Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Ad Hoc Networks
ELSEVIER
 
   
 
Options:
 
  1-10 of 26 reviews Date Reviewed 
  A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Tsao K., Girdler T., Vassilakis V. Ad Hoc Networks 1332022.  Type: Article

FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to more established mobile ad hoc net...

Feb 8 2024
  Federated IoT services leveraging 5G technologies at the edge
Farris I., Orsino A., Militano L., Iera A., Araniti G. Ad Hoc Networks 68 58-69, 2018.  Type: Article

The highly anticipated fifth generation of wireless mobile technology is called 5G. It promises to enable innovative services and applications that require huge performance increases. Among the uses for the Internet of Things (IoT), ma...

Feb 21 2018
  Recovery from simultaneous failures in a large scale wireless sensor network
Chouikhi S., El Korbi I., Ghamri-Doudane Y., Azouz Saidane L. Ad Hoc Networks 67 68-76, 2017.  Type: Article

Wireless sensor networks (WSNs) are an appealing choice for applications such as environmental monitoring due to the capability to deploy massive amounts of cheaper sensor nodes and manage them in a distributed fashion. An important pr...

Feb 14 2018
  A survey of attacks and detection mechanisms on intelligent transportation systems
Sakiz F., Sen S. Ad Hoc Networks 61 33-50, 2017.  Type: Article

A vehicle ad hoc network (VANET) is a mobile ad-hoc network (MANET) consisting of vehicles and roadside units (RSUs). VANETs are a key technology for future smart car services such as accident alerting, regional traffic information sha...

Feb 14 2018
  Building the Internet of Things with Bluetooth Smart
Raza S., Misra P., He Z., Voigt T. Ad Hoc Networks 57 19-31, 2017.  Type: Article

The paper looks at the current state of Bluetooth Low Energy (BLE) as a communication platform to connect resource-constrained devices to the Internet, and presents a purportedly first-of-its-kind open hardware and open-source port def...

Aug 23 2017
  A maximum flow algorithm based on storage time aggregated graph for delay-tolerant networks
Li H., Zhang T., Zhang Y., Wang K., Li J. Ad Hoc Networks 59(C): 63-70, 2017.  Type: Article

Searching for maximum flow in a network based on graph theory is essential in planning the route and scheduling transmission. Therefore, it is natural to study the maximum flow on various types of networks. While traditional maximum fl...

May 26 2017
  Fairness and high-throughput scheduling for multihop wireless ad hoc networks
Liu Q., Leung K., Li V., Zhao Z., Yang G., Cui L. Ad Hoc Networks 52(C): 195-206, 2016.  Type: Article

Multihop wireless ad hoc networks are useful in an infrastructure-less environment because it is possible to deploy a network rapidly over a large area. A key issue of multihop wireless networks is that the quality of a multihop connec...

May 10 2017
  Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks
Salehi M., Boukerche A., Darehshoorzadeh A. Ad Hoc Networks 5088-101, 2016.  Type: Article

The primary aim of opportunistic routing for wireless networks is to improve resilience and increase the probability that data will be delivered from the source node through to the intended destination. The key difference with standard...

Nov 16 2016
  Application of hierarchical and distributed cognitive architecture management for the smart grid
Palicot J., Moy C., Résimont B., Bonnefoi R. Ad Hoc Networks 41(C): 86-98, 2016.  Type: Article

Traditional cognitive radio architecture management aims at the reconfiguration of radio access based on the current radio channel status for a second user so that the second user does not interfere with the first user of the radio cha...

Oct 11 2016
  Towards a big data system disaster recovery in a private cloud
Chang V. Ad Hoc Networks 35(C): 65-82, 2015.  Type: Article

Big data is having more and more of an impact on organizations and has business value so the data dare not be lost. This paper covers the role that disaster recovery (DR) needs to play for big data systems in being able to recover from...

Jul 11 2016
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy