The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An ad hoc network is a decentralized network that consists of mobile nodes with wireless communication devices without the aid of access points. A Vehicular Ad-hoc Networks (VANETs) is one of the representative application of ad hoc networks. Epidemic Routing has been proposed as a routing protocol based on Store-Carry-Forward mechanism for VANETs environment. However, in Epidemic Routing, network...
Hiroshima City Children Tracking System is a safety support system for children based on ad hoc network technologies. Field experiments have been conducted in cooperation with an elementary school in Hiroshima. In this paper, we propose a new generation children tracking system which is based on experiences and findings of the field experiments for Hiroshima City Children Tracking System. Our proposed...
In mobile ad hoc networks, the status of the network changes over time due to the movement of terminals, the battery level of terminals, and so on. To construct assurance networks, it is necessary to consider requirements such as dependability, security, and adaptability against changes in the network. We had proposed a routing method, which is referred to as RSR (Route-Split Routing) for mobile ad...
In mobile ad hoc networks, the status of the network changes over time due to the movement of terminals, the battery level of terminals, and so on. To construct assurance networks, it is necessary to consider the requirements such as dependability, security, and adaptability against the change of the network. We have proposed a new routing method, which is referred to as MLR (Micro Loop Routing) for...
In wireless sensor networks, sensor nodes have limited computational power and memory size. The data is vulnerable to attack due to the nature of the systems, so maintaining confidentiality is an important problem. Most security methods are based on common or public key cryptosystems. However, these methods have problems with encryption of data. When nodes try to encrypt data, they must preestablish...
Recently, in Japan, crimes against children become atrocious and brutal. In some cases, children are attacked on the way to and back from school. Many technologies using ubiquitous networks have been developed to prevent crimes against children on their way to and back from school. Existing technologies, however, are not powerful to prevent crimes against children and helpful for parents since it...
Video communication is being popular by spreading broadband networks. Realization of this kind of communications is important to deploy IPv6. However, many almost of commercial video conference systems do not work in IPv6 networks. We developed an application gateway called as "PTGATE" to extend available scenes of video conferences. PTGATE has three functions: IPv4 over IPv6 tunneling to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.