc network technique could not function as expected and communication would be interrupted from time to time, since they have not taken into consideration the issue of sleep, which is a very frequently used means for users to save their battery consumption. Especially, a phenomenon called sleep thrashing may occur,...
It was found that at the disaster-hit area, communication supporting systems using the existing mobile ad hoc network technique could not function as expected, and a communication process between two end users would be interrupted from time to time. This is because existing techniques have not taken into consideration the sleep operation of mobile users, which is a very common and frequently-used...
For an Android-powered device, its security is established such that an application, when it is installed, declares the functions and other information that it will use, and user approves or rejects the declaration according to reviewing results. The problem is that, however, it is difficult for users to completely understand the details of a declaration, and careless users may neglect the approval...
Recently, the use of sensor networks has become common in various application areas involving military affairs, environmental protection, medical care, agriculture, and so forth. As a result, it becomes important to pay attention to the security issues on sensor networks so as to avoid information leakages. This paper proposes a routing-based approach against the radio-wave signal eavesdropping to...
A typical recommendation system answers such questions as what are the interesting items for the current user. Most traditional recommendation systems have not taken the situational information into account when making recommendations, which seriously limits their effectiveness in the ubiquitous computing application environment, where a user's request is generally related to, and a system's response...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.