• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 704
  • 171
  • 151
  • 112
  • 74
  • 63
  • 56
  • 45
  • 21
  • 18
  • 17
  • 15
  • 15
  • 8
  • 7
  • Tagged with
  • 1715
  • 1104
  • 598
  • 393
  • 305
  • 297
  • 238
  • 236
  • 180
  • 164
  • 149
  • 117
  • 107
  • 104
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A MAC Protocol Supporting Quality of Service by Bandwidth Reservation Scheme in Mobile Ad Hoc Wireless Network

Huang, Chien-Che 10 August 2004 (has links)
This paper proposed BRQ (Bandwidth-Reservation QoS scheme) for mobile Ad-Hoc wireless network. Unlike many schemes about IFS or backoff time interval of DCF in IEEE 802.11, BRQ uses the bandwidth reservation mechanism to support QoS. Because of the compatibility of BRQ with other schemes, we believe that BRQ scheme can achieve higher performance by integrating with other schemes. We evaluate the performance of BRQ, DCF in IEEE 802.11, EDCF in 802.11e, and BRQ+ (the combined scheme of BRQ and EDCF) in terms of their differentiation capability, network throughput, and average end-to-end delay. The simulation results demonstrate the effectiveness of the BRQ scheme and show that the BRQ+ scheme can achieve higher performance by integrating BRQ and EDCF.
12

Caching Strategies for Dynamic Source Routing in Mobile Ad Hoc Networks

Chan, Chi-Chen 13 February 2007 (has links)
The Dynamic Source Routing (DSR) protocol usually utilizes route caching to reduce the routing overhead and route discovery latency. For caches to be effective, the protocol needs to adapt to the frequent topology changes. In this paper, we propose two mechanisms to improve cache correctness and route stability. The first is the RERR-Enhance mechanism in which a broken link message will be sent to all nodes that had cached the broken link. The second mechanism is the hierarchical link cache structure accompanied with a link stability measurement. The cache in each node falls into two tiers: the primary cache and the secondary cache. The node selects a route from the primary cache first, based on link stability, to provide stable transmission. The proposed mechanism reduces at least 13% of the broken link messages; it also reduces routing overhead and end-to-end delay, compared to DSR with path caches and with Link-MaxLife, an adaptive timeout mechanism for link caches.
13

Establish A Secure Environment in Ad Hoc Network

Tsai, Bing-Hung 20 August 2003 (has links)
Lately, the security in wireless network is always a really hot topic. With the popularity of wireless network in our daily life day after day, the issues of connection speed have evolved to emphasize on personal privacy and information security. Due to the complication of membership in wireless network, it is hard to identify every member. We can reference to the security mechanism in wired network, and try to modify it to fit in wireless network. Of course, the wireless devices do not have such strong processing power and resources as personal computers or servers. So when we try to modify the security mechanism in wired network, we should think about the difference between wired and wireless devices. In this paper, we use a special method to establish Ad Hoc network architecture, and SSL ( Security Sockets Layer ) security protocol. Because SSL has been widely implemented and is now the main standard for providing security e-commerce transactions over the Web. Besides, we use ECC ( Elliptic Curve Cryptosystems ) to replace traditional RSA. Though RSA is the most widely used public key cryptosystem today, the implementation of RSA requires expensive computation. Since battery/computing power and bandwidth are scarce in mobile and wireless systems, the use of a computationally intensive cryptosystem, such as RSA, is not a feasible choice in such environments. Then we can establish a security environment in Ad Hoc network. We hope we can take a excellent balance between security and processing complexity. This paper goes toward the direction, and tries to move SSL to wireless networks. We believe that it is a method to give consideration to practical utility and ideal.
14

Modèles et mécanismes multiniveaux pour les réseaux sans fil

Issoufou Tiado, Mahamadou Beylot, André-Luc. January 2006 (has links)
Reproduction de : Thèse de doctorat : Informatique et télécommunications : Toulouse, INPT : 2006. / Titre provenant de l'écran-titre. Bibliogr. 79 réf.
15

Clusterisation et conservation d'énergie dans les réseaux ad hoc hybrides à grande échelle

Jemili, Imen Castanet, Richard. Belghith, Abdelfattah. January 2009 (has links) (PDF)
Thèse de doctorat : Mathématiques et informatique. Informatique : Bordeaux 1 : 2009. / Titre provenant de l'écran-titre.
16

Verteilte Zugangskontrolle in offenen Ad-hoc-Netzen

Kraft, Daniel January 2006 (has links)
Zugl.: Karlsruhe, Univ., Diss., 2006
17

Ad-hoc-Publizität nach dem Anlegerschutzverbesserungsgesetz verschärfte Anforderungen an die ordnungsgemässe Erfüllung und daraus resultierende Erhöhung der Haftungsrisiken

Monheim, Benjamin January 2006 (has links)
Zugl.: Köln, Univ., Diss., 2006
18

Räumlich begrenzte Datenreplikation in mobilen ad hoc Netzwerken

Neynens, Mario. January 2004 (has links)
Stuttgart, Univ., Diplomarb., 2004.
19

Erweiterung eines adaptiven und interaktiven Systems für die Analyse von Algorithmen zur Datenverwaltung in mobilen Ad-hoc-Netzen

Fritsch, Serena. January 2004 (has links)
Stuttgart, Univ., Diplomarb., 2004.
20

Untersuchung von Verfahren zur Partitionserkennung in mobilen ad-hoc Netzen

Koch, Gerald Georg. January 2005 (has links)
Stuttgart, Univ., Studienarbeit, 2005.

Page generated in 0.0282 seconds