The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of emerging techniques for mobile resource sharing, content sharing, mobile social networks, and complex cyber-physical systems poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on Peer-to-Peer (P2P) systems. However, due to the difficulties caused by system mobility, wireless...
MANET as a new type of mobile wireless networks, its unique characteristics increase the difficulty of the management, in particular, the movement of nodes require more effective management of topology, which nearly pose a challenge. Thus, with the analysis of characteristic and application requirements of the ad hoc network, a new type of clustering algorithm is proposed based on energy which mainly...
Wireless mesh network (WMN) has become a popular access network architecture. But because of its multi-hop nature, co-channel interference and contention, the attainable capacity of a wireless node in a WMN is significantly less than the radio capacity. We propose a overlay architecture for a WMN, where a wireless-ring (WRing) is deployed over the regular mesh for carrying wireless mesh traffic only...
In this paper, we present an extended mobile backbone network topology synthesis algorithm (ETSA) for constructing and maintaining a dynamic backbone structure for mobile ad hoc wireless networks. We present and analyze the mathematical features of the proposed scheme. Using these results, we prove that: (1) The ETSA scheme converges in constant time; (2) The length of each control packet is bounded...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.