• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 24,165
Next 10 →

Table 1: Applications of ad hoc networks

in Models of authentication in ad hoc networks and their related network properties
by Katrin Hoeper, Guang Gong
"... In PAGE 2: ... 1.1 Applications We summarize some current and future applications of ad hoc networks in Table1 . The applications listed in the table are sorted by their area of use, network devices, and communication model.... ..."
Cited by 1

Table 12: Properties of ad hoc networking

in unknown title
by unknown authors
"... In PAGE 10: ...able 11. Challenges in concurrent engineering.................................................................... 59 Table12 .... In PAGE 75: ... The union of these forms an arbitrary topology, which may change rapidly and unpredictably. Table12 shows the properties of ad hoc networking, adapted from (Thonet, 2004). 1.... ..."

Table 1: Properties of the ad hoc network environment.

in ANMP: Ad hoc network Network Management Protocol
by Wenli Chen Nitin, Wenli Chen, Nitin Jain, Suresh Singh 1999
Cited by 6

Table 2: Authentication models for ad hoc networks

in Models of authentication in ad hoc networks and their related network properties
by Katrin Hoeper, Guang Gong
Cited by 1

Table 2. System parameters in ad hoc networks

in MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance
by Ming Hu, et al.
"... In PAGE 5: ...oss factor is 2:5. The coverage range is 200m. The average SNR on the boundary for the single antenna case is 0 dB, and multi-rate transmission is used. The common parameters used in both cases are summarized in Table2 (see also, [1]). Using the practical parameters from D-Link, the information-bearing data rate and the SNR (after the processing of spatial diversity) satisfy the relationship as in Table 3.... In PAGE 7: ... We also study the impact of SD-MAC, rate adaptation strategies, and contention on the hop distance. The parameters used in the following examples are the same as in Table2 . We assume that the total transmission power of each node is 20dBm and the path loss factor is 2.... ..."

Table 2: Performance Metrics.

in
by unknown authors
"... In PAGE 5: ... When there is a constraint in the consistency requirement, the goal is to minimize the response time measure by identifying the best geographical community of interest area size while satisfying the imposed consistency requirement, when given a set of model parameters identified and parameterized characterizing the operational conditions of the mobile application in ad hoc networking environments. Table2 summarizes the performance metrics identified to evaluate location-based data consistency protocols in mobile ad hoc networks. Table 2: Performance Metrics.... ..."

Table 1: Classi cation of mobile hosts by parameters Quite often, low-mobility environments are associated with high bandwidths and high- mobility environments with relatively lower bandwidths [16]. Therefore, in our architecture, Super-MHs are assumed to have lower mobility than Mini-MHs. As a matter of fact, it is expected that a layer of hierarchy in ad hoc network architecture can be subdivided if we consider more parameters that a ect the classi cation of mobile hosts apos; types. This is an area for further research.

in A Routing Protocol for Physically Hierarchical Ad Hoc Networks
by Young-bae Ko, Nitin H. Vaidya 1997
"... In PAGE 3: ... However, mobile hosts participating in real ad hoc networks may be classi ed by some parameters, such as transmit capacity and moving speed. Table1 shows one way to classify mobile hosts into Mini- and Super- mobile hosts. A Super-Mobile Host (Super-MH) refers to a mobile host having large transmission power level, whereas a Mini-Mobile Host (Mini-MH) refers to one having relatively small transmission capacity.... ..."
Cited by 9

Table 1 summarizes the various approaches to cooperation and their respective features as discussed in the last two sections.

in Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices
by M. -o. Killijian, M. Banâtre, C. Bryce, L. Blain, P. Couderc, L. Courtès, Y. Deswarte, D. Martin-guillerez, R. Molva, N. Oualha, D. Powell, Y. Roudier, I. Sylvain, M. -o. Killijian Α, M. Banâtre Β, C. Bryce Β, L. Blain Α, P. Couderc Β, L. Courtès Α, Y. Deswarte Α, D. Martin-guillerez Β, R. Molva Χ, N. Oualha Χ, D. Powell Α, Y. Roudier Χ, I. Sylvain Α 2006
"... In PAGE 61: ... Table1 Cooperation enforcement schemes in various applications Validation techniques In the context of self-organizing networks like for instance wireless mobile ad hoc networks, cooperative mechanisms have to be investigated in terms of performance, fairness, and resilience to attacks, as well as cooperation enforcement. 7.... ..."
Cited by 2

Table 1. Common simulation parameters.

in Multicast Overlay Spanning Tree Protocol for Ad Hoc Networks
by Georgios Rodolakis, Amina Meraihi Naimi, Anis Laouiti 2007
"... In PAGE 8: ... We also present some protocol performance measures in a mobile ad hoc network environment. In Table1 , we summarize the parameters that are common for all our simulations. Comparison of Multicast and Unicast Performance We measure the av-... ..."
Cited by 1

Table 3.2: Comparison of OA MAC Algorithms in Ad-Hoc Networks

in Dedicated to
by Shoaib Tariq, My Loving
Next 10 →
Results 11 - 20 of 24,165
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University