Search
w/in this Title
for Titles
All Reviews
Ad Hoc Networks
ELSEVIER
Options:
Date Reviewed
Title
Author
Publisher
Published Date
Descending Order
Ascending Order
1-10 of 26 reviews
Date Reviewed
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Tsao K., Girdler T., Vassilakis V. Ad Hoc Networks 1332022. Type: Article
FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to more established mobile ad hoc net...
Feb 8 2024
Federated IoT services leveraging 5G technologies at the edge
Farris I., Orsino A., Militano L., Iera A., Araniti G. Ad Hoc Networks 68 58-69, 2018. Type: Article
The highly anticipated fifth generation of wireless mobile technology is called 5G. It promises to enable innovative services and applications that require huge performance increases. Among the uses for the Internet of Things (IoT), ma...
Feb 21 2018
Recovery from simultaneous failures in a large scale wireless sensor network
Chouikhi S., El Korbi I., Ghamri-Doudane Y., Azouz Saidane L. Ad Hoc Networks 67 68-76, 2017. Type: Article
Wireless sensor networks (WSNs) are an appealing choice for applications such as environmental monitoring due to the capability to deploy massive amounts of cheaper sensor nodes and manage them in a distributed fashion. An important pr...
Feb 14 2018
A survey of attacks and detection mechanisms on intelligent transportation systems
Sakiz F., Sen S. Ad Hoc Networks 61 33-50, 2017. Type: Article
A vehicle ad hoc network (VANET) is a mobile ad-hoc network (MANET) consisting of vehicles and roadside units (RSUs). VANETs are a key technology for future smart car services such as accident alerting, regional traffic information sha...
Feb 14 2018
Building the Internet of Things with Bluetooth Smart
Raza S., Misra P., He Z., Voigt T. Ad Hoc Networks 57 19-31, 2017. Type: Article
The paper looks at the current state of Bluetooth Low Energy (BLE) as a communication platform to connect resource-constrained devices to the Internet, and presents a purportedly first-of-its-kind open hardware and open-source port def...
Aug 23 2017
A maximum flow algorithm based on storage time aggregated graph for delay-tolerant networks
Li H., Zhang T., Zhang Y., Wang K., Li J. Ad Hoc Networks 59(C): 63-70, 2017. Type: Article
Searching for maximum flow in a network based on graph theory is essential in planning the route and scheduling transmission. Therefore, it is natural to study the maximum flow on various types of networks. While traditional maximum fl...
May 26 2017
Fairness and high-throughput scheduling for multihop wireless ad hoc networks
Liu Q., Leung K., Li V., Zhao Z., Yang G., Cui L. Ad Hoc Networks 52(C): 195-206, 2016. Type: Article
Multihop wireless ad hoc networks are useful in an infrastructure-less environment because it is possible to deploy a network rapidly over a large area. A key issue of multihop wireless networks is that the quality of a multihop connec...
May 10 2017
Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks
Salehi M., Boukerche A., Darehshoorzadeh A. Ad Hoc Networks 5088-101, 2016. Type: Article
The primary aim of opportunistic routing for wireless networks is to improve resilience and increase the probability that data will be delivered from the source node through to the intended destination. The key difference with standard...
Nov 16 2016
Application of hierarchical and distributed cognitive architecture management for the smart grid
Palicot J., Moy C., Résimont B., Bonnefoi R. Ad Hoc Networks 41(C): 86-98, 2016. Type: Article
Traditional cognitive radio architecture management aims at the reconfiguration of radio access based on the current radio channel status for a second user so that the second user does not interfere with the first user of the radio cha...
Oct 11 2016
Towards a big data system disaster recovery in a private cloud
Chang V. Ad Hoc Networks 35(C): 65-82, 2015. Type: Article
Big data is having more and more of an impact on organizations and has business value so the data dare not be lost. This paper covers the role that disaster recovery (DR) needs to play for big data systems in being able to recover from...
Jul 11 2016
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy