搜索资源列表
JECR-2005
- In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to realize outdoor independent learning for mobile learners. The mobile butterfly-watching learning system was designed in a wireless mobile ad-hoc le
baseAgent
- 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a
AdHoc
- Ad Hoc网是一种不依赖于任何固定基础设施、没有中心控制节点、计算资源受限的新型无线移动网络.基于ECC(elliptic curves cryptography),提出了一个新的适用于Ad Hoc网的具有口令认证和共享口令进化的多方密钥协商方案.口令的一个功能是作为共享信息认证移动节点的密钥,另一个功能是作为对称密钥加密移动节点间的交互信息.共享口令进化机制保证每次认证节点密钥和协商会话密钥时口令的新鲜性和安全性,从而既减轻了移动节点的计算量和存储负担,又实现了移动节点之间的密钥认证和信息加
Comparison-study-of-WSN-and--Ad-Hoc
- 无线传感器网络与传统AdHoc网络的比较研究.无线传感器网络是AdHoc 网络的几大应用领域之一, 但与传统Ad Hoc 网络比有差异, 传统Ad Hoc 网络的协议大部分都不适合于无线传感器网络, 文中从体系结构、协议栈和应用方面对无线传感器网络和传统Ad Hoc 网络进行比较和分析-Wireless sensor networks and traditional comparative study of AdHoc network for wireless sensor network is
vanet
- 车载自组网的发展与现状,包括网络结构 主要特点,应用举例,难点与重点,研究现状,物理层参数,MAC 层协议,帧结构,接入方式,802.11DCF,RR-ALOHA,CSMA/CA 和RR-ALOHA 的比较,路由协议 -Vehicle Development and Status of ad hoc networks, including the main features of network structure, application examples, difficulties wi
2008062710270155421
- ad hoc wireless networks-wireless
dsr-chapter00
- The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
ucMultiIfacesSupport(3).pdf.tar
- Multi interface implementation document for NS-2 for ad hoc network
Cormio_2009_Ad-Hoc-Networks_A_survey_on_MAC_protoc
- 认知无线电中MAC层协议的综述性文章,很全面,值得一看。-A survey on MAC protocols for cognitive radio networks Claudia Cormio , Kaushik R. Chowdhury
adhoc_tutorial_PPT
- 详细介绍无线多跳adhoc网络的PPT.包括网络中的MAC层和路由层介绍、常用的协议算法,存在的问题,TCP与UDP协议性能比较,安全问题等,有助于了解Ad hoc网络的概况 -Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer descr iption of the protocol algorithm used, problems,
RoutingSecurity
- propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the r
NewImplementatio
- This paper addresses mobile ad-hoc network (MANET) simulations with the simulation tool network simulator NS-2. Since the simulation software does not include advanced protocols and sophisticated mobile network nodes new implementations have been
FTSP
- Time Sync Protocol for ad hoc networks
Ali_Hamidian.tar
- A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 a wonderful thesis.
Client
- This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. The algorithm, which is called Minimum Distance P
SGMW-AD-plan
- 上汽通用五菱年度推广与广告传播计划,做汽车的人都在找的-SAIC-GM-Wuling annual promotion and advertising communication plan, the car people are looking for
aodv
- ad hoc on demand distance vector routing protocol in c-ad hoc on demand distance vector routing protocol in c++
ad-hoc
- 本文讨论了在未来无线通信中ad hoc网络的作用。Ad hoc网络可以分为:拥有大尺寸和小尺寸的ad hoc网络,在各种情形下集成的ad hoc网络,未来移动接入网络中蜂窝ad hoc网络。蜂窝 ad hoc网络可能成为一种很有前途的解决方案。-This article discusses the future of wireless communications in ad hoc network effect. Ad hoc networks can be divided into: wit
A-Cooperative-MAC-protocol-for-Ad-Hoc-Wireless-Ne
- A Cooperative MAC protocol for Ad Hoc Wireless Networks
Research-on-Ad-Hoc-based-on-QBD
- 基于拟生灭过程的无线Ad Hoc网络若干技术研究, 利用生灭过程和拟生灭过程对Ad Hoc网络的分簇算法、节点故障维护策略以及MAC层接入协议技术进行了建模和分析-Research on technologies in wireless Ad Hoc network based on Quasi-birth-and-death process, based on birth-and-death and quasi-birth-and-death stochastic process, resea