• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 519
  • 119
  • 66
  • 61
  • 50
  • 42
  • 17
  • 15
  • 12
  • 12
  • 7
  • 6
  • 6
  • 4
  • 4
  • Tagged with
  • 1103
  • 1103
  • 590
  • 374
  • 304
  • 287
  • 238
  • 230
  • 158
  • 149
  • 138
  • 106
  • 103
  • 99
  • 93
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Secure and efficient wireless ad hoc networking

Khabbazian, Majid 11 1900 (has links)
Wireless ad hoc networks have been emerged to support applications, in which it is required/desired to have wireless ommunications among a variety of devices without relying on any infrastructure or central managements. In ad hoc networks, wireless devices, simply called nodes, have limited transmission range. Therefore, each node can directly communicate with only those within its transmission range and requires other nodes to act as routers in order to communicate with out-of-range estinations. One of the fundamental operations in ad hoc networks is broadcasting, where a node sends a message to all other nodes in the network. This can be achieved through flooding, in which every node transmits the first copy of the received message. However, flooding can impose a large number of redundant transmissions, which can result in significant waste of constrained resources such as bandwidth and battery power. One of the contributions of this work is to propose efficient broadcast algorithms which can significantly reduce the number of redundant transmissions. We also consider some of the security issues of ad hoc networks. In particular, we carefully analyze the effect of the wormhole attack, which is one of the most severe threats against ad hoc networks. We also propose a countermeasure, which is an improvement over the existing timing-based solutions against the wormhole attack. Finally, in the last chapter, we propose novel point compression techniques which can be used in Elliptic Curve Cryptography (ECC). ECC can provide the same level of security as other public key cryptosystems (such as RSA) with substantially smaller key sizes. Smaller keys can result in smaller system parameters, bandwidth savings, faster implementations and lower power consumption. These advantages make ECC interesting for ad hoc networks with restricted devices.
32

A MAC Protocol for Multihop RP-CDMA Ad Hoc Wireless Networks

Mortimer, Richard T Unknown Date
No description available.
33

Stabile Kommunikation in dynamischen Ad-hoc-Netzen

Gerharz, Michael January 2006 (has links)
Zugl.: Bonn, Univ., Diss., 2006
34

Evaluierung von partitionierungsbewußten MANET Protokollen mit ns-2

Dietrich, Rüdiger Oliver. January 2005 (has links)
Stuttgart, Univ., Studienarbeit, 2005.
35

Routing protocols for mobile ad hoc networks classification, evaluation and challenges

Lang, Daniel January 2006 (has links)
Zugl.: München, Techn. Univ., Diss., 2006 u.d.T.: Lang, Daniel: On the evaluation and classification of routing protocols for mobile ad hoc networks / Hergestellt on demand
36

Insiderrecht und Ad-hoc-Publizität nach dem Anlegerschutzverbesserungsgesetz

Eichner, Moritz Peter January 2008 (has links)
Zugl.: Tübingen, Univ., Diss., 2008
37

Entwicklung eines energieeffizienten Dienstauffindungsverfahrens für mobile ad-hoc Netzwerke

Lechler, Renate. January 2005 (has links)
Stuttgart, Univ., Diplomarb., 2005.
38

Region-based adaptation of diffusion protocols in MANETs

Kabir, Mashud. January 2003 (has links)
Stuttgart, Univ., master thesis, 2003.
39

Konzeption und Implementierung eines ortsbezogenen Ad-Hoc Routing Protokoll für die Linux Plattform

Klinger, Richard. January 2003 (has links)
Stuttgart, Univ., Diplomarb., 2003.
40

Energieeffiziente Dienstnutzung in spontan vernetzten ubiquitären Rechnersystemen

Lange, Ralph. January 2005 (has links)
Stuttgart, Univ., Studienarb., 2005.

Page generated in 0.0402 seconds