71 |
Content-based multicast in ad hoc networksZhou, Hu 22 June 2000 (has links)
An important objective of tactical ad hoc networks is to deliver threat information
from sensors to shooters efficiently and quickly. The information sent
to a particular shooter should contain warnings about threats that are within
some distance and/or within some time of the shooter's current location. In this
thesis we develop a novel multicast model that distributes this form of threat
information in a message efficient manner. In addition, information about allied
force can also be distributed in a similar way. We present results from extensive
simulations that demonstrate the efficiency of our protocol and discuss the
scalability of this model to larger networks. / Graduation date: 2001
|
72 |
CAD-HOC a CAD like tool for generating mobility benchmarks in ad-hoc networks /Shah, Subodh, January 2001 (has links) (PDF)
Thesis (M.S.)--University of Florida, 2001. / Title from first page of PDF file. Document formatted into pages; contains xiii, 90 p.; also contains graphics. Vita. Includes bibliographical references (p. 85-89).
|
73 |
Efficient failure detection protocols for point-to-point communication networks /Dahlgren, Jeremy. January 2004 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2004. / Typescript. Includes bibliographical references (p. 109-110).
|
74 |
Automatic validation of secure authentication protocolsKim, Kyoil, January 2003 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.
|
75 |
A receiver-initiated MAC protocol with enhancements for multi-hop wireless networksThind, Balvinder Kaur, January 2004 (has links) (PDF)
Thesis (M.S.)--Washington State University. / Includes bibliographical references.
|
76 |
Quality of service aware source initiated ad-hoc routingVik, Knut-Helge, January 2004 (has links) (PDF)
Thesis (M.S.)--Washington State University. / Includes bibliographical references.
|
77 |
Bluesim a Bluetooth LAN Access Profile simulator /Parvatham, Sasidhar. January 2002 (has links)
Thesis (M.S.)--University of Florida, 2002. / Title from title page of source document. Includes vita. Includes bibliographical references.
|
78 |
SALM : an efficient application-level multicast protocol for dynamic groups /Wong, Wan-Ching. January 2003 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 75-79). Also available in electronic version. Access restricted to campus users.
|
79 |
The extensible run-time infrastructure (XRTI) : an experimental implementation of proposed improvements to the high level architecture /Kapolka, Andrzej. January 2003 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Michael Zyda, Bret Michael. Includes bibliographical references (p. 111-114). Also available online.
|
80 |
Hop integrity: a defense against denial-of-service attacksHuang, Chin-Tser 28 August 2008 (has links)
Not available / text
|
Page generated in 0.0687 seconds