Powered by Deep Web Technologies
Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

E-Print Network 3.0 - ad hoc query Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

query Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc query...

2

E-Print Network 3.0 - ad hoc queries Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

queries Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc queries...

3

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Broader source: Energy.gov (indexed) [DOE]

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

4

How to Make Ad Hoc Proof Automation Less Ad Hoc  

E-Print Network [OSTI]

How to Make Ad Hoc Proof Automation Less Ad Hoc Georges Gonthier1 Beta Ziliani2 Aleks Nanevski3 Software Institute, Madrid ICFP 2011, Tokyo #12;Why proof automation at ICFP? Ad hoc polymorphism Overloading terms Ad hoc proof automation Overloading lemmas "How to make ad hoc polymorphism less ad hoc

Dreyer, Derek

5

Seminar: Ad Hoc Networks Konrad Meier Seminar Ad Hoc Networks  

E-Print Network [OSTI]

1 Seminar: Ad Hoc Networks Konrad Meier Seminar Ad Hoc Networks Feasibility of an Aeronautical Mobile Ad Hoc Network Over the North Atlantic Corridor Daniel Medina, Felix Hoffmann, Serkan Ayaz;2 What is the idea? Ad Hoc Network in the North Atlantic Corridor ­ multihop air to air communication

Schindelhauer, Christian

6

Ad Hoc Meetings | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Ad Hoc Meetings Ad Hoc Meetings Ad Hoc Meetings 43.pdf More Documents & Publications Radio and Spectrum Management ICAM Workshop PKI Workshop...

7

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes January 17, 2008 Present: Diane Armpriest bag session (thresholds for data). The agenda item for the next ad hoc assessment committee

O'Laughlin, Jay

8

Transportation Plan Ad Hoc Working Group | Department of Energy  

Office of Environmental Management (EM)

Transportation Plan Ad Hoc Working Group Transportation Plan Ad Hoc Working Group Transportation Plan Ad Hoc Working Group More Documents & Publications Nuclear Fuel Storage and...

9

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes March 6, 2008 Present: Diane Armpriest, Jane to the ad hoc assessment committee list, the associate dean list, and the department chair list

O'Laughlin, Jay

10

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes September 26, 2008 Present: Diane Armpriest, Alton why we assess ­ develop meaning for work Share success stories #12;The future of the Ad Hoc

O'Laughlin, Jay

11

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes November 8, 2007 Present: Rula Awwad Rafferty timeline had been modified after input from the ad hoc assessment committee at its previous meeting

O'Laughlin, Jay

12

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes April 17, 2008 Present: Diane Armpriest, Rula. The consensus of the group was that the list should include ad hoc committee members, associate deans and on request. The ad hoc committee will not meet again this semester. Jeanne will call a meeting

O'Laughlin, Jay

13

Securing Ad Hoc Networks Lidong Zhou  

E-Print Network [OSTI]

Securing Ad Hoc Networks Lidong Zhou Department of Computer Science Zygmunt J. Haas School of Electrical Engineering Cornell University Ithaca, NY 14853 Abstract Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do

Schneider, Fred B.

14

Mobile Ad Hoc Networks Asis Nasipuri  

E-Print Network [OSTI]

1 Mobile Ad Hoc Networks Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network of base stations, make ad hoc networks radically different from other wireless LANs. Whereas communication

Nasipuri, Asis

15

Ad-Hoc Personenlokalisierung in Drahtlosen Sensornetzwerken.  

E-Print Network [OSTI]

??In der Arbeit wird ein neues Konzept zur ad-hoc Personenlokalisierung entwickelt und untersucht. Anstze aus dem Bereich der Lokalisierung in selbstkonfigurierenden, drahtlosen Sensornetzwerken sowie aus (more)

Schmid, Johannes

2012-01-01T23:59:59.000Z

16

AdHoc Probe: End-to-end Capacity Probing in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

AdHoc Probe: End-to-end Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen1 , Tony Sun2 and systematic study in ad hoc, multihop wireless networks is still lacking. Yet the rate of a wireless link can deployment. In this paper, we present AdHoc Probe, a packet-pair based technique, to estimate end-to-end path

Chen, Ling-Jyh

17

AD HOC SEMINAR PROPOSAL FORM Updated July 2009  

E-Print Network [OSTI]

AD HOC SEMINAR PROPOSAL FORM Updated July 2009 Law School Rule 312(2): Ad Hoc Seminars. A group their own ad hoc research and seminar program. A student may enroll in an ad hoc seminar in the summer session are eligible to enroll in an ad hoc seminar starting in the spring of their first year

Reif, John H.

18

Routing protocols in ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc networking involves computers, typically wireless mobile nodes (MNs), that cooperatively form a network without specific user administration or configuration. In other words, ad hoc networking allows an arbitrary collection of MNs to create a ... Keywords: associativity-based routing (ABR), distributed bellman-ford (DBF), dynamic source routing (DSR), on-demand routing protocols

Dan Galatchi; Roxana Zoican

2005-03-01T23:59:59.000Z

19

Assign Ad Hoc Reviewer Step-By-Step Procedure  

E-Print Network [OSTI]

Proposal Management Reviewer Assign Ad Hoc Reviewer Step-By-Step Procedure Last updated: 12/19/2013 1 of 2 http://eresearch.umich.edu Assign an Ad Hoc Reviewer Based on the information provided as a Reviewer. Anyone who has an account in the system can be added as an Ad Hoc Reviewer. Who Can Assign Ad Hoc

Shyy, Wei

20

CAD-HOC: A CAD Like Tool For Generating Mobility Benchmarks In Ad-Hoc Networks  

E-Print Network [OSTI]

CAD-HOC: A CAD Like Tool For Generating Mobility Benchmarks In Ad-Hoc Networks Subodh Shah , Edwin of using unrealistic mobility scenarios for simulation of ad-hoc routing protocols. We present CAD-HOC, a cousin tool to Network Simulator (ns), which allows ad-hoc networking experimentation to be performed

Helal, Abdelsalam

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Virtual infrastructure for wireless ad hoc networks  

E-Print Network [OSTI]

One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...

Gilbert, Seth, 1976-

2007-01-01T23:59:59.000Z

22

Intrusion detection in mobile ad hoc networks  

E-Print Network [OSTI]

Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line...

Sun, Bo

2005-08-29T23:59:59.000Z

23

2010 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc Networks  

E-Print Network [OSTI]

19-1 ©2010 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc NetworksOverview Characteristics, Applications, Issues Cellular vs. Ad Hoc Routing: Requirements, parameters, classification Dynamic Source Routing (DSR) Ad Hoc On-demand Distance Vector (AODV) Optimized Link State Routing (OLSR

Jain, Raj

24

2006 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc Networks  

E-Print Network [OSTI]

14-1 ©2006 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc Networks, Issues Cellular vs. Ad Hoc Routing: Requirements, parameters, classification Dynamic Source Routing (DSR) Ad Hoc On-demand Distance Vector (AODV) Optimized Link State Routing (OLSR) #12;14-3 ©2006 Raj

Jain, Raj

25

Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks Jon Arnold, Nigel Bean.sorell@adelaide.edu.au Abstract-- Wireless ad hoc networks provide a useful commu- nications infrastructure for the mobile Hoc Protocols, 802.11, Monitoring, Template Fitting, NS-2. I. INTRODUCTION Wireless Ad Hoc Networks

Roughan, Matthew

26

Distributed services for mobile ad hoc networks  

E-Print Network [OSTI]

DISTRIBUTED SERVICES FOR MOBILE AD HOC NETWORKS A Dissertation by GUANGTONG CAO Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2005 Major... Subject: Computer Science DISTRIBUTED SERVICES FOR MOBILE AD HOC NETWORKS A Dissertation by GUANGTONG CAO Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Cao, Guangtong

2005-11-01T23:59:59.000Z

27

Reliable Ad Hoc Group Communication using Local Neighborhoods  

E-Print Network [OSTI]

1 Reliable Ad Hoc Group Communication using Local Neighborhoods Lawrence Klos, Golden G. Richard Abstract - In this paper an enhanced reliability protocol added to the ODMRP multicast ad hoc protocol by operational phase. Index Terms ­ Mobile Networking, Ad Hoc Wireless, Multicast, Reliable, ODMRP. I

Richard III, Golden G.

28

Maintaining connectivity in a mobile ad hoc network  

E-Print Network [OSTI]

This thesis focuses on the problem of maintaining graphics. connectivity in a mobile ad hoc network. Mobile ad hoc networks are without a fixed topology and are dynamically changing. This makes the problem of maintaining connectivity among all nodes...

Reuben, Ron S.

2012-06-07T23:59:59.000Z

29

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

30

Node Connectivity in Vehicular Ad Hoc Networks with Structured Mobility  

E-Print Network [OSTI]

in vehicular networks; 2) we demonstrate, through simulation, the impacts of marco- and micro-mobility modelsNode Connectivity in Vehicular Ad Hoc Networks with Structured Mobility Ivan W. H. Ho, Kin K. Leung@cmu.edu Abstract1 Vehicular Ad hoc NETworks (VANETs) is a subclass of Mobile Ad hoc NETworks (MANETs). However

Leung, Kin K.

31

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

32

Ad Hoc Committee on Employment Policies May 4, 2000  

E-Print Network [OSTI]

Ad Hoc Committee on Employment Policies Report May 4, 2000 Respectfully submitted by: D. Quinn School of Government Sally Zeckhauser, Vice President for Administration #12;Ad Hoc Committee Executive Summary The Committee and Its Process President Rudenstine appointed the Ad Hoc Committee in April

Chou, James

33

Ad Hoc and Sensor Networks Santosh Kumar and Lan Wang  

E-Print Network [OSTI]

Ad Hoc and Sensor Networks Santosh Kumar and Lan Wang Dept. of Computer Science The University. Such an infrastructureless network is called an Ad Hoc network; more specifically, "a network that is setup, literally communication, an Ad Hoc network may be used for other purposes such as monitoring the physical environment

Wang, Lan

34

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

35

SBA: A Simple Backoff Algorithm for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

SBA: A Simple Backoff Algorithm for Wireless Ad Hoc Networks Tahiry RAZAFINDRALAMBO1 and Isabelle of ad hoc networks based on IEEE 802.11 DCF degrade when congestion increases. The issues concern SBA with IEEE 802.11 and several alternatives to 802.11 in ad hoc networks. We show that SBA achieves

Paris-Sud XI, Université de

36

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

37

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks Wei Yu, Yan Sun and K. J disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node AND BACKGROUND A mobile ad hoc network is a group of mobile nodes without requiring centralized administration

Sun, Yan Lindsay

38

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK  

E-Print Network [OSTI]

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and C¸etin Kaya Ko¸c2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

39

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

40

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DIFFUSION MECHANISMS FOR MULTIMEDIA BROADCASTING IN MOBILE AD HOC NETWORKS  

E-Print Network [OSTI]

DIFFUSION MECHANISMS FOR MULTIMEDIA BROADCASTING IN MOBILE AD HOC NETWORKS E. Baccelli Hitachi HSAL: Philippe.Jacquet@inria.fr ABSTRACT Scarce bandwidth and interferences in mobile ad-hoc networks yield in view to gain enough performance and allow applications such as multimedia diffusion in an ad hoc

Paris-Sud XI, Université de

42

Asynchronous Document Dissemination in Dynamic Ad Hoc Networks  

E-Print Network [OSTI]

Asynchronous Document Dissemination in Dynamic Ad Hoc Networks Frédéric Guidec, Hervé Roussain.Guidec|Herve.Roussain}@univ-ubs.fr Abstract This paper presents a document-oriented model for information dis- semination in dynamic ad hoc of which are capable of ad hoc communication. Our work aims at fostering the de- sign, the implementation

Paris-Sud XI, Université de

43

Effects of Beamforming on the Connectivity of Ad Hoc Networks  

E-Print Network [OSTI]

Effects of Beamforming on the Connectivity of Ad Hoc Networks Xiangyun Zhou, Haley M. Jones, Salman on the connectivity of wireless ad hoc networks. We study different beamforming techniques using the uniform circular information. Index Terms-- ad hoc networks, antenna arrays, beamforming, connectivity. I. INTRODUCTION Mobile

Zhou, Xiangyun "Sean"

44

Ad Hoc Positioning System (APS) Dragos Niculescu and Badri Nath  

E-Print Network [OSTI]

Ad Hoc Positioning System (APS) Dragos Niculescu and Badri Nath Computer Science Department Rutgers University Piscataway, NJ 08855 Abstract--Many ad hoc network protocols and applications assume the knowledge the aid of GPS in each node of an ad hoc network is im- portant in cases where GPS is either

Ha, Dong S.

45

Brief Contributions________________________________________________________________________________ Topology Control of Ad Hoc Wireless  

E-Print Network [OSTI]

________________________________________________________________________________ Topology Control of Ad Hoc Wireless Networks for Energy Efficiency Maggie X. Cheng, Member, IEEE, Mihaela, Yinfeng Xu, and Ding-Zhu Du Abstract--In ad hoc wireless networks, to compute the transmission power-complete problem. In this paper, we consider the approximated solutions for the MENC problem in ad hoc wireless

Wang, Lusheng

46

Group-based Ad-hoc Network for Multimedia Communications  

E-Print Network [OSTI]

Group-based Ad-hoc Network for Multimedia Communications \\ Koichiro Ban and Hamid Gharavi National is concerned with evaluating ad-hoc networks for group-oriented tactical operations. For such operations, a cellular-based ad-hoc network architecture has been constructed for real-time multimedia communications

47

Selective Backbone Construction for Topology Control in Ad Hoc Networks  

E-Print Network [OSTI]

Selective Backbone Construction for Topology Control in Ad Hoc Networks Haitao Liu and Rajiv Gupta,gupta}@cs.arizona.edu Abstract-- A key step in controlling topology in ad hoc networks is the construction of the backbone which. Keywords: Ad hoc networks, topology control, backbone, energy conservation. I. INTRODUCTION Multi

Gupta, Rajiv

48

Virtual Hierarchy Synthesis for Hybrid Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Virtual Hierarchy Synthesis for Hybrid Mobile Ad Hoc Networks Hyemee Park, Tae-Jin Lee ad hoc networks to fixed IP networks is one of the topics receiving more attention within the MANET working group of the IETF. In such integrated scenarios, commonly known as hybrid ad hoc networks, mobile

Lee, Tae-Jin

49

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and  

E-Print Network [OSTI]

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

Sen, Sevil

50

Supporting Dynamic Ad hoc Collaboration Capabilities  

SciTech Connect (OSTI)

Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

Agarwal, Deborah A.; Berket, Karlo

2003-07-14T23:59:59.000Z

51

ICS 351: Today's plan Wireless ad-hoc Networks  

E-Print Network [OSTI]

: ­ agriculture ­ science and ecology Emergency Communications (P2P) Vehicle Ad-hoc Networks (VANETs): ­ Vehicle-to-vehicle-hoc Networks Mobile computers: laptops (and everything else), vehicle-mounted computers, etc. Fields ­ Vehicle-to-infrastructure ­ Infra-Vehicle (within a vehicle) #12;4 Wireless Ad-hoc Networks: More

Biagioni, Edoardo S.

52

Measuring performance of ad hoc networks using timescales for information flow  

E-Print Network [OSTI]

on and off. By sending out queries and listening for replies, devices can learn the identity of other devices adaptive power algorithm, that uses only information local to each device, for building ad hoc networks, constant power, algorithm. I. INTRODUCTION Understanding how a collection of wireless devices that know

D'Souza, Raissa

53

Security Communications Protocol Ad Hoc Working Group | Department...  

Office of Environmental Management (EM)

Protocol Ad Hoc Working Group More Documents & Publications Overview for Newcomers Isotope Program Transportation Shipping Radioactive Waste by Rail from Brookhaven National...

54

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance  

E-Print Network [OSTI]

1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming in mobile ad hoc networks. Specifically, we focus on ad hoc networks where the spa- tial diversity technique technique can enhance the performance of mobile ad hoc networks significantly. Key words: ad hoc networks

Reisslein, Martin

55

Adoption of Vehicular Ad Hoc Networking Protocols by Networked Robots  

Science Journals Connector (OSTI)

This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several ... Keywords: Networked robot, Robotic ad hoc network, V2I, V2V, Vehicular ad hoc network, Wireless robot

Wim Vandenberghe; Ingrid Moerman; Piet Demeester

2012-06-01T23:59:59.000Z

56

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

57

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

58

Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

and a set of destination nodes, the problem is to build a minimum-energy multicast tree for the requestApproximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks Weifa Liang, Senior Member, IEEE Abstract--A wireless ad hoc network consists of mobile nodes that are equipped with energy

Liang, Weifa

59

E-Print Network 3.0 - access ad hoc Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ad hoc Search Powered by Explorit Topic List Advanced Search Sample search results for: access ad hoc Page: << < 1 2 3 4 5 > >> 1 Bengali, Hindi and Telugu to English Ad-hoc...

60

E-Print Network 3.0 - acrr ad hoc Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ad hoc Search Powered by Explorit Topic List Advanced Search Sample search results for: acrr ad hoc Page: << < 1 2 3 4 5 > >> 1 ACRR: Ad-hoc On-Demand Distance Vector Routing with...

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

E-Print Network 3.0 - ad hoc code Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

code Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc code Page: << < 1 2 3 4 5 > >> 1 How to Make Ad Hoc Proof Automation Less Ad Hoc...

62

E-Print Network 3.0 - ad hoc group Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences 10 A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi, Carlo Marchetti, Roberto Baldoni Summary: ad- hoc networks...

63

E-Print Network 3.0 - ad hoc process Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Baldoni Summary: A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi... belonging to distinct mobile ad- hoc networks by taking...

64

E-Print Network 3.0 - ad hoc review Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Baldoni Summary: A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi... belonging to distinct mobile ad- hoc networks by taking...

65

Ad hoc continuum-atomistic thermostat for modeling heat flow in molecular dynamics simulations  

E-Print Network [OSTI]

Ad hoc continuum-atomistic thermostat for modeling heat flow in molecular dynamics simulations J 2004) An ad hoc thermostating procedure that couples a molecular dynamics (MD) simulation

Brenner, Donald W.

66

Studies in rough set theory based routing protocols for vehicular ad hoc networks on freeways;.  

E-Print Network [OSTI]

??Vehicular Ad hoc NETworks (VANETs) are self-organizing ad hoc networks that are specifically designed for communication among vehicles. VANETs are a special case of Mobile (more)

Shylaja B S

2013-01-01T23:59:59.000Z

67

Energy efficient and fairness improved medium access scheduling algorithms for mobile ad hoc networks;.  

E-Print Network [OSTI]

??In mobile ad hoc networks dynamically changing topologies are newlinethe direct result of the mobility of the nodes which characterize the ad hoc newlinenetworks Each (more)

Priakanth P

2015-01-01T23:59:59.000Z

68

Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks  

E-Print Network [OSTI]

1-1 Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch 2008 #12;1-2 Outline What is an ad hoc network? Challenges facing ad hoc networks History of Ad C. K. Toh, Chapter 3, "Ad Hoc Wireless Networks", Prentice Hall, 2002 D. P. Agrawal and Qing

Amir, Yair

69

Robust message routing for mobile (wireless) ad hoc networks.  

SciTech Connect (OSTI)

This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie (Sandia National Laboratories, Albuquerque, NM); Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M. (University of Illinois, Urbana, IL)

2004-01-01T23:59:59.000Z

70

Throughput Analysis of Wireless Ad-Hoc Cognitive Radio Networks  

E-Print Network [OSTI]

is independent of the primary frequency bandwidths and usage statistics; otherwise, they follow water-filling-like strategies. Next, we study the asymptotic performance of two multi-hop overlaid ad-hoc networks that utilize the same temporal, spectral...

Banaei, Armin

2014-04-25T23:59:59.000Z

71

Verteilte Zugangskontrolle in offenen Ad-hoc-Netzen.  

E-Print Network [OSTI]

??In Ad-hoc-Netzen sind aktive Mitarbeit aller Teilnehmer und Einbringung eigener, knapper Ressourcen zugunsten Anderer unverzichtbar. Das hier vorgestellte verteilte Zugangskontrollsystem schliet dazu unkooperative Nutznieer aus (more)

Kraft, Daniel

2007-01-01T23:59:59.000Z

72

Routing and Traversal via Location Awareness in Ad-Hoc Networks  

E-Print Network [OSTI]

Routing and Traversal via Location Awareness in Ad-Hoc Networks Evangelos Kranakis Ladislav Stacho of an ad-hoc network in order to provide for ef- ficient information dissemination. We explore several new and route discovery in ad-hoc networks. 1 Challenges in Ad-Hoc Networking The current rapid growth

Kranakis, Evangelos

73

E-Print Network 3.0 - ad hoc networking Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

networking Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc networking...

74

An Ad-Hoc Workflow System Architecture Based on Mobile Agents and Rule-Based Processing  

E-Print Network [OSTI]

An Ad-Hoc Workflow System Architecture Based on Mobile Agents and Rule-Based Processing Jie Meng opportunity (an e-business process). In this position paper, we argue that the ad-hoc workflow and mobile the architecture and implementation of a simple mobile-agent-based ad-hoc workflow system. Keywords: Ad-hoc

Helal, Abdelsalam

75

E-Print Network 3.0 - ad hoc networks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

networks Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc networks...

76

Trust in Ad hoc Networks A Novel Approach based on Clustering  

E-Print Network [OSTI]

Trust in Ad hoc Networks A Novel Approach based on Clustering J. Boodnah and E.M. Scharf Department of Electronic Engineering, Queen Mary, University of London Abstract Ad hoc Networks by virtue of their nature constraints to the network. 1. Introduction: Mobile Ad hoc Networks ­ Uses and Characteristics Mobile ad hoc

Haddadi, Hamed

77

E-Print Network 3.0 - ad hoc network Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

network Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc network...

78

Topology Control for Fault-Tolerant Communication in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Topology Control for Fault-Tolerant Communication in Wireless Ad Hoc Networks Bernd Thallner-generation wireless ad hoc networks, which are increasingly being considered also for critical application domains in a fully distributed ("ad hoc") manner. Increasingly, wireless ad hoc networks are also being considered

79

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks  

E-Print Network [OSTI]

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks Bet. In this article, we compare two self-organization and hierarchical rout- ing protocols for ad hoc networks-organization and hierarchical routing in ad hoc networks. keywords: ad hoc networks, hierarchical routing, DHT, comparison

Paris-Sud XI, Université de

80

A Framework for Misuse Detection in Ad Hoc Networks--Part I  

E-Print Network [OSTI]

, resource management, site security monitoring. I. INTRODUCTION Ad hoc networks provide the only means

Sarkar, Saswati

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

TOWARDS A POWER EFFICIENT PROGRAMMING MODEL FOR AD HOC In this paper, we describe the design and implementation of a distributed operating system for ad hoc net-  

E-Print Network [OSTI]

1 TOWARDS A POWER EFFICIENT PROGRAMMING MODEL FOR AD HOC NETWORKS Abstract In this paper, we describe the design and implementation of a distributed operating system for ad hoc net- works. The goal of our system is to extend total system lifetime for ad hoc networking applications through power

Sirer, Emin Gun

82

1st Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS'04), Florence, Italy, Fault Tolerant Communication Topologies for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

1st Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS'04), Florence, Italy, June 2004 Fault Tolerant Communication Topologies for Wireless Ad Hoc Networks Bernd, distributed algorithms, failure locality 1 Introduction Wireless sensor networks, mobile ad hoc networks

83

Enhanced AOMDV for energy conservation in hybrid ad hoc networks  

Science Journals Connector (OSTI)

Hybrid ad hoc networks are a combination of a fixed network, a base station or free standing mobile ad hoc network (MANET). The energy conservation is a major issue in hybrid ad hoc network with limited battery life of mobile terminals. The lifetime of a network will be improved by suitably reducing the requirement of power for connections. This paper proposed a novel energy efficient ad hoc on-demand multipath distance vector (EEAOMDV) routing protocol that uses ad hoc on demand multipath distance vector (AOMDV) routing protocol as a basic routing strategy. The selected route satisfies quality of service in energy stable and the delay constraint on the application. The operation of EEAOMDV has three phases. In the first route discovery phase, the delay and energy constraints are built into the AOMDV route discovery mechanism. During link failure, the second phase is invoked to search for an energy stable alternate path locally. The third phase chooses the optimal path from available multiple paths from source to destination pair in the hybrid network. Simulation was performed to determine the packet delivery ratio, routing overhead, throughput, end-to-end delay and average energy consumption are experienced by varying nodes and pause time.

S. Santhi; G. Sudha Sadasivam

2014-01-01T23:59:59.000Z

84

DESIGN AND IMPLEMENTATION OF A SINGLE SYSTEM IMAGE OPERATING SYSTEM FOR AD HOC NETWORKS  

E-Print Network [OSTI]

DESIGN AND IMPLEMENTATION OF A SINGLE SYSTEM IMAGE OPERATING SYSTEM FOR AD HOC NETWORKS Hongzhou and implementation of a distributed operating system for ad hoc networks. Our system simplifies the programming of ad longevity by effectively distributing energy consumption and avoiding hotspots. 1 Introduction Ad hoc

Sirer, Emin Gun

85

Ad Hoc Mobile Networking and General Mobility Issues Ramon Lawrence  

E-Print Network [OSTI]

Ad Hoc Mobile Networking and General Mobility Issues Ramon Lawrence Department of Computer Science of networking and mobility come many interesting opportunities and difficult problems. Mobile computing allows around in the environment. Unfortunately, to support this mobility places several restrictive restraints

Lawrence, Ramon

86

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks  

E-Print Network [OSTI]

effectively to reduce redundant transmissions. Simulation results of applying these two algorithms show are discussed and compared through simulation under both the static and dynamic environments. Index Terms--Ad hoc wireless networks, broadcast, dominant pruning, flooding. æ 1 INTRODUCTION IN areas where

Wu, Jie

87

Energy Efficient Broadcast Routing in Static Ad Hoc Wireless Networks  

E-Print Network [OSTI]

such that the energy cost of the broadcast tree is minimized. Each node in the network is assumed to have a fixed level a broadcast tree such that the energy cost of the broadcast tree is minimized. We first prove that the problemEnergy Efficient Broadcast Routing in Static Ad Hoc Wireless Networks Deying Li, Xiaohua Jia

Jia, Xiaohua

88

Optimum Transmission Range for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

to determine the optimal transmission range that gives the maximum efficiency of energy consumption. Different, and security issues, we inves- tigate the efficiency of energy consumption of wireless ad hoc networks there are studies on increasing battery capacity and reducing the energy consumption of system opera- tion and data

Deng, Jing

89

E-Print Network 3.0 - ad hoc connection Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

serve as a topology for ad-hoc... for Ad Hoc Networks with Variable Transmission Range David Peleg (Weizmann) and Liam Roditty 12;... : There is an intrinsic connection between...

90

E-Print Network 3.0 - ad-hoc network based Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ad-hoc network based Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc network based Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel...

91

Utilising behaviour history and fuzzy trust levels to enhance security in ad-hoc networks.  

E-Print Network [OSTI]

??A wireless Ad-hoc network is a group of wireless devices that communicate with each other without utilising any central management infrastructure. The operation of Ad-hoc (more)

Hallani, Houssein

2007-01-01T23:59:59.000Z

92

E-Print Network 3.0 - ad hoc study Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

study Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc study Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for wireless ad-hoc...

93

E-Print Network 3.0 - ad hoc mobile Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mobile Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc mobile Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for wireless ad-hoc...

94

Ad Hoc Advisory Group to the Madrid Conference on Food Security Chaired by Prof. Jeffrey Sachs  

E-Print Network [OSTI]

Ad Hoc Advisory Group to the Madrid Conference on Food Security Chaired by Prof. Jeffrey Sachs Minister Rodriguez Zapatero of Spain, invited Professor Jeffrey Sachs to lead an Ad Hoc Advisory Group

95

E-Print Network 3.0 - ad hoc grids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

grids Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc grids Page: << < 1 2 3 4 5 > >> 1 Toward an Architecture for Ad Hoc Grids Kaizar Amin...

96

E-Print Network 3.0 - ad hoc para Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

para Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc para Page: << < 1 2 3 4 5 > >> 1 Um Framework para a Simulao de Redes Mveis Ad hoc...

97

AN AD HOC INVESTIGATORY COMMITTEE AT the University of North Carolina at Chapel  

E-Print Network [OSTI]

Retraction AN AD HOC INVESTIGATORY COMMITTEE AT the University of North Carolina at Chapel Hill has implicated. The last author disputes this finding of the ad hoc committee. Although some findings

Palumbi, Stephen

98

Michelle Niemann Ad-hoc Preliminary Examination List: A New Organicism?  

E-Print Network [OSTI]

Michelle Niemann Ad-hoc Preliminary Examination List: A New Organicism? 11/28/08 Sections: I. Theoretical and Critical Approaches Explanation: This ad-hoc prelims list is designed to (1) provide

Wisconsin at Madison, University of

99

Throughput Capacity of UWB Ad-Hoc Networks with Infrastructure Support  

Science Journals Connector (OSTI)

To provide scalable capacity of wireless ad-hoc networks, we employ a joint approach of both Ultra-Wide-Band (UWB) radio and hybrid architecture (ad-hoc network with infrastructure support). By using the AP(acces...

Fan Zhang; Xiaoyun Kang

2006-01-01T23:59:59.000Z

100

An On-Demand Energy-Efficient Routing Algorithm for Wireless Ad Hoc Networks  

Science Journals Connector (OSTI)

Ad hoc networks are non-infrastructure networks which consist of mobile nodes. Since the mobile nodes have limited battery power, it is very important to use energy efficiently in ad hoc networks. In order ... ro...

Hong-Ryeol Gil; Joon Yoo; Jong-Won Lee

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Extending the Coverage of a 4G Telecom Network Using Hybrid AD-HOC Networks: A Case Study  

Science Journals Connector (OSTI)

Ad-hoc networks that are connected with the infrastructure Internet are named hybrid ad-hoc networks. In 4G communications scenarios, hybrid ad-hoc networks seem to be valuable ... network interfaces, may reach t...

Tnia Calada; Manuel Ricardo

2006-01-01T23:59:59.000Z

102

UAV surveillance using multihop ad-hoc wireless networks: a demonstrator  

E-Print Network [OSTI]

UAV surveillance using multihop ad-hoc wireless networks: a demonstrator Daniël Heimans, Maurits de

Boucherie, Richard J.

103

Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc  

E-Print Network [OSTI]

Sequenced Distance Vector Protocol . . . . . . . . . . . . . . . . . . . . 9 2.2.1 Routing Table Management-hoc On Demand Distance Vector Routing Protocol . . . . . . . . . . . . . . . . 10 2.3.1 Route Discovery and Multipoint Relays . . . . . . . . . . . . . . . . . . . 11 2.4.3 Spreading Topology Informations

Braun, Torsten

104

Evaluation of Ad-Hoc and Mobility Architectures using Satellite Communications  

E-Print Network [OSTI]

, terminal, session, network) or its "range" (micro- mobility/macro-mobility). In terrestrial networks be done using ad-hoc networks principle, but the communications from one group to another can be compared to the interconnection of ad- hoc networks. We propose in this paper to interconnect these terrestrial ad-hoc networks

Paris-Sud XI, Université de

105

A Peer-to-Peer Approach to Asynchronous Data Dissemination in Ad Hoc Networks  

E-Print Network [OSTI]

A Peer-to-Peer Approach to Asynchronous Data Dissemination in Ad Hoc Networks Hervé Roussain.Roussain|Frederic.Guidec}@univ-ubs.fr Keywords : ubiquitous computing, peer-to-peer computing, ad hoc networking, data dissemination Abstract--This paper presents a model for the dis- semination of information in highly dynamic ad hoc networks

Paris-Sud XI, Université de

106

A Centralized Ad-Hoc Network Architecture (CANA) Based on Enhanced HiperLAN/2  

E-Print Network [OSTI]

A Centralized Ad-Hoc Network Architecture (CANA) Based on Enhanced HiperLAN/2 Konstantinos-mail: {simoens, pietro.pellati}@motorola.com Abstract-- In ad-hoc networks, where a user can enter, leave or move that require very high bit-rates, is a challenging problem. Here, a Centralized Ad-Hoc Network Architecture

Stavrakakis, Ioannis

107

Ad Hoc Synchronization Considered Harmful Weiwei Xiong+, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou, Zhiqiang Ma*  

E-Print Network [OSTI]

Ad Hoc Synchronization Considered Harmful Weiwei Xiong+, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou Abstract Many synchronizations in existing multi­threaded pro­ grams are implemented in an ad hoc way. The first part of this paper does a comprehensive characteristic study of ad hoc synchronizations

Zhou, Yuanyuan

108

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks Venugopalan Ramasubramanian@ece.cornell.edu, egs@cs.cornell.edu} ABSTRACT A central challenge in ad hoc networks is the design of rout- ing--Routing Protocols General Terms Design, Performance Keywords Hybrid, Adaptive, Ad Hoc Networks This work

Keinan, Alon

109

Ad Hoc BSD Faculty Science Review Committee March 11, 2009 September 24, 2009  

E-Print Network [OSTI]

1 Ad Hoc BSD Faculty Science Review Committee March 11, 2009 ­ September 24, 2009 A Proposal ...................................................... Pages 31-34 Ad Hoc BSD Faculty Science Committee Members ................................ Pages 35 .................................................................................. Pages 37-38 #12;3 I. Executive Summary: The Ad Hoc BSD Faculty Science Review Committee was convened

Sherman, S. Murray

110

Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks  

E-Print Network [OSTI]

Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks M. C. Valenti 1 D. Torrieri 2 S, 2013 Salvatore Talarico (shortinst)Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks June 11, 2013 1 / 23 #12;Outline 1 Frequency-Hopping Ad Hoc Networks 2 Outage Probability with Adjacent

Valenti, Matthew C.

111

APPLICATION FOR AD HOC INTERDISCIPLINARY DOCTORAL PROGRAM (Please type or wordprocess)  

E-Print Network [OSTI]

APPLICATION FOR AD HOC INTERDISCIPLINARY DOCTORAL PROGRAM (Please type or wordprocess) Approval school Current Address Telephone: Home Office Permanent Address Telephone Proposed Ad Hoc Doctoral Committee Ad hoc committee chair Rank UT EID Department GSC member: Yes No Committee member Rank UT EID

Johnston, Daniel

112

Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks  

E-Print Network [OSTI]

1 Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks Seung-Jong Park the issue of transmission power con- trol in wireless ad-hoc networks. In general, it is assumed that minimum transmission power achieves the optimal throughput of an ad-hoc network because it produces

Park, Seung-Jong "Jay"

113

Exploring Multi-path Communication in Hybrid Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Exploring Multi-path Communication in Hybrid Mobile Ad Hoc Networks Roberto Speicys Cardoso the challenges involved in implementing multi- path communication on a middleware for hybrid mobile ad hoc words: Multi-path routing, middleware, ad hoc networks 1 Introduction Ambient computing requires

Paris-Sud XI, Université de

114

The Impacts of Physical Layer Parameters on the Connectivity of Ad-Hoc Networks  

E-Print Network [OSTI]

The Impacts of Physical Layer Parameters on the Connectivity of Ad-Hoc Networks Javad Kazemitabar,hyousefi,hamidj]@uci.edu The Impacts of Physical Layer Parameters on the Connectivity of Ad-Hoc Networks ­ p.1/20 #12;Outline Layer Parameters on the Connectivity of Ad-Hoc Networks ­ p.2/20 #12;Outline · Background Ergodic SER

Yousefi'zadeh, Homayoun

115

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

116

IFI-aktuelt: Gjesteforelesning, C-K. Toh Future Research Challenges in Ad Hoc Networking  

E-Print Network [OSTI]

IFI-aktuelt: Gjesteforelesning, C-K. Toh Future Research Challenges in Ad Hoc Networking Fredag 23.8 kl. 13:15, Lille auditorium Future Research Challenges in Ad Hoc Networking by C-K. Toh, Ph technologies are mature, it is still a form of cellular local data network. Ad hoc mobile networks are entirely

Toh, C-K.

117

A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks  

E-Print Network [OSTI]

A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks Lucia Gallina and Sabina,srossi}@dsi.unive.it Abstract. We present CMN# , a process calculus for formally model- ling and reasoning about Mobile Ad Hoc to reason about cost-effective ad hoc routing protocols, we also allow unicast and multicast communications

Paris-Sud XI, Université de

118

Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks  

E-Print Network [OSTI]

Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Cheikh Sarr, Claude Chaudet, Guillaume for bandwidth-constrained applications. In multihop ad hoc networks, such evaluation becomes even more difficult mechanism to estimate the available bandwidth in IEEE 802.11-based ad hoc networks. Through simulations, we

Paris-Sud XI, Université de

119

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks Paul G protocol design for wireless ad hoc networks is between proactive and reactive coor- dination, where describe Clique-Based Randomized Multiple Access (CRMA), a distributed MAC protocol for wireless ad hoc

120

Ad Hoc Committee to Examine Governance Structure & Organization of UW-Madison's  

E-Print Network [OSTI]

#12;Ad Hoc Committee to Examine Governance Structure & Organization of UW-Madison's Division Sciences) 17 April 2012 #12; 1 FINAL REPORT Ad Hoc Committee to Examine Governance Structure & Organization of UW-Madison's Division of International Studies The Ad Hoc Committee to Examine Governance

Sheridan, Jennifer

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Towards an Opportunistic and Location-Aware Service Provision in Disconnected Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Towards an Opportunistic and Location-Aware Service Provision in Disconnected Mobile Ad Hoc as a promising method to support communication in disconnected mobile ad hoc networks. This new communication model relies on the "store, carry and forward" principle, and ex- ploits ad hoc communication and device

Paris-Sud XI, Université de

122

Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking  

E-Print Network [OSTI]

1 Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking Shu Du Ahamed Rice University Abstract As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper, we

Druschel, Peter

123

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

124

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks  

E-Print Network [OSTI]

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks ad hoc networks. In this paper, we study the important problem of joint routing and server selection for MD video in ad hoc networks. We take a cross-layer approach to formulate the task as a combinatorial

Hou, Y. Thomas

125

A bidding algorithm for optimized utility-based resource allocation in ad hoc networks  

E-Print Network [OSTI]

A bidding algorithm for optimized utility-based resource allocation in ad hoc networks Calin for bandwidth allo- cation in wireless ad hoc networks. The quality of service (QoS) levels for each end in hotspot scenarios, and also propose an asynchronous version that is more feasible for ad hoc environments

126

Report on a Working Session on Security in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Report on a Working Session on Security in Wireless Ad Hoc Networks Levente Butty´an Jean organized a working session de- voted to the topic of security in wireless ad hoc networks. This event took setting. Securing wireless ad hoc networks is particularly diffi- cult for many reasons including

Chen, Yuanzhu Peter

127

Seminar Ad Hoc Networks Welcome! -1 -University of Freiburg Alexander Schtzle  

E-Print Network [OSTI]

Seminar Ad Hoc Networks Welcome! - 1 - University of Freiburg Alexander Schätzle A Localized Algorithm for Bi-Connectivity of Connected Mobile Robots Ad Hoc Networks- Seminar, WS 08/09 Computer: Alexander Schätzle Freiburg, 25. November 2008 #12;Seminar Ad Hoc Networks Introduction - 2 - University

Schindelhauer, Christian

128

The Impact of Interference on Optimal Multi-path Routing in Ad Hoc Networks  

E-Print Network [OSTI]

The Impact of Interference on Optimal Multi-path Routing in Ad Hoc Networks Roland de Haan, Richard-to-end performance measures such as through- put in ad hoc networks, emphasizing the performance trade-off between-destination pairs and different radio ranges are analyzed. Keywords: Ad hoc networks, Interference, Capacity, Multi

Boucherie, Richard J.

129

Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform  

E-Print Network [OSTI]

Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform February 16, 2010 recommended formation of an ad hoc committee to evaluate opportunities for SFR and others in College. As a result, the Washington Natural Resource Agency Reform ad hoc Committee was established and given

Borenstein, Elhanan

130

Ad-hoc Technology in Future IP based Mobile Communication Frank Fitzek  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Frank Fitzek acticom Gmb@asu.edu Abstract In this paper we outline our future research activities in the field of ad--hoc communication systems for IP based services. We summarize why omnipresent technologies fail to support ad--hoc

Reisslein, Martin

131

A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks Ping Wang, Member, IEEE, Hai Jiang, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract--In wireless ad hoc networks information exchanges among the nodes. Index Terms--Wireless ad hoc networks, medium access control, fairness

Jiang, Hai

132

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong, Jungsoo Park for IPv6 mobile ad hoc networks. The auto-networking technologies consist of IPv6 unicast address. These technologies are based on IPv6's inherent autoconfiguration facility, which can provide ad hoc users

Jeong, Jaehoon "Paul"

133

A REFERENCE PICTURE SELECTION SCHEME FOR VIDEO TRANSMISSION OVER AD-HOC NETWORKS  

E-Print Network [OSTI]

A REFERENCE PICTURE SELECTION SCHEME FOR VIDEO TRANSMISSION OVER AD-HOC NETWORKS USING MULTIPLE, Polytechnic University 6 Metrotech, Brooklyn, NY, 11201, USA ABSTRACT Enabling video transmission over ad-hoc networks is more challenging than over conventional mobile networks because a connection path in an ad-hoc

Panwar, Shivendra S.

134

Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks Javier Gomez and Andrew networks such as ad hoc and sensor networks. First, using previous work by Steele [18], we show that in this paper highlight the need to design future MAC and routing protocols for wireless ad hoc and sensor

Gomez-Castellanos, Javier

135

Ad-hoc Technology in Future IP based Mobile Communication Systems  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Martin Reisslein Arizona State Heinrich Hertz Institut #12;Content · Required Research · Ad-hoc Testbed · Expected Results and Time Frame-Configuration · Assignment and release of IP addresses ­ omnipresent related protocols can not deployed in ad- hoc networks

Reisslein, Martin

136

Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks  

E-Print Network [OSTI]

1 Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks Yan Lindsay-- The performance of ad hoc networks depends on co- operation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized

Sun, Yan Lindsay

137

A Cross layer Analysis of TCP Instability in Multihop Ad hoc Networks  

E-Print Network [OSTI]

1 A Cross layer Analysis of TCP Instability in Multihop Ad hoc Networks Ehsan Hamadani, Veselin to the nature of some ad hoc network applications (e.g. emergency operation, battlefield communication), TCP of any pre-existing network infrastructure or centralized administration. During recent years ad hoc

Rakocevic, Veselin

138

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Marco Fiore, Member Papadimitratos, Member, IEEE Abstract--A growing number of ad hoc networking protocols and location verification, mobile ad hoc networks, vehicular networks. I. INTRODUCTION Location awareness has become

Paris-Sud XI, Université de

139

Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks Hervé Roussain-based software applications on mobile devices (such as laptops or personal digital assistants) capable of ad hoc also makes it possible for mobile devices to com- municate directly in ad hoc mode, that is, without

Paris-Sud XI, Université de

140

On Local Algorithms for Topology Control and Routing in Ad Hoc Networks  

E-Print Network [OSTI]

On Local Algorithms for Topology Control and Routing in Ad Hoc Networks Lujun Jia and Rajmohan 3400 N. Charles Street Baltimore, MD 21218, USA scheideler@cs.jhu.edu Abstract An ad hoc network. Indeed, an important task of an ad hoc network is to determine an appropri­ ate topology over which high

Chan, Agnes Hui

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Ad Hoc Networking Critical Features and Performance Metrics Madhavi W. Subbarao  

E-Print Network [OSTI]

Ad Hoc Networking Critical Features and Performance Metrics Madhavi W. Subbarao Wireless Communications Technology Group, NIST October 7, 1999 A mobile ad hoc network MANET is an autonomous collection networking features and performance metrics for assessing the behav- ior of an ad-hoc network are identi ed

142

The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks  

E-Print Network [OSTI]

The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks Sonja Buchegger IBM EPFL-DSC CH-1015 Lausanne, Switzerland jean-yves.leboudec@epfl.ch Abstract: Mobile ad-hoc networks rely- liciously pose a threat to availability in mobile ad- hoc networks. Several approaches have been pro- posed

Paris-Sud XI, Université de

143

Evaluation of a Routing Architecture for Wireless Messaging Ad-Hoc Networks  

E-Print Network [OSTI]

Evaluation of a Routing Architecture for Wireless Messaging Ad-Hoc Networks Megha Goel1 and M´ark F self-organizing ad-hoc networks can be used to provide the short messaging service, at a much lower of ad- hoc network routing in which mobile nodes are allowed to relay in place of static nodes. We

Bencsáth, Boldizsár

144

A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks  

E-Print Network [OSTI]

A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks Ahmad Al-Hanbali, Roland, The Netherlands ABSTRACT Ad hoc network routing protocols may fail to operate in the absence of an end, Performance analysis. 1. INTRODUCTION End-to-end connectivity is not a natural property of ad hoc networks

Boucherie, Richard J.

145

Too Much Mobility Limits the Capacity of Wireless Ad-hoc Networks  

E-Print Network [OSTI]

Too Much Mobility Limits the Capacity of Wireless Ad-hoc Networks Syed Ali Jafar Electrical@ece.uci.edu Abstract-- We consider a ? user isotropic fast fading ad-hoc network with no channel state information determine the capacity region of this ad-hoc network for any partition of the users into transmitters

Jafar, Syed A.

146

Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks  

E-Print Network [OSTI]

Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks.Hauspie, David.Simplot}@lifl.fr Abstract Ad hoc network normally has critical connectivity properties before, respectively. The experiments with random unit graph model of ad hoc networks show high correspondence of local

Paris-Sud XI, Université de

147

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks  

E-Print Network [OSTI]

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks Nicolas Le Mobile ad hoc networks have been recently receiving much attention due to the important prospects and military scenarios, civil- ian mobile ad hoc services usable in everyday life are con- sidered from now

Paris-Sud XI, Université de

148

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks  

E-Print Network [OSTI]

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks Jes´us Friginal, ddandres, pgil}@disca.upv.es Abstract Ad hoc networks are wireless, self-configuring and self- maintaining in this domain has been based on simulation, thus obviating aspects influencing the behav- ior of real ad hoc

Paris-Sud XI, Université de

149

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks  

E-Print Network [OSTI]

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks Yih-Chun Hu a University, Houston, TX 77005, USA Abstract An ad hoc network is a collection of wireless computers (nodes stations or access points. Although many previous ad hoc network routing protocols have been based in part

Ramkumar, Mahalingam

150

MRTP: A Multi-Flow Realtime Transport Protocol for Ad Hoc Networks  

E-Print Network [OSTI]

MRTP: A Multi-Flow Realtime Transport Protocol for Ad Hoc Networks Shiwen Mao, Dennis Bushmitch@research.panasonic.com, sathya@research.panasonic.com Abstract-- Transporting multimedia data over ad hoc networks is a challenging problem. However, the mesh topology of ad hoc networks implies the existence of multiple paths

Panwar, Shivendra S.

151

A Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc  

E-Print Network [OSTI]

A Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc Networks Katia.runser, jean-marie.gorce@insa-lyon.fr Abstract--Wireless ad hoc networks are seldom characterized by one single. Instead, we address this problem by proposing a new modeling framework for routing in ad hoc networks

Paris-Sud XI, Université de

152

Optimally Increasing Secure Connectivity in Multi-hop Wireless Ad Hoc Networks  

E-Print Network [OSTI]

1 Optimally Increasing Secure Connectivity in Multi-hop Wireless Ad Hoc Networks Seyit Ahmet--We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after, integrity and confidentiality in multi-hop wire- less ad hoc networks. An example of such networks are multi

Bystroff, Chris

153

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

154

Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks Mawloud Omar, Yacine University of Technology, France. bouabdal@hds.utc.fr Abstract A mobile ad hoc network (MANET) is a wireless that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc

Paris-Sud XI, Université de

155

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

156

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong which can provide mobile nodes in IPv6 mobile ad hoc network with secure name-to-address resolution and service discovery. Because mobile ad hoc network has dynamic topology, the current DNS is inappropriate

Jeong, Jaehoon "Paul"

157

Routing with a density-based probabilistic algorithm for mobile ad-hoc networks  

Science Journals Connector (OSTI)

Ad-hoc networks can operate even when there is a scarcity of network infrastructure. This research examines ad-hoc networks that have varying node densities. These environments can be found in areas struck by disasters to urban city environments. Mobile ... Keywords: Broadcast Management, Density Based Probabilistic Algorithm, Mobile Ad-Hoc Networks, Nodes Connectivity Management, Nodes Density

Hean-Loong Ong; Essam Natsheh; Tat-Chee Wan

2011-04-01T23:59:59.000Z

158

NAC Ad-Hoc Task Force on Planetary Defense August 17 and 20, 2010 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense August 17 and 20, 2010 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense MINUTES Meeting Date: August 17 and 20, 2010 AGENDA: · Ad-Hoc Task Force Final Report and Recommendations ATTENDING: Ad-Hoc Task Force: Tom Jones (Co-Chair), Rusty

Waliser, Duane E.

159

Randomized location service in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

of the node. Home regions near a node are aware of the nodes exact location (that is, the unit region it occupies) while home regions that are far from the node know only of a larger region that contains the node. Camp, Boleng and Wilcox [12] have dcvclopcd..., *' in Proc. IEEE Wireless Communication and Networking Conference (WCNC), Orlando, FL, 2002, pp. 874-578. [12] T. Camp, J. Boleng and L. Wilcox, "Location Information Services in Mobile Ad Hoc Networks, " in IEEE Int. Conf. Communications, 2002, pp. 3318...

Bhattacharya, Sangeeta

2012-06-07T23:59:59.000Z

160

Modelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata  

E-Print Network [OSTI]

protocols using Ad hoc On-demand Distance Vector AODV [DPR02] as our test protocol. AODV is one of mobile adModelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata Sibusisiwe Chiyangwa On-demand Distance Vector protocol (AODV). Keywords: automatic veri#12;cation, model checking, real

Oxford, University of

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

E-Print Network 3.0 - ad hoc meeting Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering 8 A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi, Carlo Marchetti, Roberto Baldoni Summary: . As an example,...

162

E-Print Network 3.0 - ad hoc working Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Sciences 16 A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi, Carlo Marchetti, Roberto Baldoni Summary: modems within the...

163

E-Print Network 3.0 - ad hoc committee Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc committee Page: << < 1 2 3 4 5 > >> 1 MAA CURRICULUM VITAE GERALD J. PORTER...

164

Modeling and simulation of intrusion detection system in mobile ad-hoc networks.  

E-Print Network [OSTI]

??The thesis investigates the process of modeling and simulation of the mobile ad-hoc networks. It provides a overview of the actual state of art together (more)

Jarmal, Piotr

2008-01-01T23:59:59.000Z

165

A Study of Energy-efficient Routing Supporting Coordinated Sleep Scheduling in Wireless Ad Hoc Networks.  

E-Print Network [OSTI]

??A wireless ad hoc network is a collection of wireless computing devices that self-configure to form a network independently of any fixed infrastructure. Many wireless (more)

Lou, Chong

2015-01-01T23:59:59.000Z

166

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network [OSTI]

Anonymity: New Passive Threats in Mobile Ad Hoc Networkson new anonymity threats and classify the correspondingagainst the new anonymity threats in mobile networks. The

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

167

Geocasting in mobile ad hoc networks: a grid based approach to GeoTORA  

E-Print Network [OSTI]

Networking and Com- puting (MOBIHOC), Boston, MA, August 2000, pp. 37-44. [16] H. Zhou and S. Singh, "Content based multicast (CBM) in ad hoc networks" in Proceedings of ACM/IEEE Workshop on Mobile Ad Hoc Networking and Computing (MOBIHOC), Boston, MA... Networking and Com- puting (MOBIHOC), Boston, MA, August 2000, pp. 37-44. [16] H. Zhou and S. Singh, "Content based multicast (CBM) in ad hoc networks" in Proceedings of ACM/IEEE Workshop on Mobile Ad Hoc Networking and Computing (MOBIHOC), Boston, MA...

Macwan, Mikin

2012-06-07T23:59:59.000Z

168

IEEE ICC 2014 -Ad-hoc and Sensor Networking Symposium 978-1-4799-2003-7/14/$31.00 2014 IEEE 305  

E-Print Network [OSTI]

IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 978-1-4799-2003-7/14/$31.00 ©2014 IEEE 305 ICC 2014 - Ad-hoc and Sensor Networking Symposium 306 #12;IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 307 #12;IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 308 #12;IEEE ICC 2014 - Ad-hoc

Bahk, Saewoong

169

Trusting Routers and Relays in Ad hoc Networks. Prashant Dewan and Partha Dasgupta  

E-Print Network [OSTI]

with tangential goals belonging to the members of the network. In such situations micro payments can be cashedTrusting Routers and Relays in Ad hoc Networks. Prashant Dewan and Partha Dasgupta Arizona State University dewan@asu.edu, partha@asu.edu Abstract The current generation of ad hoc networks relies on other

Dasgupta, Partha

170

The integration of ad hoc sensor and cellular networks for multi-class data transmission  

E-Print Network [OSTI]

The integration of ad hoc sensor and cellular networks for multi-class data transmission Fei Hu a. On the other hand, large-scale Ad hoc Sensor Networks (ASN), when deployed among mobile patients who may carry different kinds of micro-sensors to measure ECG, blood pressure, basal temperature or other physiological

Kumar, Sunil

171

Towards commercial mobile ad hoc network applications: a radio dispatch system  

Science Journals Connector (OSTI)

We propose a novel and plausibly realistic application scenario for mobile ad hoc networks in the form of a radio dispatch system. We evaluate the system from both financial and technical perspectives to gain a complete picture of its feasibility. Using ... Keywords: application, mobile ad hoc networks, performance

Elgan Huang; Wenjun Hu; Jon Crowcroft; Ian Wassell

2005-05-01T23:59:59.000Z

172

Intelligent stale-frame discards for real-time video streaming over wireless ad hoc networks  

Science Journals Connector (OSTI)

This paper presents intelligent early packet discards (I-EPD) for real-time video streaming over amultihop wireless ad hoc network. In a multihop wireless ad hoc network, the quality of transferring real-time video streams could be seriously degraded, ...

Tsang-Ling Sheu; Yung-Shih Chi

2009-01-01T23:59:59.000Z

173

From Soldier to Scholar: Report of the Council of Presidents Ad Hoc Committee  

E-Print Network [OSTI]

the Council of Presidents Ad Hoc Committee on Strengthening Services to Veterans) to assess the dimensions 1 #12; 2 From Soldier to Scholar: Report of the Council of Presidents Ad Hoc Committee on Strengthening Services to Veterans Introduction The United States of America has been

Qiu, Weigang

174

A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments  

SciTech Connect (OSTI)

A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

Top, P; Kohlhepp, V; Dowla, F

2005-09-30T23:59:59.000Z

175

Optimization Algorithms for Information Retrieval and Transmission in Distributed Ad Hoc Networks  

E-Print Network [OSTI]

An ad hoc network is formed by a group of self-configuring nodes, typically deployed in two or three dimensional spaces, and communicating with each other through wireless or some other media. The distinct characteristics of ad hoc networks include...

Lu, Hong

2010-01-14T23:59:59.000Z

176

Comit ad hoc sur la Formation continue l'Universit de Montral  

E-Print Network [OSTI]

Rapport Comité ad hoc sur la Formation continue à l'Université de Montréal Mars 2010 #12;Table mandat du Comité ad hoc sur la formation continue, tel que défini par le Provost, consiste à réfléchir

Charette, André

177

Centralized algorithms for maintaining connectivity in a mobile ad hoc network  

E-Print Network [OSTI]

This thesis focuses on the problem of maintaining connectivity in a mobile ad hoc network (MANET). In a connected MANET, communication is possible between any pair of nodes. The nodes in a mobile ad hoc network are constantly moving causing frequent...

Karwa, Tapan P.

2012-06-07T23:59:59.000Z

178

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks  

E-Print Network [OSTI]

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Suyang Ju Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate Faculty of the University of Kansas School...: Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Dissertation Committee: _____________________________________ Dr. Joseph B. Evans, Advisor Professor, EECS _____________________________________ Dr. Victor Frost...

Ju, Suyang

2011-12-31T23:59:59.000Z

179

Hybrid Resource Discovery Mechanism in Ad Hoc Grid Using Structured Overlay  

E-Print Network [OSTI]

Hybrid Resource Discovery Mechanism in Ad Hoc Grid Using Structured Overlay Tariq Abdullah1, Luc.onana, david.calomme}@umh.ac.be Abstract. Resource management has been an area of research in ad hoc grids, decentralized or in a hybrid manner. In this paper, we discuss a micro economic based, hybrid resource discovery

Kuzmanov, Georgi

180

Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems  

Science Journals Connector (OSTI)

A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infrastructure to provide a long list of applications varying from transit safety ... Keywords: Data Fusion, Localization, Vehicular Networks

Azzedine Boukerche; Horacio A. B. F. Oliveira; Eduardo F. Nakamura; Antonio A. F. Loureiro

2008-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

A MAC Protocol for Wireless Ad Hoc Networks with Power Control  

E-Print Network [OSTI]

is an important factor in ad hoc networks. One way to conserve energy supported by the standard [1] is the power-hop neighborhood. Through many simulations we show that our algorithm outperforms the IEEE 802.11 standard, also IEEE 802.11 [1] has become the standard for Wire- less LAN's both in infrastructure and in ad hoc mode

182

LIFETIME-AWARE MULTICAST ROUTING IN WIRELESS AD HOC Morteza Maleki and Massoud Pedram  

E-Print Network [OSTI]

studies on the construction of energy-efficient broadcast and multicast tree in ad hoc networks ([6}@usc.edu Abstract. One of the main design constraints in mobile ad hoc networks (MANETs) is that they are energy constrained. Hence, routing algorithms must be developed to consider energy consumption of the nodes

Pedram, Massoud

183

Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency  

E-Print Network [OSTI]

, and security issues, we investigate the efficiency of energy consumption in wireless ad hoc networks-efficient mechanisms is of importance. In wireless ad hoc networks, energy consumption at each node is mainly due energy consumption of system operation and data processing, energy consumption economy of radio

Deng, Jing

184

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor Networks  

E-Print Network [OSTI]

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor their connecti- vity properties and their performances in terms of energy consumption, throughput and other and the evaluation or esti- mation of energy consumption in ad-hoc WSNs. The frame- work is based on a variant

Rossi, Sabina

185

Cognos Query Studio NUFinancials  

E-Print Network [OSTI]

@northwestern.edu · Please review this guide before calling the help desk with data definition questions. #12;Cognos Query. Hover over the same items to see the definition in a tool tip. Who has access? · Users with the security-up and down-drill capability, you must have the Ad Hoc Query Author role. Where to get help? · For assistance

Shull, Kenneth R.

186

Report of the Ad Hoc Committee to Determine the Needs and Structure of UW-Madison's Research Enterprise  

E-Print Network [OSTI]

1 Report of the Ad Hoc Committee to Determine the Needs and Structure of UW-Madison's Research the University of Wisconsin-Madison's preeminence in research and graduate education. The ad hoc committee has

Sheridan, Jennifer

187

Report of the Ad Hoc Committee on Library and Computing Resources Prepared for President Burish and Provost Boetsch  

E-Print Network [OSTI]

Report of the Ad Hoc Committee on Library and Computing Resources Prepared for President Burish, Provost Boetsch appointed the Ad Hoc Committee on Library and Computing Resources to consider the current

Marsh, David

188

Lifetime-Extended, Power-Aware, Non-position Base Localized Routing in Hybrid Ad-Hoc/Infrastructure Network  

Science Journals Connector (OSTI)

This paper presents a localized routing protocol for both hybrid ad-hoc/infrastructure networks and conventional ad-hoc networks. The ... that the proposed protocol improves efficiency in both hybrid and conventi...

Xueqing Li; Roshdy H. M. Hafez

2004-01-01T23:59:59.000Z

189

On the Reliability and Additional Overhead of Reliable On-Demand Multicast Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

for Mobile Ad Hoc Networks Kumaran Sambandan, Gergely V. Záruba, and David Levine Department of Computer applications currently envisioned for mobile ad hoc networks require multicasting. Several multicasting protocols have been proposed for mobile ad hoc networks, one of the most popular being the On Demand

Záruba, Gergely

190

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005 1325 Cooperation in Wireless Ad Hoc Networks: A  

E-Print Network [OSTI]

a market-based approach to stimulate cooperation in ad hoc networks where nodes charge a price for relaying to illustrate our results. Index Terms--Ad hoc network, pricing, rate control, wireless networks. I. INTRODUCTION AWIRELESS ad hoc network is a collection of nodes which form a network independently of any fixed

191

Abstract--A mobile ad hoc network is a wireless communication network which does not rely on a fixed  

E-Print Network [OSTI]

Abstract--A mobile ad hoc network is a wireless communication network which does not rely protecting the security of the network is essential. Like many distributed systems, security in ad hoc. The experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc

Lyu, Michael R.

192

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. VOLUME, NO. NUMBER, MONTH YEAR 1 Transmission Capacity of Wireless Ad Hoc  

E-Print Network [OSTI]

Capacity of Wireless Ad Hoc Networks with Successive Interference Cancellation Steven Weber, Member, IEEE Abstract-- The transmission capacity of a wireless ad hoc network can be defined as the maximum allowable classes of multiuser channels, but has not been carefully evaluated in the context of an ad hoc wireless

de Veciana, Gustavo

193

Abstract-Mobile Ad Hoc NETworks (MANETs) are an emerging class of network architectures that are characterized  

E-Print Network [OSTI]

Abstract- Mobile Ad Hoc NETworks (MANETs) are an emerging class of network architectures on the overall performance of ad hoc networks. This study will contribute to the modeling and development of adaptive ad hoc protocols (routing, medium access control, scheduling and buffer management). Using 2k r

Perkins, Dmitri

194

Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-enhanced and standard IEEE 802.11 nodes can coexist in a MANET is also discussed. Keywords: mobile ad hoc network, promiscuous mode, broadcast, IEEE 802.11, routing. #12;2 1. Introduction In mobile ad hoc networks (MANETs

Chen, Sheng-Wei

195

Abstract--Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc Network  

E-Print Network [OSTI]

Abstract--Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc by the proposed scheme, while keeping the important false positive rate at a very low level. Keywords--Mobile ad-hoc (SDR), Mobile Ad-hoc Networks (MANETs) and Cognitive Radio (CR). Research on these technologies has

196

1. Introduction Ad hoc networks are a hot research topic. The enabling technology for this field includes: (1)  

E-Print Network [OSTI]

1 1. Introduction Ad hoc networks are a hot research topic. The enabling technology for this field, with their computers turned on and connected. Ad hoc networks are a natural result of user demand meeting the enabling technology. Highly mobile devices that dynamically organize ad hoc networks, intercommunicate, pass

Yasinsac, Alec

197

Implementing Ad Hoc to Terrestrial Network Gateways Jonathan McGee, Manish Karir, and John S. Baras  

E-Print Network [OSTI]

Implementing Ad Hoc to Terrestrial Network Gateways Jonathan McGee, Manish Karir, and John S. Baras we describe our experience of implementing a gateway between ad hoc and terrestrial routing protocols terrestrial network interface and MAODV on a wireless ad hoc network interface.Although we focus primarily

Baras, John S.

198

A Distributed Protocol for the Bounded-Hops Converge-cast in Ad-Hoc Networks0  

E-Print Network [OSTI]

A Distributed Protocol for the Bounded-Hops Converge-cast in Ad-Hoc Networks0 Andrea E. F. Clementi (centralized) heuristics. 1 Introduction An ad-hoc (wireless) network consists of a set of radio stations connected by wireless links. In an ad hoc network, a transmission range is assigned to every station

Rossi, Gianluca

199

The University of Texas at Austin Talk at EURECOM -p. 1/30 Transmission Capacity of Wireless Ad Hoc  

E-Print Network [OSTI]

;· · Talk Outline Introduction Network Model Transmission Capacity Framework Multi-Antenna Wireless Ad Hoc The University of Texas at Austin Talk at EURECOM - p. 2/30 We consider a wireless ad hoc network with multi-Antenna Wireless Ad Hoc Networks Perfect Channel Knowledge Linear Precoding with CSIT Imperfect Channel Knowledge

Gesbert, David

200

On Using Reputations in Ad hoc Networks to Counter Malicious Nodes Prashant Dewan, Partha Dasgupta and Amiya Bhattacharya  

E-Print Network [OSTI]

On Using Reputations in Ad hoc Networks to Counter Malicious Nodes Prashant Dewan, Partha Dasgupta, partha, amiya}@asu.edu Abstract Nodes in mobile ad hoc networks have a limited trans- mission range for ad hoc networks. Instead of choosing the shortest path to the destination, the source node chooses

Dasgupta, Partha

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Cognitive radio ad hoc networks (CRAHNs): Cognitive radio ad hoc networks (CRAHNs): Resource allocation techniques based on Bio-inspired computing  

E-Print Network [OSTI]

Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled spectrum (this is nothing but the "common carrier principle" adopted in oil/gas/electricity pipelines/networks.), since all ad hoc networks share a common pool of channels, exhausting the available channels will force ad hoc networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. CR network proved to next generation wireless communication system that proposed as a way to reuse under-utilised spectrum of licensee user (primary network) in an opportunistic and non-interfering basis. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. Adding this layer of such intelligence to the ad hoc network by looking at the overall geography of the network known as cogni...

Singh, Santosh Kumar

2010-01-01T23:59:59.000Z

202

Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages Matthias Rosenschon a  

E-Print Network [OSTI]

Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages Matthias Rosenschon studied in the literature up to now. This paper describes an approach for gateway discovery based on HELLO-hoc networks, MANET, gateway discovery, AODV, HELLO packets 1. INTRODUCTION Multihop wireless access networks

Rakocevic, Veselin

203

Presentation to the EAC - Workforce Ad Hoc Committee Panel Discussion - Wanda Reder  

Broader source: Energy.gov (indexed) [DOE]

Workforce Ad Hoc Committee Workforce Ad Hoc Committee Panel Discussion Wanda Reder June 11, 2012 DOE EAC create an EAC Workforce Ad Hoc Working Group to review the workforce needs and make recommendations to ensure those with appropriate skills sets are available to support the future grid. - Consists EAC members and invited participants - Coordinate with others - Committee activity will sunset after their recommendations - Participants: * Chairs: Wanda Reder; Vice-Chair: Tom Sloan * DOE Point of Contact: David Meyer, Gil Bindewald, Anjan Bose * Members: Barbara Kenny, NSF; Ann Randazzo, CEWD, Dennis Ray, PSERC, Barbara Tyran, EPRI; Elaine Ulrich, DOE; - Additional EAC participation is encouraged! 2012 Workforce Ad-Hoc Background * Electric demand growing via electrification to

204

A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

We propose a Node Stability Index (NSI)-based algorithm to determine stable connected dominating sets (CDS) for Mobile Ad hoc Networks ... algorithm prefers to include (to the CDS) covered nodes that have the lar...

Natarajan Meghanathan

2012-01-01T23:59:59.000Z

205

Quality of Service (QoS) security in mobile ad hoc networks  

E-Print Network [OSTI]

With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET...

Lu, Bin

2006-10-30T23:59:59.000Z

206

Two algorithms for leader election and network size estimation in mobile ad hoc networks  

E-Print Network [OSTI]

We develop two algorithms for important problems in mobile ad hoc networks (MANETs). A MANET is a collection of mobile processors (?nodes?) which communicate via message passing over wireless links. Each node can communicate directly with other...

Neumann, Nicholas Gerard

2005-02-17T23:59:59.000Z

207

E-Print Network 3.0 - ad hoc communication Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc communication Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for...

208

E-Print Network 3.0 - ad-hoc time series Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

series Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc time series Page: << < 1 2 3 4 5 > >> 1 International Journal of Information...

209

E-Print Network 3.0 - ad hoc panel Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

panel Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc panel Page: << < 1 2 3 4 5 > >> 1 Part 500, Chapter 25 SCIENTIFIC MISCONDUCT REVIEW...

210

P2P-basierte Gruppenkommunikation in drahtlosen Ad-hoc-Netzen.  

E-Print Network [OSTI]

??Die Konzeption eines Gruppenkommunikationsdienstes, welcher nicht nur die Anforderungen eines Kommunikationsnetzes, sondern auch die unterschiedlicher Anwendungen erfllt, zeigt sich als Herausforderung. Im Kontext drahtloser Ad-hoc-Netze (more)

Baumung, Peter

2008-01-01T23:59:59.000Z

211

E-Print Network 3.0 - ad-hoc wireless environments Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc wireless environments Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models...

212

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

This paper studies delay properties of the well-known maximum weight scheduling algorithm in wireless ad hoc networks. We consider wireless networks with either one-hop or multihop flows. Specifically, this paper shows ...

Modiano, Eytan H.

213

E-Print Network 3.0 - ad-hoc network protocols Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc network protocols Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for...

214

The design and implementation of a distributed photo sharing Android application over ad-hoc wireless  

E-Print Network [OSTI]

We present a distributed photo-sharing Android application, CameraDP, that primarily relies on ad-hoc Wifi. The app runs on top of the novel DIstributed Programming Layer Over Mobile Agents (DIPLOMA) programming abstraction. ...

Li, HaoQi, M. Eng. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

215

E-Print Network 3.0 - ad hoc routing Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

routing Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc routing Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for wireless...

216

E-Print Network 3.0 - ad hoc theatre Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

theatre Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc theatre Page: << < 1 2 3 4 5 > >> 1 his year, Indiana University celebrates its 75th...

217

Children and Implicature 1 Ad-hoc Implicature in Preschool Children  

E-Print Network [OSTI]

Children and Implicature 1 Ad-hoc Implicature in Preschool Children Alex J. Stiller Department version of this work was presented to the Cognitive Science Society in Stiller, Goodman, and Frank (2011

Pratt, Vaughan

218

Mobility Management Using Virtual Multi-parent Tree in Infrastructure Incorporated Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

Mobile nodes in the integrated network of infrastructure networks and mobile ad hoc networks need ... other traditional methods - proactive, reactive, and hybrid by resorting to simulation. The result shows...

Trung-Dinh Han; Hoon Oh

2009-01-01T23:59:59.000Z

219

Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments  

E-Print Network [OSTI]

Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed ...

Dastangoo, Siamak

220

E-Print Network 3.0 - ad hoc methods Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

leveling 22 7,142,524 System and method for using an ad-hoc ... Source: Toh, C-K. - Mobile Network Protocol Laboratory & Department of Electrical and Electronic Engineering,...

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

RAMBONODES for the Metropolitan Ad Hoc Network Jacob Beal Seth Gilbert  

E-Print Network [OSTI]

RAMBONODES for the Metropolitan Ad Hoc Network Jacob Beal Seth Gilbert MIT Computer Science at this scale. Other algorithms for the MAN setting includes Beal's prior work with PERSISTENTNODE [2, 3], where

Gilbert, Seth

222

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

223

Abstract--Location discovery is a fundamental problem in wireless ad hoc networks. Most of the ad hoc routing  

E-Print Network [OSTI]

, Section 4 our approach for optimal flooding, Section 5 presents the simulation results of OFP, Section 6 hoc routing protocols use some form of flooding to discover the location and route of a mobile node. Despite various optimizations, many messages are propagated unnecessarily. We propose the Optimal Flooding

Jain, Raj

224

E-Print Network 3.0 - age ad multos Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: evaluation of the authorized views is highly required. To this end, ad-hoc query evaluation techniques... of lightness, battery life, security and production...

225

A modeling framework for supporting and evaluating performance of multi-hop paths in mobile ad-hoc wireless networks  

Science Journals Connector (OSTI)

Performance evaluation is a crucially important part of designing any mobile ad-hoc wireless networks. For a more comprehensive evaluation, mathematical analysis is essential, along with simulation. In this paper, we present a detailed analytical model ... Keywords: Mobile ad-hoc networks, Multi-hop paths, Node mobility model, Performance analysis

Le The Dung; Beongku An

2012-09-01T23:59:59.000Z

226

Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

at Boulder Boulder, CO-80309 Abstract--A minimum energy routing protocol reduces the energy con- sumption the energy consumption of a wireless ad hoc network. Past research has focused on energy savings schemes1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc

Brown, Timothy X.

227

A Layer-2 Framework for Interconnecting Ad Hoc Networks to Fixed Internet: Test-bed Implementation and Experimental Evaluation  

Science Journals Connector (OSTI)

......advanced ad hoc networking technologies, employing mechanisms that...using the IEEE 802.11 technology [2]) using an ad hoc routing...mobility and facilitates the Intranet communications. In our architecture...wireless link because wired technologies are still more reliable and......

E. Ancillotti; R. Bruno; M. Conti; E. Gregori; A. Pinizzotto

2007-07-01T23:59:59.000Z

228

PARAMETERIZED NEIGHBORHOODBASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Munawar, Sagar Naik, Paul A.S. Ward  

E-Print Network [OSTI]

PARAMETERIZED NEIGHBORHOOD­BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Flooding is a simple routing technique that can be used to transmit data from one node to every other node in a network. The focus of this paper is to investigate im­ provements to flooding techniques used in ad hoc

Ward, Paul A.S.

229

Knowledge adaptation for ad hoc multimedia event detection with few exemplars  

Science Journals Connector (OSTI)

Multimedia event detection (MED) has a significant impact on many applications. Though video concept annotation has received much research effort, video event detection remains largely unaddressed. Current research mainly focuses on sports and news event ... Keywords: ad hoc med, knowledge adaptation, multimedia event detection (med), structural adaptive regression (sar)

Zhigang Ma; Yi Yang; Yang Cai; Nicu Sebe; Alexander G. Hauptmann

2012-10-01T23:59:59.000Z

230

Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommunications -Dynamic Power-Conscious Routing Concepts  

E-Print Network [OSTI]

Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommunications - Dynamic Power networks MANETs for emer- gency telecommunication. A MANET is an autonomous collection of mobile nodes into mobile nodes. A MANET for emergency telecommunication may operate in a stand-alone manner or be connected

231

Context Representation, Transformation and Comparison for Ad Hoc Product Data Exchange  

E-Print Network [OSTI]

and Chengzheng Sun School of Computing and Information Technology Griffith University, Brisbane, QLD 4111 enterprises (SMEs) encode their Web product data in ad hoc formats for electronic product catalogues- eration between Web-based firms [9][13]. However, millions of small and medium sized enterprises (SMEs

Guo, Jingzhi

232

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks  

E-Print Network [OSTI]

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks is proposed, called Keywords Cognitive Radio Networks, routing, dynamic spectrum allocation, cross-layer design 1. INTRODUCTION

Melodia, Tommaso

233

Convoy driving through ad-hoc coalition formation Majid Ali Khan and Ladislau Boloni  

E-Print Network [OSTI]

and low power wireless communication abilities. We assume that it can read the speed of the vehicle of Electrical and Computer Engineering University of Central Florida Orlando, Florida, 32816 Email: khan in an ad-hoc manner between vehicles whose drivers do not know each other, might not have common goals

Bölöni, Ladislau L

234

A Robust Clustering Algorithm for Mobile Ad Hoc Networks Zhaowen Xing  

E-Print Network [OSTI]

cooperative infrastructures. Thus, each node operates as an autonomous end system and a router for others + (603) 7967-6367 Email: kkphang@um.edu.my Chapter submitted to Handbook of Research on Next Generation Clustering Algorithm for Mobile Ad Hoc Networks ABSTRACT To mimic the operations in fixed infrastructures

Gruenwald, Le

235

Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application  

E-Print Network [OSTI]

for MANETs in two important areas: trust bias minimization and applica- tion performance maximization1 Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile

Chen, Ing-Ray

236

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey  

E-Print Network [OSTI]

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Zhongliang Zhao, Torsten and software are allowing the rapid development of small unmanned aerial vehicles (UAVs), capable of per fiber-reinforce plastic materials let UAVs become an aerial platform, that can be equipped

Braun, Torsten

237

A Mobility Model For UAV Ad hoc Network Ouns Bouachir, Alinoe Abrassart, Fabien Garcia, Nicolas Larrieu  

E-Print Network [OSTI]

A Mobility Model For UAV Ad hoc Network Ouns Bouachir, Alinoe Abrassart, Fabien Garcia, Nicolas, there is an in- creasing attention on micro-UAVs in the military area as well as in the civilian domain. They are used as swarm (several UAVs) forming a UAS (Unmanned Aircraft System) since they are relatively cheap

Boyer, Edmond

238

Energy-based adaptation in simulations of survivability of ad hoc communication  

E-Print Network [OSTI]

Energy-based adaptation in simulations of survivability of ad hoc communication Massimiliano Raciti are overloaded or not available. Unfortunately, the constrained capacity of their batteries and the energy of the resources. Real- time adaptation can further minimise their impact on the energy consumption, increasing

239

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network [OSTI]

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

240

Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking  

E-Print Network [OSTI]

Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking protocols re- quires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network

Sirer, Emin Gun

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

AN ECONOMICAL, DEPLOYABLE AND SECURE VEHICULAR AD HOC NETWORK Baber Aslam, Ping Wang and Cliff Zou  

E-Print Network [OSTI]

of VANET deployment. VANETs have hybrid architecture containing both the infrastructure and the ad hoc vehicles have wireless communication devices installed along with an elaborate road side infrastructure infrastructure will exist. In this paper, we present an economical, scalable and deployable VANET system design

Zou, Cliff C.

242

Multicast Capacity in Mobile Wireless Ad Hoc Network with Infrastructure Support  

E-Print Network [OSTI]

. Index Terms--Wireless ad hoc network; multicast capacity; mobility; infrastructure; hybrid network that infrastructure can offer a linear capacity increase in hybrid network, when the number of base stations increases the multicast capacity in a static hybrid network with infrastructure support. Establishing the multicast tree with the

Wang, Xinbing

243

Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks  

E-Print Network [OSTI]

) and the multicast routing tree (network layer property) in order to construct an energy-efficient key distributionCross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks Loukas, University of Washington, Seattle, WA Abstract-- We consider the problem of secure multicast in an energy

Poovendran, Radha

244

Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

trees with multiple optimization objectives. A. Related Work A number of energy-aware broadcast] that the problem of finding a minimum-energy broadcast tree is NP-hard. Particularly in [2], they have shownMinimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks Weifa

Liang, Weifa

245

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura  

E-Print Network [OSTI]

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura is a key requirement. Current grid security mechanisms support individual users who are members of well-defined virtual organizations. Recent research seeks to provide manageable grid security services for self

Kafura, Dennis

246

Realistic Large Scale ad hoc Animal Monitoring Bartosz Wietrzyk, Milena Radenkovic  

E-Print Network [OSTI]

Realistic Large Scale ad hoc Animal Monitoring Bartosz Wietrzyk, Milena Radenkovic School for profitability of animal production as well as welfare of animals and farmers. In this paper we define requirements for such monitoring on the basis of questionnaires distributed to potential users and processing

Aickelin, Uwe

247

Current networks require ad-hoc operating procedures by expert administrators to handle  

E-Print Network [OSTI]

1 Abstract Current networks require ad-hoc operating procedures by expert administrators to handle and operational procedures; and coordinate these changes with those caused by built-in element procedures ­ handle implemented in two complementary versions and is now being applied to automate several configuration

Yemini, Yechiam

248

A Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks  

E-Print Network [OSTI]

to re-establish broken routes. Thus, a considerable global energy gain can be achieved by minimizing. The choice of the primary route in MEA-DSR is conditioned by two factors: 1) the residual energy of nodesA Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks S. Chettibi

Boyer, Edmond

249

Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications  

E-Print Network [OSTI]

Autonomous Undersea Systems Network (AUSNet) ­ Protocols To Support Ad-Hoc AUV Communications@technologysystemsinc.com D. Richard Blidberg Steve Chappell Sai Mupparapu Autonomous Undersea Systems Institute 86 Old reports progress within the AUSNET (Autonomous Undersea Systems Network) program. AUSNET addresses

250

AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS  

E-Print Network [OSTI]

AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) ­ PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS. Richard Blidberg Steve Chappell Autonomous Undersea Systems Institute Lee, NH (www.ausi.org) blidberg@ausi.org chappell@ausi.org Abstract This paper reports progress within the AUSNET (Autonomous Undersea Systems

251

Dynamic Rate and Power Allocation in Wireless Ad Hoc Networks with Elastic and Inelastic Traffic  

Science Journals Connector (OSTI)

In this paper, we focus on the problem of dynamic rate and power allocation in wireless ad hoc networks with slow-fading channels, where a mixture of elastic and inelastic traffic is supported. A stochastic optimization problem incorporating the quality ... Keywords: Dynamic resource allocation, Elastic flows, Inelastic flows, Particle swarm optimization (PSO), QoS requirements, Stochastic duality theory

Fei Wang; Xiaofeng Liao; Songtao Guo; Hongyu Huang; Tingwen Huang

2013-05-01T23:59:59.000Z

252

Constructing Minimum-Energy Broadcast Trees In Wireless Ad Hoc Networks  

E-Print Network [OSTI]

networks are not available or not economical to build [3]. These span the commercial, public as well it is not economical to build a fixed in- frastructure for a short temporary usage. In tactical battle- fieldConstructing Minimum-Energy Broadcast Trees In Wireless Ad Hoc Networks Weifa Liang Department

Liang, Weifa

253

On the Energy Efficiency of Cognitive Radios -A Simulation Study of the Ad Hoc Wireless  

E-Print Network [OSTI]

on energy consumption in the ad hoc WLAN scenario. Limiting this study to just the WLAN scenario allows us on selected spectrum. The benefits in terms of reduced energy consumption, however, due to easier channel important parameters and their impact on energy consumption. Index Terms--Cognitive Radios, Energy

Namboodiri, Vinod

254

A Scalable Message Passing Interface Implementation of an Ad-Hoc Parallel I/o system  

Science Journals Connector (OSTI)

In this paper we present the novel design, implementation, and evaluation of an ad-hoc parallel I/O system (AHPIOS). AHPIOS is the first scalable parallel I/O system completely implemented in the Message Passing Interface (MPI). The MPI implementation ... Keywords: distributed file systems, parallel I/O, parallel systems, parallelism and concurrency

Florin Isaila; Francisco Javier Garcia Blas; Jess Carretero; Wei-Keng Liao; Alok Choudhary

2010-05-01T23:59:59.000Z

255

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks  

E-Print Network [OSTI]

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks François Ingelrest.Mitton,David.Simplot}@lifl.fr Abstract--We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our

Paris-Sud XI, Université de

256

Energy-ef cient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network  

E-Print Network [OSTI]

Energy-ef cient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network Wenzhong Li City University of Hong Kong Kowloon, Hong Kong Email: wenzhong@cityu.edu.hk Edward Chan City dynamically. Most existing cache strategies perform replacement independently, and they seldom consider

Chan, Edward

257

Energy-efficient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc  

E-Print Network [OSTI]

Energy-efficient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network Edward Chan a, ,Wenzhong Li a,b ,Daoxu Chen b aCity University of Hong Kong, Kowloon, Hong Kong b. Most existing cache strategies perform replacement independently, and they seldom consider coordinated

Chan, Edward

258

Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks  

E-Print Network [OSTI]

Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks Niranjan in a harsh terrain typically are battery operated and, therefore, require energy efficient network protocols. In order to ease the analysis of the energy usage of proposed network protocols, this paper proposes

Jay Yang, Shanchieh

259

New Flooding Control Schemes Applied In Route Initialisation For The Ad Hoc On Demand Routing Protocols  

E-Print Network [OSTI]

New Flooding Control Schemes Applied In Route Initialisation For The Ad Hoc On Demand Routing College London * Email: uceephu@ucl.ac.uk Abstract: This paper introduces a new route request flooding. This scheme aims to control and reduce the route request flooding. Furthermore, the scheme combines

Haddadi, Hamed

260

Localized Low-Weight Graph and Its Applications in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

with O(log n) bits) and small computation cost, where n is the number of wireless nodes. Test results through multi- hop wireless links by using intermediate nodes to relay the message. Consequently, each if the Euclidean distance uv is less than one unit. Wireless ad hoc networks require special treatment

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

American Institute of Aeronautics and Astronautics Ad Hoc UAV Ground Network (AUGNet)  

E-Print Network [OSTI]

which act as relays. We envision two scenarios for this type of network. In the first, the UAV acts and analysis. This paper describes these components and performance results measured at an outdoor test range of distance and/or terrain. The UAV, with a better view of the nodes, maintains connectivity as an ad hoc

Brown, Timothy X.

262

Applications of k-Local MST for Topology Control and Broadcasting in Wireless Ad Hoc  

E-Print Network [OSTI]

the local broadcast communication model. Test results are corroborated in the simulation study. We study some other way. More specifically, it is enough for our protocols when each node knows the distance intermediate nodes to relay the messages. Consequently, each node in the wireless ad hoc network also acts

Li, Xiang-Yang

263

A Simulation Model of DYMO for Ad Hoc Routing in OMNeT++  

E-Print Network [OSTI]

A Simulation Model of DYMO for Ad Hoc Routing in OMNeT++ Christoph Sommer Isabel Dietrich Falko describe a simulation model of DYMO, Permission to make digital or hard copies of all or part of this work of MANETs are available as simulation models, including the complete TCP/IP stack and an AODV implementation

Breu, Ruth

264

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

Brown, Timothy X.

265

On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone  

E-Print Network [OSTI]

the ocean temperature for an accurate weather prediction, detecting the 1 Email: xdhu@mspil.edu.cn 2 Email region [7]. As each node in the ad hoc networks has a limit transmis- sion power and the networks have in the future. 2. Main results and proofs In order to state our main results, we first introduce some

266

Finance and Administration Ad Hoc Committee on Diversity and Inclusion At the December 3 Finance and Administration stem department heads' meeting, an  

E-Print Network [OSTI]

Finance and Administration Ad Hoc Committee on Diversity and Inclusion At the December 3 Finance initiative at Lehigh University. An ad hoc committee has been established to brainstorm ideas and develop

Napier, Terrence

267

Report to the Faculty Senate from the ad hoc Faculty Senate Exigency Plan Study Committee (Torbjrn Wandel, John Bohac, Sal Costa, Betsy Delmonico, Peter Rolnick [chair])  

E-Print Network [OSTI]

Report to the Faculty Senate from the ad hoc Faculty Senate Exigency Plan Study Committee (Torbjörn Wandel, John Bohac, Sal Costa, Betsy Delmonico, Peter Rolnick [chair]) March 16, 2011 The ad hoc Faculty

Gering, Jon C.

268

arXiv:0804.3902v1[cs.DS]24Apr2008 Minimum-energy broadcast in random-grid ad-hoc  

E-Print Network [OSTI]

arXiv:0804.3902v1[cs.DS]24Apr2008 Minimum-energy broadcast in random-grid ad-hoc networks ranges to the nodes of an ad-hoc network in order to guarantee a directed spanning tree from a given in ad-hoc networks. In ad-hoc net- works, nodes are able to vary their transmission ranges in order

Rossi, Gianluca

269

Ad Hoc Sample Policy Accepting Samples from Private Citizens or NGOs. Our lab works with over 50 different partners across the political spectrum. One reason  

E-Print Network [OSTI]

Ad Hoc Sample Policy ­ Accepting Samples from Private Citizens or NGOs. Our lab works with over 50 have enacted the following laboratory policy: All ad hoc samples (i.e., samples not part of an ongoing ask that if anyone is submitting an ad hoc sample to the lab they use the chain of custody form found

270

NAC Ad-Hoc Task Force on Planetary Defense July 8-9, 2010 CORRECTED 9/15/10 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense July 8-9, 2010 ­ CORRECTED 9/15/10 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense CORRECTED MINUTES Meeting Date: July 8 - 9, 2010 AGENDA: · Ad-Hoc Task Force Timeline · Fact Finding Report · Next Generation Ground-Based Search · Space

Waliser, Duane E.

271

NAC Ad-Hoc Task Force on Planetary Defense Apr 15-16, 2010 CORRECTED 6/10/10 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense Apr 15-16, 2010 ­ CORRECTED 6/10/10 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense CORRECTED MINUTES Meeting Date: April 15-16, 2010 AGENDA: · Ad-Hoc Task Force Terms of Reference · NASA Near Earth Objects Observation (NEOO) Program

Waliser, Duane E.

272

Abstract--This paper develops an analytical model for evaluating the Quality of Service (QoS) in wireless ad-hoc  

E-Print Network [OSTI]

S) in wireless ad-hoc networks. In doing so it extends the trunking theory concepts to encompass the effect of co. INTRODUCTION In the last few years mobile ad-hoc networks for personal communication services have emerged nature of ad-hoc networks makes them more robust to systemic failures, easier to deploy, and more

Haimovich, Alexander

273

Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.  

SciTech Connect (OSTI)

Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

2003-12-01T23:59:59.000Z

274

PNNI routing support for ad hoc mobile networking: A flat architecture  

SciTech Connect (OSTI)

This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

Martinez, L.; Sholander, P.; Tolendino, L.

1997-12-01T23:59:59.000Z

275

An Algorithm for Selecting a Group Leader in Mobile Robots Realized by Mobile Ad Hoc Networks and Object Entropy  

Science Journals Connector (OSTI)

This paper proposes a novel algorithm for mobile robots to select a group leader and to ... perform a specific work. The concepts of mobile ad hoc network (MANET) and object ... selection of a group leader. A log...

Sang-Chul Kim

2007-01-01T23:59:59.000Z

276

Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks  

SciTech Connect (OSTI)

In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

2002-10-01T23:59:59.000Z

277

Detect DDoS flooding attacks in mobile ad hoc networks  

Science Journals Connector (OSTI)

Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.

Yinghua Guo; Sylvie Perreau

2010-01-01T23:59:59.000Z

278

TECHNICAL REPORT TR-09-02, UC DAVIS, SEPTEMBER 2009. 1 On the Connectivity and Multihop Delay of Ad Hoc Cognitive  

E-Print Network [OSTI]

delay of ad hoc cognitive radio networks, where the transmission delay of each hop consists]. In this technical report, we focus on the connectivity and multihop delay of ad hoc cognitive radio networks. DueTECHNICAL REPORT TR-09-02, UC DAVIS, SEPTEMBER 2009. 1 On the Connectivity and Multihop Delay of Ad

Islam, M. Saif

279

Fusion of one-class classifiers for protocol-based anomaly detection in AODV-based mobile ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc on-demand distance vector (AODV) is a widely used routing protocol for mobile ad hoc networks that fully trusts all participants and has no security considerations. As a result, malicious nodes can violate the protocol and disrupt the network operations. In this paper, a protocol-based anomaly detection method in ad hoc networks with AODV routing protocol is proposed. In doing so, we use a step-by-step approach for modelling the normal behaviour of AODV, and utilise a combination of support vector data description (SVDD) and mixture of Gaussians (MoGs) one-class classifiers to classify any deviation from the normal behaviour as an anomaly. These two classifiers are chosen among six utilised classifiers according to their diversity and better accuracy. Simulation results demonstrate the effectiveness of the proposed method for detecting many types of attacks (e.g., wormhole, blackhole, rushing and denial of service (DoS)).

Mohammad Rahmanimanesh; Saeed Jalili; Ahmad R. Sharafat

2013-01-01T23:59:59.000Z

280

On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks without Common Control Channel  

E-Print Network [OSTI]

Cognitive radio (CR) technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the spectrum in an opportunistic manner. Since unlicensed users are temporary visitors to the licensed spectrum, they are required to vacate the spectrum when a licensed user reclaims it. Due to the randomness of the appearance of licensed users, disruptions to both licensed and unlicensed communications are often difficult to prevent. In this chapter, a proactive spectrum handoff framework for CR ad hoc networks is proposed to address these concerns. In the proposed framework, channel switching policies and a proactive spectrum handoff protocol are proposed to let unlicensed users vacate a channel before a licensed user utilizes it to avoid unwanted interference. Network coordination schemes for unlicensed users are also incorporated into the spectrum handoff protocol design to realize channel rendezvous. Moreover, a distributed channel selection scheme to eliminate collisions a...

Song, Yi

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

An Ad-Hoc Method for Obtaining chi**2 Values from Unbinned Maximum Likelihood Fits  

E-Print Network [OSTI]

A common goal in an experimental physics analysis is to extract information from a reaction with multi-dimensional kinematics. The preferred method for such a task is typically the unbinned maximum likelihood method. In fits using this method, the likelihood is a goodness-of-fit quantity in that it effectively discriminates between available hypotheses; however, it does not provide any information as to how well the best hypothesis describes the data. In this paper, we present an {\\em ad-hoc} procedure for obtaining chi**2/n.d.f. values from unbinned maximum likelihood fits. This method does not require binning the data, making it very applicable to multi-dimensional problems.

M. Williams; C. A. Meyer

2008-06-30T23:59:59.000Z

282

On effectiveness of cooperation enforcement mechanisms in wireless ad hoc networks  

Science Journals Connector (OSTI)

Wireless ad hoc networks are resource constrained, infrastructureless peer to peer networks where nodes are responsible for performing routing activity for other nodes to establish end to end communication. Due to limited resources (energy and bandwidth), in certain networks, nodes may behave selfishly and not forward packets for other nodes. Many cooperation enforcement mechanisms are proposed in literature to enforce packet forwarding on resource constrained nodes, and are shown to perform better than the defenseless dynamic source routing (DSR) protocol under their own set of assumptions. However, they do not consider the effect on network lifetime and energy consumption. Here we analyse routing overhead, end to end packet delivery ratio (PDR), and per packet energy cost of DSR and a representative set of cooperation enforcement mechanisms using various network scenario to show that in absence of infrastructure support cooperation enforcement mechanisms in their present form are not effective in dealing with node selfishness.

Manish Chaturvedi; Sanjay Srivastava

2012-01-01T23:59:59.000Z

283

PARAMETERIZED NEIGHBORHOOD-BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Munawar, Sagar Naik, Paul A.S. Ward  

E-Print Network [OSTI]

PARAMETERIZED NEIGHBORHOOD-BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Flooding is a simple routing technique that can be used to transmit data from one node to every other node in a network. The focus of this paper is to investigate im- provements to flooding techniques used in ad hoc

Ward, Paul A.S.

284

A link availability-based QoS-aware routing protocol for mobile ad hoc sensor networks  

Science Journals Connector (OSTI)

With more and more wireless devices being mobile, there is a constant challenge to provide reliable and high quality communication services among these devices. In this paper, we propose a link availability-based QoS-aware (LABQ) routing protocol for ... Keywords: Ad hoc network, Mobility, QoS, Routing, Sensor

Ming Yu; Aniket Malvankar; Wei Su; Simon Y. Foo

2007-12-01T23:59:59.000Z

285

Self-limiting adaptive protocols for controlled flooding in ad hoc networks Larry Hughes and Ying Zhang  

E-Print Network [OSTI]

Self-limiting adaptive protocols for controlled flooding in ad hoc networks Larry Hughes and Ying power consumption, reduce traffic, and restrict flooding, are of growing importance. In this paper-aware nodes, can reduce the number of nodes involved in a transmission. Simulation results show

Hughes, Larry

286

Real-Time Spatio-Temporal Query Processing in Mobile Ad-Hoc Sensor Networks  

E-Print Network [OSTI]

that has multiple sensors (e.g., mo- tion sensors, acoustic sensors, infrared light emitting diodes, and pa

287

An ad hoc mobile network is a collectionof mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continualbasis. In order to facilitatecommunicationwithin the networ  

E-Print Network [OSTI]

Abstract An ad hoc mobile network is a collectionof mobile nodes that are dynamically routes between nodes. The primary goal of such an ad hoc network routing protocol is correct.This articleexamines routing protocols for ad hoc networksand evaluates these protocols based on a given set

Toh, C-K.

288

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect (OSTI)

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

289

E-Print Network 3.0 - ad hoc on-demand Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

hoc network... , but there are presently no complete proposals for ... Source: Johnson, David B. - Department of Computer Science, Rice University Collection: Computer...

290

Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms  

SciTech Connect (OSTI)

A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

Kurt Derr; Milos Manic

2013-11-01T23:59:59.000Z

291

Enabling optimization in LCA: from ad hoc to structural LCA approachbased on a biodiesel well-to-wheel case study  

Science Journals Connector (OSTI)

Applied life cycle assessment (LCA) studies often lead to a comparison of ... alternatives; we call this the ad hoc LCA approach. This can seem surprising since ... most promising. We call it the structural LCA

Ivan T. Herrmann; Martin Lundberg-Jensen

2014-01-01T23:59:59.000Z

292

Manufacturing Change at the John Deere Harvester Works: Report on the Visit of the Ad Hoc Lean Aircraft Initiative Team, June 7, 1994  

E-Print Network [OSTI]

On June 7, 1994, an Ad Hoc team from LAI visited John Deere to conduct an informal benchmark of John Deere's successful change to Leaner Manufacturing. This report summarizes the results of that trip, as well as summarizing ...

Stahl, Fred

293

An Overview of Scaling Laws in Ad Hoc and Cognitive Radio Networks  

E-Print Network [OSTI]

of secondary spectrum licensing (SSL). Regulations on the usage of licensed spectra are being loosened, encouraging unused primary spectrum to be licensed, often in an opportunistic manner, to secondary devices-hoc networks, cognitive networks, cognitive radio. 1. Introduction 1.1. Secondary spectrum opportunities

Vu, Mai

294

Design and Evaluation of a Distributed Clustering Algorithm for Mobile ad hoc Networks  

Science Journals Connector (OSTI)

......are presented: power consumption per...clusterheads, power consumption...delay reveal that system performance is...enforcement, and rescue operations. As various kinds...demonstrate that the system performance is...show up to 45% power savings and up...hoc Networks. Handbook on Algorithms......

Daniel Lacks; Mainak Chatterjee; Taskin Kocak

2009-08-01T23:59:59.000Z

295

EXPLOITING DYNAMIC SOURCE ROUTING TO ENABLE UNDERSEA NETWORKING OVER AN AD-HOC TOPOLOGY  

E-Print Network [OSTI]

optimized to support a dynamically evolving topology of truly semi-autonomous networked robots. Emerging-hoc (self-forming, self- maintaining) networks from an assorted collection of platforms, ranging from simple sensors to unmanned autonomous vehicles to manned submersibles, would allow a richly interactive

296

DEBUT: Delay Bounded Service Discovery in Urban Vehicular Ad-hoc Networks  

E-Print Network [OSTI]

vehicle-to-vehicle communications. Second, the cost of updating the index information of resources should cost to equip the indexing vehicles must be reduced. Last, queries for certain resources are generally, Jia-Liang Lu, Min-You Wu Department of Computer Science and Engineering Shanghai Jiao Tong University

297

On the Approximation Ratio of the MST-based Heuristic for the Energy-Efficient Broadcast Problem in Static Ad-Hoc Radio Networks  

E-Print Network [OSTI]

are located (see [28, 32]). Energy conservation is a critical issue in an ad-hoc wire- less networkOn the Approximation Ratio of the MST-based Heuristic for the Energy-Efficient Broadcast Problem@dia.unisa.it Abstract We present a technique to evaluate the approximation ra- tio on random instances of the Minimum

Bermond, Jean-Claude

298

Multi-transceiver simulation modules for free-space optical mobile ad hoc networks  

E-Print Network [OSTI]

and Murat Yuksel University of Nevada - Reno, CSE Department, MS 171 1664 N. Virginia Street, Reno, NV 89557 advantage of propagating in all directions enabling a receiver to roam inside the transmission sphere significant difference between FSO and RF is the requirement of line- of-sight in FSO, adding space

Yuksel, Murat

299

Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration  

SciTech Connect (OSTI)

Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a new technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.

Kurt Derr

2011-12-01T23:59:59.000Z

300

Homoclinic chaos in axisymmetric Bianchi-IX cosmological models with an ad hoc quantum potential  

SciTech Connect (OSTI)

In this work we study the dynamics of the axisymmetric Bianchi-IX cosmological model with a term of quantum potential added. As it is well known, this class of Bianchi-IX models is homogeneous and anisotropic with two scale factors, A(t) and B(t), derived from the solution of Einstein's equation for general relativity. The model we use in this work has a cosmological constant and the matter content is dust. To this model we add a quantum-inspired potential that is intended to represent short-range effects due to the general relativistic behavior of matter in small scales and play the role of a repulsive force near the singularity. We find that this potential restricts the dynamics of the model to positive values of A(t) and B(t) and alters some qualitative and quantitative characteristics of the dynamics studied previously by several authors. We make a complete analysis of the phase space of the model finding critical points, periodic orbits, stable/unstable manifolds using numerical techniques such as Poincare section, numerical continuation of orbits, and numerical globalization of invariant manifolds. We compare the classical and the quantum models. Our main result is the existence of homoclinic crossings of the stable and unstable manifolds in the physically meaningful region of the phase space [where both A(t) and B(t) are positive], indicating chaotic escape to inflation and bouncing near the singularity.

Correa, G. C.; Stuchi, T. J.; Joras, S. E. [Instituto de Fisica, Universidade Federal do Rio de Janeiro, Caixa Postal 68528, Rio de Janeiro, RJ 21941-972 (Brazil)

2010-04-15T23:59:59.000Z

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems  

SciTech Connect (OSTI)

The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

Hope Forsmann; Robert Hiromoto; John Svoboda

2007-04-01T23:59:59.000Z

302

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

303

The "Hot Potato" Case: Challenges in Multiplayer Pervasive Games Based on Ad hoc Mobile Sensor Networks and the Experimental Evaluation of a Prototype Game  

E-Print Network [OSTI]

In this work, we discuss multiplayer pervasive games that rely on the use of ad hoc mobile sensor networks. The unique feature in such games is that players interact with each other and their surrounding environment by using movement and presence as a means of performing game-related actions, utilizing sensor devices. We discuss the fundamental issues and challenges related to these type of games and the scenarios associated with them. We also present and evaluate an example of such a game, called the "Hot Potato", developed using the Sun SPOT hardware platform. We provide a set of experimental results, so as to both evaluate our implementation and also to identify issues that arise in pervasive games which utilize sensor network nodes, which show that there is great potential in this type of games.

Chatzigiannakis, Ioannis; Akribopoulos, Orestis; Logaras, Marios; Kokkinos, Panagiotis; Spirakis, Paul

2010-01-01T23:59:59.000Z

304

Query Expansion Using a Collection Dependent Probabilistic Latent Semantic Thesaurus  

Science Journals Connector (OSTI)

Many queries on collections of text documents are too short to produce informative results. Automatic query expansion is a method of adding terms to the query without interaction from the user in order to obtain ...

Laurence A. F. Park; Kotagiri Ramamohanarao

2007-01-01T23:59:59.000Z

305

Query | Department of Energy  

Office of Environmental Management (EM)

Query Query Query Query1.pdf Query More Documents & Publications DOE Retrospective Review Plan and Burden Reduction Report July 29, 2013 DOE EO 13563 January 2014 Update Report...

306

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...N. Couper Lisa Craig Robert A. Cramer Alison K. Criss Peter D. Crompton Jorge H...Jose L. Puente Odile Puijalon R. Pyles Alison J. Quayle Marianne Quiding- Jarbrink...Winstanley Sebastian E. Winter Kim S. Wise Jeffrey H. Withey Christiane Wolz Hector...

Ferric C. Fang

2011-12-01T23:59:59.000Z

307

Ad hoc UEC Conference Call  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

will review draft program by Mon Aug 11 so authors can be notified by Aug 13 * 51 posters submitted before the deadline, 2 late; can accept them all but poster session space...

308

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Bhattacharya Kay Bidle Jill R. Blankenship John Boothroyd Katherine Borkovich Barry J. Bowman Nanette R. Boyle Axel A. Brakhage...Houten C. C. Wang Jianyang Wang Christopher M. West Robert Wheeler Malcolm S. Whiteway Heather Wilkinson Bryony A. P. Williams...

Aaron P. Mitchell

2011-12-01T23:59:59.000Z

309

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Ward Peter A. Ward Juliane Bubeck Wardenburg Jason Warfel Katherine Wasson Valerie J. Waters W. Ray Waters Eleanor Watson Tassili...Weiss Siegfried Weiss Susan Welkos Hannah Wexler Robert T. Wheeler Robert A. Whiley Marvin Whiteley Lothar H. Wieler Willem...

Ferric C. Fang

2011-12-01T23:59:59.000Z

310

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Klein Michele M. Klingbeil Kirstine Klitgaard David J. Klumpp Katherine L. Knight Leigh Knodler Laura J. Knoll Fumie Kobayashi Scott...Welch Rodney A. Welch Melanie Wellington Haitao Wen Robert T. Wheeler Marvin Whiteley Brian L. Wickes Willem J. Wiersinga Odilia...

Ferric C. Fang

2014-12-01T23:59:59.000Z

311

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Leys Chunhao Li Ganwu Li Lin-Xi Li Stephen J. Libby Andrew H...Cecilia Wall Hui Wang Jianyang Wang Jin-Town Wang Peng George Wang Ping Wang Ruobing Wang Shaohui Wang...Xavier Guoqing Xia Lijun Xia Ping Xu Qingfu Xu Xuenan Xuan Anjali...

Ferric C. Fang

2014-12-01T23:59:59.000Z

312

boolean queries Inverted index  

E-Print Network [OSTI]

boolean queries Inverted index query processing Query optimization boolean model September 9, 2014 1 / 39 #12;boolean queries Inverted index query processing Query optimization Outline 1 boolean queries 2 Inverted index 3 query processing 4 Query optimization 2 / 39 #12;boolean queries Inverted index

Lu, Jianguo

313

Caf Systems Central Security Access Form  

E-Print Network [OSTI]

and Procurement Tracking Reports (Encumbrances, Delivery, Change Order History) SCH_SUPPLY_CHAIN Ad Hoc Query Runner Ability to run reports created by Ad Hoc Query Authors CAFE_NU_COGNOS_AD_HOC_VIEWERS Ad Hoc Query Author (Training Required) Access to Query Studio to create, build, and save reports CAFE_NU_COGNOS_AD_HOC

Shull, Kenneth R.

314

Microsoft Word - CafeExpressSecurityFormFinal June 2012 v2.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Supply Chain included BudgetCOA Sponsored Program Mgmt Salary Access Ad Hoc Query Viewer Ad Hoc Query Author (training required) Approvals (indicate values...

315

Caf Systems Express Access Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for all departments and projects where row level security has been indicated. Ad Hoc Query Viewer - Provides the ability to run reports created by Ad Hoc Query Authors...

316

Clock synchronization for mobile ad hoc networks  

E-Print Network [OSTI]

As mobile networking advances, there is a need for services such as clock synchronization that improve performance and support the development of higher-level applications. This can be achieved by adapting existing algorithms (such as the Network...

Chandra, Rajan

2013-02-22T23:59:59.000Z

317

Distributed algorithms for mobile ad hoc networks  

E-Print Network [OSTI]

]. In the algorithms in [9], each node keeps a value, called its height, from a totally ordered set (typically, a tuple of integers), and links are logically considered to be directed from higher to lower heights. The heights are manipulated when topology changes... in advance the type and dimensions of the polyhedron that is used for the quanti- zation of S; furthermore, the nodes must be able to measure the distance that they cover when they move. All this adds to the complexity of the algorithm. Also, the ?ori...

Malpani, Navneet

2012-06-07T23:59:59.000Z

318

applications exploring added: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the conference (if available): FUNDING REQUEST 6. Amount Requested from the Ad Hoc Committee: ** Attach case indicate the outcome of your request for funding from each...

319

Query shredding: efficient relational evaluation of queries over nested multisets  

Science Journals Connector (OSTI)

Nested relational query languages have been explored extensively, and underlie industrial language-integrated query systems such as Microsoft's LINQ. However, relational databases do not natively support nested collections in query results. This can ... Keywords: language-integrated query, querying nested collections

James Cheney; Sam Lindley; Philip Wadler

2014-06-01T23:59:59.000Z

320

Fuzzy Rough Set Based Web Query Expansion Martine De Cock and Chris Cornelis  

E-Print Network [OSTI]

Fuzzy Rough Set Based Web Query Expansion Martine De Cock and Chris Cornelis Fuzziness, Krijgslaan 281 (S9), 9000 Gent, Belgium {Martine.DeCock, Chris.Cornelis}@UGent.be Abstract Fuzzy rough set on average -- we focus on query ex- pansion, i.e. the process of adding related terms to the query. Rough set

Gent, Universiteit

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Ad hoc routing protocols with multipoint relaying Ad hoc routing protocols with multipoint  

E-Print Network [OSTI]

. Route repairs are performed by new route request flooding. We show with simulation that the use of MPR the flooding overhead of control traffic. In this paper we show that multipoint relaying can be used as well and route replies are all flooded via Multipoint Relays (MPR). They both open routes to their originators

Paris-Sud XI, Université de

322

Query Optimization Techniques Class Hierarchies  

E-Print Network [OSTI]

Query Optimization Techniques Exploiting Class Hierarchies Sophie Cluet 1 Guido Moerkotte 2 1 INRIA Since the introduction of object base management systems (OBMS), many query optimization techniques tailored for object query languages have been proposed. They adapt known optimization techniques

Mannheim, Universität

323

Complex Queries | Open Energy Information  

Open Energy Info (EERE)

Complex Queries Complex Queries < User:Jweers Jump to: navigation, search Contents 1 Using Nested Queries 1.1 Programs 2 Using Inverse Property Ask Query 3 Using Wildcards Plus Array Print with Count 3.1 States start with A (4) Using Nested Queries Complex Help:Inline queries are queries which involve multiple subjects, properties, or nested queries. The following is an example of a nested query which will return only Programs (Category:Programs) in the Energy Sector (Property:ProgramSector = Energy) within the subsector of Wind (Property:Sector = Wind) which have been developed by National Labs (Category:United States Department of Energy National Laboratories). The last piece mentioned is where the nested query comes into play. To find Programs which have been developed by National Labs, we must search the

324

E-Print Network 3.0 - added 177lu radioisotope Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(TLD) SERVICE Summary: .B. The National Dosimetry Service charges additional fees for ad hoc dosimeter requests. Please allow a minimum... Left Ring Right...

325

E-Print Network 3.0 - ad aristeneto persistenze Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Workflows, teilweise strukturierte Workflows und nicht strukturierte Workflows (Ad-hoc-Workflows). Wf... verschiedene Gruppen von Benutzern unterschieden. Da gibt es...

326

ask queries | OpenEI Community  

Open Energy Info (EERE)

16 May, 2013 - 14:22 Multicolor Maps from Compound Queries ask queries compound queries developer Google maps maps multicolor result formats results Semantic Mediawiki Hi all,...

327

compound queries | OpenEI Community  

Open Energy Info (EERE)

Jweers's picture Submitted by Jweers(83) Contributor 16 May, 2013 - 14:22 Multicolor Maps from Compound Queries ask queries compound queries developer Google maps maps...

328

RFID Enabled Vehicular Network for Ubiquitous Travel Query  

Science Journals Connector (OSTI)

Fixed infrastructure based wireless network is very expensive to provide total coverage and offer ubiquitous communication capacity. RFID enabled Vehicular Network emerges as an alternative which can leverage mobile nodes to bridge the gap between information ... Keywords: Delay, Mobile Relay, Partially Connected, RFID, Vehicular Ad Hoc Network VANET

ZongWei Luo, Tianle Zhang, Chunlu Wang, Shuihua Han, Mengyuan Dong

2011-07-01T23:59:59.000Z

329

Two Queries Harry Buhrman  

E-Print Network [OSTI]

Two Queries Harry Buhrman #3; CWI PO Box 94079 1090 GB Amsterdam The Netherlands Lance Fortnow y \\ B) [ (A \\ B). For complexity classes C and D define the class C#1;D as fA#1;B j A 2 C and B 2 Dg

Fortnow, Lance

330

Approximate XML query answers  

Science Journals Connector (OSTI)

The rapid adoption of XML as the standard for data representation and exchange foreshadows a massive increase in the amounts of XML data collected, maintained, and queried over the Internet or in large corporate data-stores. Inevitably, this will result ...

Neoklis Polyzotis; Minos Garofalakis; Yannis Ioannidis

2004-06-01T23:59:59.000Z

331

Querying genomic databases  

SciTech Connect (OSTI)

A natural-language interface has been developed that retrieves genomic information by using a simple subset of English. The interface spares the biologist from the task of learning database-specific query languages and computer programming. Currently, the interface deals with the E. coli genome. It can, however, be readily extended and shows promise as a means of easy access to other sequenced genomic databases as well.

Baehr, A.; Hagstrom, R.; Joerg, D.; Overbeek, R.

1991-09-01T23:59:59.000Z

332

EIA 176 Query System, 2004  

Gasoline and Diesel Fuel Update (EIA)

4 4 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2004 The EIA-176 Query System is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please refer to the documentation listed below.

333

EIA 176 Query System, 2001  

Gasoline and Diesel Fuel Update (EIA)

1 1 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2001 The EIA-176 Query system is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please read the documentation file(s) listed below

334

EIA 176 Query System, 2003  

Gasoline and Diesel Fuel Update (EIA)

3 3 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2003 The EIA-176 Query System is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please refer to the documentation read the documentation file(s) listed below.

335

Introduction Inverted index Processing Boolean queries Query optimization Web Search and Text Mining  

E-Print Network [OSTI]

Introduction Inverted index Processing Boolean queries Query optimization Web Search and Text Institute of Technology, College of Computing 2011 Gray: Boolean Retrieval 1 / 39 #12;Introduction Inverted index Processing Boolean queries Query optimization Overview 1 Introduction 2 Inverted index 3

Gray, Alexander

336

Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks  

E-Print Network [OSTI]

2004. 3 Joint Scheduling and Power Control for Multicastingusers. This joint scheduling and power control problem is38 Joint Scheduling and Power Control for Multicasting in

Tan, Choo Chin

2013-01-01T23:59:59.000Z

337

Power and spectrum efficient communications in wireless ad hoc networks  

E-Print Network [OSTI]

Ephremides, Joint Scheduling and Power Control for WirelessOptimal Power Control, Scheduling, and Routing in UWBDistributed Joint Scheduling and Power Control Algorithm for

Qu, Qi

2008-01-01T23:59:59.000Z

338

Power and spectrum efficient communications in wireless ad hoc networks  

E-Print Network [OSTI]

on-cooperation message (AoC) with its own user ID included;requesting node receives the AoC message from a neighbor, it

Qu, Qi

2008-01-01T23:59:59.000Z

339

Improving Probabilistic Route Discovery in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L.M. Proceedings of 32nd IEEE Conference on Local Computer Networks (LCN 2007) pp 739-746 IEEE Computer Society Press

Abdulai, J.

340

Adjusted Probabilistic Route Discovery in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L. Journal of Computers and Electrical Engineering, 2008. pp 168-182 Elsevier Science

Abdulai, J.

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

A Dynamic Probabilistic Route Discovery for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L.M. Mohammed,A. International Journal of Communication Networks and Distributed Systems, Volume 4(1) pp 108 - 130

Abdulai, J.

342

Ad-hoc Collaborative Document Annotation on a Tablet PC  

E-Print Network [OSTI]

The use of technology as an effective educational tool has been an elusive goal in the past. Specifically, previous attempts at using small personal computers in the classroom to aid students as collaborative and note-taking ...

Huang, Albert

343

Ad hoc physical Hilbert spaces in Quantum Mechanics  

E-Print Network [OSTI]

The overall principles of what is now widely known as PT-symmetric quantum mechanics are listed, explained and illustrated via a few examples. In particular, models based on an elementary local interaction V(x) are discussed as motivated by the naturally emergent possibility of an efficient regularization of an otherwise unacceptable presence of a strongly singular repulsive core in the origin. The emphasis is put on the constructive aspects of the models. Besides the overall outline of the formalism we show how the low-lying energies of bound states may be found in closed form in certain dynamical regimes. Finally, once these energies are found real we explain that in spite of a manifest non-Hermiticity of the Hamiltonian the time-evolution of the system becomes unitary in a properly amended physical Hilbert space.

Francisco M. Fernndez; Javier Garcia; Iveta Semordov; Miloslav Znojil

2014-05-28T23:59:59.000Z

344

Overview of the INEX 2007 ad hoc track  

E-Print Network [OSTI]

Fuhr,N. Kamps,J. Lalmas,M. Malik,S. Trotman,A. Focused access to XML documents: Sixth Workshop of the INitiative for the Evaluation of XML Retrieval (INEX 2007) pp 1-23 LNCS, Springer

Fuhr, N.; Kamps, J.; Lalmas, M.

345

Bandwidth-efficient routing protocol for mobile ad hoc networks  

E-Print Network [OSTI]

Al-Qassas,R. Al-Ayyoub,A. Ould-Khaoua,M. IEE Proceedings-Software, vol. 150, no. 4, 2003 pp 230-234 IEE

Al-Qassas, R.

346

Self-Stabilizing Local Routing in Ad Hoc Networks  

Science Journals Connector (OSTI)

......MANET) have no fixed network infrastructure (nodes are free to change...need for any existing network infrastructure or administration. Each node...networks modelled as a honeycomb grid is proposed in ref. [15...collected data. Protocol is a hybrid of the protocols and . The......

Doina Bein; Ajoy K. Datta; Vincent Villain

2007-03-01T23:59:59.000Z

347

User level routing for mobile ad hoc networks  

E-Print Network [OSTI]

an alternative architecture where routing is implemented in the user level. User level implementation has many benefits, such as ease of implementation, co-existence of multiple protocols, application specific customizations, and ease of deployment. This thesis...

Virk, Navjot

2001-01-01T23:59:59.000Z

348

Multiple-antenna systems in ad-hoc wireless networks  

E-Print Network [OSTI]

The increasing demand for wireless communication services has resulted in crowding of the electromagnetic spectrum. The "spectral-commons" model, where a portion of the electromagnetic spectrum is public and used on an ...

Govindasamy, Siddhartan, 1975-

2008-01-01T23:59:59.000Z

349

Hybrid Key Management for Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

Many public key infrastructure (PKI) approaches have been proposed in ... networks (MANETs). We present a new hybrid key management infrastructure, which combines the concepts of PKIs for MANET with trusted-third...

David Sanchez Sanchez; Heribert Baldus

2006-01-01T23:59:59.000Z

350

Performance Enhancement of Ad Hoc Networks with Janitor Based Routing  

E-Print Network [OSTI]

We propose and analyze a new on the fly strategy that discovers, repairs and maintains routes in hierarchical and distributed fashion called Janitor Based Routing (JBR). The main motivation behind our JBR protocol is to decrease flooding and routing overhead and increase efficiencies in packet movement. An analytical model for the proposed JBR is presented and detailed simulation is used to observe the performance of JBR. This route discovery and maintenance protocol clearly achieved improvement in terms of reduction of flooding, routing overhead, and, hence, provides enhanced reliability.

Siddique, Isnain; Hashem, M M A

2012-01-01T23:59:59.000Z

351

Enhanced Security Design for Threshold Cryptography in Ad Hoc Network  

E-Print Network [OSTI]

to move arbitrarily. Due to lack of a centralized secure infrastructure, the communication is prone routes through spoofing ARP or IP packets, passively or actively. Due to bandwidth constraints and energy conservation, an efficient implementation of the scheme is critical. We present a new approach to facilitate

Wang, Xiong

352

Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks  

E-Print Network [OSTI]

to find a minimum-energy multicast tree such that the totalof energy-efficient broadcast and multicast trees inof energy-efficient broadcast and multicast trees in

Tan, Choo Chin

2013-01-01T23:59:59.000Z

353

Automation strategies: existing theory or ad hoc decisions?  

Science Journals Connector (OSTI)

Automating manufacturing systems potentially improves competitiveness. Empirical studies show that the most successful result is achieved when decisions concerning automation are linked to the manufacturing strategies and competitive priorities of the company. It is suggested that automation is regarded as a separate decision group, within the manufacturing strategy content field.

Mats Winroth; Kristina Safsten; Johan Stahre

2007-01-01T23:59:59.000Z

354

Achieving Congestion Diversity in Wireless Ad-hoc Networks  

E-Print Network [OSTI]

consisting of 12 802.11g nodes. This small test-bed enables an imperical comparison of CDP's performance is particularly acute in multi-hop networks, where nodes must relay each others packets. We present a congestion- varying distance metric that approximates the queue draining times along each path. Our proposed

Snoeren, Alex

355

RamboNodes for the Metropolitan Ad Hoc Network  

E-Print Network [OSTI]

We present an algorithm to store data robustly in a large, geographically distributed network by means of localized regions of data storage that move in response to changing conditions. For example, data might migrate away ...

Beal, Jacob

2003-12-17T23:59:59.000Z

356

EIA 176 Query System, 2002  

Gasoline and Diesel Fuel Update (EIA)

2 2 EIA Home > Natural Gas > Natural Gas Data Publications EIA 176 Query System 2002 EIA 176 Query System 2002 Release date: February 2, 2004 Next release date: February 2005 The EIA-176 Query system is a Windows-based system which runs under Windows operating systems 95, 98, 2000, NT - 4.0 Service Pack 3 or later. It provides a method of extracting and using the company level data filed on the Form EIA-176, and saving the query results in various media and formats. There are pre-selected data queries, which allow the user to select and run the most often-used queries, as well as the ability to create a customized query. Self-extracting executable files with run-time versions of Access are required to set up the system. You may also download the data tables if you already have Microsoft Access on your computer. For instructions, please read the documentation file(s) listed below.

357

E-Print Network 3.0 - ad floram japoniae Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the most com- plex component of a dialogue system that is generally approached in a ad-hoc fashion Source: Levin, Esther - Department of Computer Science, City College, City...

358

E-Print Network 3.0 - advisory panel ad Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fusion 10 AREA ADVISORY SR1.3.3.1K, Summary: Advisory Committees, is a perennially used ad hoc committee now awaiting formal charge codification... ACADEMIC AREA ADVISORY...

359

E-Print Network 3.0 - ad pode ditar Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computer Technologies and Information Sciences 12 Um Novo Modelo para Confianca em Redes Ad Hoc Pedro B. Velloso1 Summary: significativo aumento no consumo de energia que pode ser...

360

E-Print Network 3.0 - added transportation capacity Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department... As node density D , transport capacity converges to zero at rate O(1D)...

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Assisting Web Search Using Query Suggestion Based on Word Similarity Measure and Query Modification  

E-Print Network [OSTI]

. For example, when the word "Tiger" is entered by a user, current web search engines are mostly focusedAssisting Web Search Using Query Suggestion Based on Word Similarity Measure and Query Modification search engines is query suggestion (QS), which assists users in formulating keyword queries by suggesting

Ng, Yiu-Kai Dennis

362

Introduction Inverted index Processing Boolean queries Query optimization Course overview Introduction to Information Retrieval  

E-Print Network [OSTI]

Introduction Inverted index Processing Boolean queries Query optimization Course overview Retrieval 1 / 60 #12;Introduction Inverted index Processing Boolean queries Query optimization Course overview Take-away Sch¨utze: Boolean Retrieval 2 / 60 #12;Introduction Inverted index Processing Boolean

Nejdl, Wolfgang

363

Exploiting External Collections for Query Expansion  

Science Journals Connector (OSTI)

A persisting challenge in the field of information retrieval is the vocabulary mismatch between a users information need and the relevant documents. One way of addressing this issue is to apply query modeling: to add terms to the original query ... Keywords: Query modeling, blog post retrieval, external expansion

Wouter Weerkamp; Krisztian Balog; Maarten de Rijke

2012-11-01T23:59:59.000Z

364

Design of FastQuery: How to Generalize Indexing and Querying System for Scientific Data  

SciTech Connect (OSTI)

Modern scientific datasets present numerous data management and analysis challenges. State-of-the-art index and query technologies such as FastBit are critical for facilitating interactive exploration of large datasets. These technologies rely on adding auxiliary information to existing datasets to accelerate query processing. To use these indices, we need to match the relational data model used by the indexing systems with the array data model used by most scientific data, and to provide an efficient input and output layer for reading and writing the indices. In this work, we present a flexible design that can be easily applied to most scientific data formats. We demonstrate this flexibility by applying it to two of the most commonly used scientific data formats, HDF5 and NetCDF. We present two case studies using simulation data from the particle accelerator and climate simulation communities. To demonstrate the effectiveness of the new design, we also present a detailed performance study using both synthetic and real scientific workloads.

Wu, Jerry; Wu, Kesheng

2011-04-18T23:59:59.000Z

365

Example Queries | Open Energy Information  

Open Energy Info (EERE)

Example Queries Example Queries Jump to: navigation, search Example Queries SEP Funding SEP Funding Alabama 55,570,000 Alaska 28,232,000 Arizona 55,447,000 Arkansas 39,416,000 California 226,093,000 Colorado 49,222,000 Connecticut 38,542,000 Delaware 24,231,000 Florida 126,089,000 Georgia 82,495,000 Hawaii 25,930,000 Idaho 28,572,000 Illinois 101,321,000 Indiana 68,621,000 Iowa 40,546,000 Kansas 38,284,000 Kentucky 52,533,000 Louisiana 71,694,000 Maine 27,305,000 Maryland 51,772,000 Massachusetts 54,911,000 Michigan 82,035,000 Minnesota 54,172,000 Mississippi 40,418,000 Missouri 57,393,000 Montana 25,855,000 Nebraska 30,910,000 Nevada 34,714,000 New Hampshire 25,827,000 New Jersey 73,643,000 New Mexico 31,821,000 New York 123,110,000 North Carolina 75,989,000 North Dakota 24,585,000

366

Restricting query relaxation through user constraints  

SciTech Connect (OSTI)

This paper describes techniques to restrict and to heuristically control relaxation of deductive database queries. The process of query relaxation provides a user with a means to automatically identify new queries that are related to the user`s original query. However, for large databases, many relaxations may be possible. The methods to control and restrict the relaxation process introduced in this paper focus the relaxation process and make it more efficient. User restrictions over the data base domain may be expressed as user constraints. This paper describes how user constraints can restrict relaxed queries. Also, a set of heuristics based on cooperative answering techniques are presented for controlling the relaxation process. Finally, the interaction of the methods for relaxing queries, processing user constraints, and applying the heuristic rules is described.

Gaasterland, T.

1993-07-01T23:59:59.000Z

367

Query  

Broader source: Energy.gov (indexed) [DOE]

Queryl Queryl Detailees Name From To Proposed Start Date Proposed End Date Office of the Director of Alex, Aileen DOE/CFO National Intelligence 5/27/2007 5/27/2009 Federal Railroad Alexander, Alice Administration DOE/CFO 7/1/2007 1/1/2008 Arnaudo, Raymond Dept of State DOE/NNSA Moscow Office 3/5/2006 3/3/2008 Cambridge Energy Research Ashley, Peter DOE/PI Associates (CERA) 1/4/2009 3/27/2009 Executive Office of the Barringer, Jody DOE/EE President/OMB 11/16/2008 3/14/2009 Benigni, Deborah Dept of State DOE/IN 4/30/2007 4/30/2009 Federal Bureau of Borgia, Stanley Investigation DOE/IN 6/12/2006 6/12/2008 Federal Bureau of Borgia, Stanley Investigation DOE/IN 6/12/2008 6/12/2009 Department of State/US Brosnahan, Kevin DOE/EE Embassy of Paris 12/1/2007 5/1/2008 Office of the Director of

368

Discovering and Loading Data with Power Query  

Science Journals Connector (OSTI)

Discovering, loading, cleaning, and modifying source data is where Power Query comes in. Using this, the... Data DiscoveryFind and connect to a myriad of data sources ...

Adam Aspin

2014-01-01T23:59:59.000Z

369

V-139: Cisco Network Admission Control Input Validation Flaw...  

Broader source: Energy.gov (indexed) [DOE]

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common...

370

SLQ: a user-friendly graph querying system  

Science Journals Connector (OSTI)

Querying complex graph databases such as knowledge graphs is a challenging task for non-professional users. In this demo, we present SLQ, a user-friendly graph querying system enabling schemales and structures graph querying, where a user need not describe ... Keywords: graph databases, keyword query, schemaless graph querying

Shengqi Yang; Yanan Xie; Yinghui Wu; Tianyu Wu; Huan Sun; Jian Wu; Xifeng Yan

2014-06-01T23:59:59.000Z

371

HDF5-FastQuery: An API for Simplifying Access to Data Storage, Retrieval, Indexing and Querying  

E-Print Network [OSTI]

Accomplishment HDF5-FastQuery: An API for Simplifying Accessprogramming interface (API) that simplifies data storage andindexing/querying. The API, which we call HDF5-FastQuery,

Bethel, E. Wes; Gosink, Luke; Shalf, John; Stockinger, Kurt; Wu, Kesheng

2006-01-01T23:59:59.000Z

372

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain...

373

Introduction: Administration  

E-Print Network [OSTI]

. In a heavily loaded system, the DBA will forbid that ad­hoc queries are entered during standard working hours per min). ``Load profile'': List of DB commands with frequencies. Of course, the queries

Brass, Stefan

374

Relational Database SQL: Querying the Relational DB  

E-Print Network [OSTI]

: auto-completion and command history Weigang Qiu Relational Database & SQL #12;Relational Database SQLRelational Database SQL: Querying the Relational DB Workshop: the "genome" Database Relational Database & SQL Weigang Qiu Department of Biological Sciences Hunter College BIOL 425 Computational

Qiu, Weigang

375

Table Name query? | OpenEI Community  

Open Energy Info (EERE)

Table Name query? Home > Groups > Databus Is there an API feature which returns the names of tables? Submitted by Hopcroft on 28 October, 2013 - 15:37 1 answer Points: 0 if you are...

376

XClean: Providing Valid Spelling Suggestions for XML Keyword Queries  

E-Print Network [OSTI]

{yifeil, weiw}@cse.unsw.edu.au Swinburne University of Technology {jianxinli, cliu}@swin.edu.au Abstract with low quality. Query cleaning has been proposed to alleviate this problem by suggesting several that the query result will be empty. An intelligent query cleaning system will suggest the clean query hinrich

Liu, Chengfei

377

Classifying Web Search Queries to Identify High Revenue Generating Customers  

E-Print Network [OSTI]

searching, the set of terms for which a user searches is called the query. If a user enters a query and then clicks on a result, these query terms are embedded within the URL that is passed from the search engineClassifying Web Search Queries to Identify High Revenue Generating Customers Adan Ortiz-Cordova 329

Jansen, James

378

Minimum-Hot-Spot Query Trees for Wireless Sensor Networks  

E-Print Network [OSTI]

an energy- efficient query routing tree. (a) Energy harvesting for battery- less nodes for the (b) Voltree to the querying node. Energy-efficient query routing trees are needed in a plethora of systems such as PeopleMinimum-Hot-Spot Query Trees for Wireless Sensor Networks Georgios Chatzimilioudis Dept

Zeinalipour, Demetris

379

Spatial Data Models and Query Processing Hanan Samet  

E-Print Network [OSTI]

Spatial Data Models and Query Processing Hanan Samet Walid G. Aref Computer Science Department databases. The focus is on data models and query processing. Query optimization in a spatial environment is also brie y discussed. Keywords and phrases: spatial databases, data models, spatial query processing

Samet, Hanan

380

Failure Analysis in Query Construction: Data and Analysis from A Large Sample of Web Queries  

E-Print Network [OSTI]

­ more details are on its Web site. Excite searches are based on the exact terms that a user enters in the query, however, capitalization is disregarded. Stemming is not available. Multiple term searches return,473 queries from 18,113 users of Excite, a major Web search engine. Given that many digital libraries

Jansen, James

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

E-Print Network 3.0 - assisted query reformulation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

query reformulation Page: << < 1 2 3 4 5 > >> 1 Predicting Query Reformulation During Web Searching Summary: and Assistance account for approximately 45 percent of all query...

382

On the Cost and Quality Tradeoff in Constructing Minimum-Energy Broadcast Trees in Wireless Ad  

E-Print Network [OSTI]

On the Cost and Quality Tradeoff in Constructing Minimum-Energy Broadcast Trees in Wireless Ad Hoc], each having a different complexity and produc- ing a broadcast tree with a different energy cost. Thus to the quality of the trees constructed. II. BUILDING BLOCKS The three ingredients that constitute any minimum-energy

Hu, Y. Charlie

383

Query-based database policy assurance using semantic web technologies  

E-Print Network [OSTI]

In this thesis, we present a novel approach to database security which looks at queries instead of the database tables themselves. In doing so, we use a number of Semantic Web technologies to define rules, translate queries, ...

Soltren, Jos Hiram

2009-01-01T23:59:59.000Z

384

On the Query Complexity of Perfect Gate Discrimination  

E-Print Network [OSTI]

On the Query Complexity of Perfect Gate Discrimination Giulio Chiribella1 , Giacomo Mauro D'Ariano2 queries are called at different time steps [5]. T Q C © Giulio Chiribella, Giacomo Mauro D

D'Ariano, Giacomo Mauro

385

Using a Medical Thesaurus to Predict Query Difficulty  

Science Journals Connector (OSTI)

Estimating query performance is the task of predicting the quality of results returned by a search engine in response to a query. In this paper, we focus on pre-retrieval prediction methods for the medical domain...

Florian Boudin; Jian-Yun Nie; Martin Dawes

2012-01-01T23:59:59.000Z

386

CSP Techniques for Solving Combinatorial Queries within Relational Databases  

Science Journals Connector (OSTI)

A combinatorial query is a request for tuples from multiple relations that satisfy a conjunction of constraints on tuple attribute values. Managing combinatorial queries using the traditional database systems is ...

Malek Mouhoub; Chang Feng

2009-01-01T23:59:59.000Z

387

Zeus: a distributed triple store for proactive SPARQL queries  

Science Journals Connector (OSTI)

The RDF framework is the underpinning element of semantic web stack; its widespread adoption requires efficient tools to store and query RDF data. A number of efficient local RDF stores already exist, while distributed indexing and distributed query processing are only starting to appear; furthermore dynamically growing and fail-safe solutions are not yet available. To remedy this situation, in this paper we present Zeus: an approach for efficient and scalable query processing over RDF graphs based on grid computing. Zeus is based on a distributed architecture, where neither single point of failure nor specialised nodes exist. The query processing framework, presented in the paper, includes a sophisticated query planning and query execution algorithm, which is designed expressively for storage and query of a stream of RDF triples. This mechanism allows Zeus users to register queries that will be notified in real time of new relevant results.

Marcello Leida; Andrej Chu

2014-01-01T23:59:59.000Z

388

The Spatial Skyline Queries Mehdi Sharifzadeh  

E-Print Network [OSTI]

- tively. We propose two algorithms, B2 S2 and VS2 , for static query points and one algorithm, VCS2 outperform the best competitor approach in terms of processing time by a wide margin (4-6 times better-15, 2006, Seoul, Korea. Copyright 2006 VLDB Endowment, ACM 1-59593-385-9/06/09. team located at different

Shahabi, Cyrus

389

Controller's Office Departmental Queries Revised January 2014  

E-Print Network [OSTI]

need. (Query Viewer Job Aid) NOTE: Please remember that it is necessary to enter the wildcard account use descriptions Account # % FSU_DPT_CODES_CATEGORY_BY_ACCT Purchasing Categories and G/L Accounts % Chartfield 2 % Chartfield 3 % FSU_DPT_LEDGER_SUM_W_CF Net ledger activity for a range of accounting periods

Sura, Philip

390

A Simple Model for Classifying Web Queries by User Intent  

E-Print Network [OSTI]

València, Spain 3 NLE Lab.- ELiRF, Universitat Politècnica de València, Spain 4 PRHLT, Universitat query classification, User intent, Query analysis 1 Introduction Web Search Engines (WSEs) are the most in an interaction with a Web Search Engine. Query Classification based on user intent is different from traditional

Rosso, Paolo

391

Query Suggestions for Mobile Search: Understanding Usage Patterns  

E-Print Network [OSTI]

Inc 1600 Amphitheatre Parkway, Mountain View, CA shumeet@google.com ABSTRACT Entering search terms that users who were asked to enter queries on a search interface with query suggestions rated their workload heavily on suggestions if they are provided. Users who were asked to enter queries on a search interface

Tomkins, Andrew

392

Generalized Labeled LCA Queries Jrmy Barbay, Ehsan Chiniforooshan, Alexander Golynski,  

E-Print Network [OSTI]

Generalized Labeled LCA Queries Jérémy Barbay, Ehsan Chiniforooshan, Alexander Golynski, Jui-Yi Kao without knowing their schema. Among them, lowest common ancestor (LCA) queries were introduced in several variants on labeled trees. We de#28;ne threshold LCA queries to generalize all those variants

Waterloo, University of

393

Natural Gas Annual Respondent Query System  

Gasoline and Diesel Fuel Update (EIA)

loading new table loading new table Home > Natural Gas > Natural Gas Annual Respondent Query System Natural Gas Annual Respondent Query System (EIA-176 Data through 2012) Report: 176 Natural Gas Deliveries 176 Natural Gas Supply Items 176 Natural Gas Other Disposition Items 176 Type of Operations and Sector Items 176 Continuation Text Lines 176 Company List 191 Field Level Storage Data 757 Processing Capacity 176 Custom Report (User-defined) Years: 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 to 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 Sort by: Area, Company, Item Company, Area, Item Item, Area, Company Company: Show only Company ID Show only Company Name Show both Company ID, Name 2012 Total

394

Supersymmetric holography on AdS3  

E-Print Network [OSTI]

The proposed duality between Vasiliev's supersymmetric higher spin theory on AdS3 and the 't Hooft limit of the 2d superconformal Kazama-Suzuki models is analysed in detail. In particular, we show that the partition functions of the two theories agree in the large N limit.

Candu, Constantin

2012-01-01T23:59:59.000Z

395

Supersymmetric holography on AdS3  

E-Print Network [OSTI]

The proposed duality between Vasiliev's supersymmetric higher spin theory on AdS3 and the 't Hooft limit of the 2d superconformal Kazama-Suzuki models is analysed in detail. In particular, we show that the partition functions of the two theories agree in the large N limit.

Constantin Candu; Matthias R. Gaberdiel

2012-03-08T23:59:59.000Z

396

Query optimization in nested relational databases  

E-Print Network [OSTI]

optimization in nested relational systems and does not make any assumptions on the physical implementation of the system. C. Contributions of this research This research could be divided into three phases: 1. Study of query languages and algebras... does so by treating both relation-valued attributes and relations uniformly. Let name be the set of valid names to be used for naming relations and their attributes. 1. Descriptions: A description 6 is an ordered pair (n, s), where n C name...

Rathakrishnan, Balaji

2012-06-07T23:59:59.000Z

397

AdWords and Generalized On-line Matching Aranyak Mehta Amin Saberi Umesh Vazirani Vijay Vazirani  

E-Print Network [OSTI]

Abstract How does a search engine company decide what ads to display with each query so as to maximize its - 1/e for this problem. 1 Introduction Internet search engine companies, such as Google, Yahoo and MSN engine company earns revenue from businesses when it displays their ads in response to a relevant search

Mihail, Milena

398

AdWords and Generalized On-line Matching Aranyak Mehta Amin Saberi Umesh Vazirani Vijay Vazirani  

E-Print Network [OSTI]

Abstract How does a search engine company decide what ads to display with each query so as to maximize its of 1 - 1/e for this problem. 1 Introduction Internet search engine companies, such as Google, Yahoo engine company earns revenue from businesses when it displays their ads in response to a relevant search

Saberi, Amin

399

E-Print Network 3.0 - ad-hoc wireless sensor Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in wireless sensor networks The rapid progress of wireless communication and embedded micro-sensing MEMS... technologies has made wireless sensor networks possible. A wireless...

400

E-Print Network 3.0 - ad hoc sensor Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering ; Computer Technologies and Information Sciences 60 A Taxonomy of Wireless Micro-Sensor Network Models Sameer Tilak Summary: to configure, maintain and optimize...

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Design and analysis of distributed primitives for mobile ad hoc networks  

E-Print Network [OSTI]

by the network, which poses a serious challenge for the design and analysis of reliable protocols. In this work, three different approaches are used to handle mobility. The first part of the dissertation employs the simple technique of ignoring the mobility...

Chen, Yu

2006-10-30T23:59:59.000Z

402

Localization in Ad Hoc and Sensor Wireless Networks with Bounded Errors  

E-Print Network [OSTI]

region can be found with a mean error of one foot and a two-foot error bound. Keywords: Localization, error bound, sensor network, position, distance estimates 1 Introduction Advancements in low-power of a networked sensor include: (1) small physical size, (2) low power consumption, (3) limited processing power

Terwilliger, Mark

403

Social Welfare Based Routing in Ad hoc Networks Mingming Lu and Jie Wu  

E-Print Network [OSTI]

is to save energy. Existing energy-efficient routing protocols save energy by selecting the lowest energy cost route. However, energy saving is not equal to energy efficiency. Consider a large number, and hence most packets transmitted through this path are lost, it is energy waste rather than energy saving

Wu, Jie

404

An analytical and simulation study of wireless ad hoc networks with and without cooperation  

E-Print Network [OSTI]

terrain, replacing the batteries for nodes might not bepower, and replacing the batteries of the nodes may not beare usually operated by batteries and have limited power

Ip, Louisa Pui Sum

2010-01-01T23:59:59.000Z

405

Analysis of an Ad Hoc Network with Autonomously Moving Nodes Department of Informatics  

E-Print Network [OSTI]

of Stellenbosch 7600 Stellenbosch, South Africa M. Mandjes Korteweg-de Vries Institute for Mathematics Plantage or throughput. Here radio interference plays a pivotal role, as it defines an interesting trade-off: nodes may prefer to be close together in order to reduce the energy needed to transmit data, but on the other hand

Krzesinski, Tony

406

Auction-based Agent Negotiation in Cognitive Radio Ad Hoc Networks  

E-Print Network [OSTI]

of spectrum. To solve the problem of congestion, cognitive radio networks use dynamic spectrum access spectrum access. 1 Introduction The Cognitive Radio (CR) is a form of wireless communication in which are not and can move to unused channels. This optimizes the use of available radio frequency spectrum while

407

Throughput and Delay Analysis for Real-Time Applications in Ad-Hoc Cognitive Networks  

E-Print Network [OSTI]

to the primary users, so as not to interfere with the licensed use of the spectrum. Cognitive radio, a term first of cognitive radios and primary spectrum licensing seem intuitive, the fundamental theoretical limits. INTRODUCTION Based on evidence that a fixed (licensed) spectrum allo- cation can result in a highly inefficient

Cosman, Pamela C.

408

Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios  

E-Print Network [OSTI]

being unused especially when it comes to licensed spectrum of legacy technologies. One example is the TV spectrum. However, for a radio to use the spectrum opportunistically it should be aware and intelligent) opportunistically cash in on the licensed spectrum allocated to rightful owners that is not being used in time

Namboodiri, Vinod

409

Vehicle interconnection metric and clustering protocol for improved connectivity in vehicular ad hoc networks  

Science Journals Connector (OSTI)

The SUMO [25...] simulator was used for vehicle movement data generation. It is a microtraffic simulator and provides information about the movement and position of every vehicle individually, which is a key fact...

Samo Vodopivec; Melita Hajdinjak

2014-10-01T23:59:59.000Z

410

Connectivity of vehicular ad hoc networks with continuous node distribution patterns  

E-Print Network [OSTI]

nodes, given market penetration rates. Traffic signal Policec density and market penetration rate along the path. Forc density by ?(x), market penetration rate by (x), and node

Jin, W L; Wang, Bruce

2010-01-01T23:59:59.000Z

411

An Adjusted Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Aminu,M. Ould-Khaoua,M. Mackenzie,L.M. Abdulai,J. Proceedings of the Tenth International Conference on Computer Modeling and Simulation(EUROSIM/UKSIM 2008), 1-3 April 2008, University of Cambridge, UK. pp 441 - 446 IEEE Computer Society Press

Aminu, M.

412

Probabilistic Counter-Based Route Discovery for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Mohammed,A. Ould-Khaoua,M. Mackenzie,L.M. Perkins,C. Abdulai,J. Proceedings of the 5th International Wireless Communication and Mobile Computing Conference (IWCMC 2009) pp 1335 - 1339 ACM

Mohammed, A.; Ould-Khaoua, M.

413

Performance Study of Traffic-Aware Routing in Mobile Ad hoc Networks  

E-Print Network [OSTI]

Al-Qassas,R. Ould-Khaoua,M. Mackenzie,L.M. Proceedings of the 6th Annual Network Symposium (PGNET'05), Liverpool John Moores University pp 279-284

Al-Qassas, R.

414

Traffic Locality Oriented Route Discovery Algorithm with Chase Packets for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

AL-Rodhaan,M. Mackenzie,L.M. Ould-Khaoua,M. The 2009 International Conference on Wireless Networks (ICWN'09), USA, July 13-16, 2009.

AL-Rodhaan, M.

415

Performance Analysis of an Adaptive Probabilistic Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Mohammed,A. Ould-Khaoua,M. Mackenzie,L.M. Abdulai,J. International Journal of Simulation Systems Science and Technology, Volume 10 (1) pp xx

Mohammed, A.; Ould-Khaoua, M.

416

Integrating Service-Oriented Mobile Units to Support Collaboration in Ad-hoc Scenarios .  

E-Print Network [OSTI]

??Advances in wireless communication and mobile computing extend collaboration scenarios. Mobile workers using computing devices are currently able to collaborate in order to carry out (more)

Neyem, Andrs

2008-01-01T23:59:59.000Z

417

Analytical Study of Backoff Algorithms for MAC Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Manaseer,S. Ould-Khaoua,M. Mackenzie,L. 22nd Uk Performance Engineering Workshop, Bournemouth University pp 89-94

Manaseer, S.

418

An Efficient Counter-Based Broadcast Scheme for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Aminu,M. Ould-Khaoua,M. Mackenzie,L.M. Proceeding of the 4th European Performance Engineering Workshop, EPEW 2007 Berlin, Germany, LNCS 4748, 27 - 28 September 2007 pp 275 - 283 Springer Verlag

Aminu, M.

419

Ad-hoc wireless network coverage with networked robots that cannot localize  

E-Print Network [OSTI]

We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...

Correll, Nikolaus

420

Exploring the performance of TCP Vegas in mobile ad hoc networks  

E-Print Network [OSTI]

Papanastasiou,S. Ould-Khaoua,M. International Journal of Communication, vol. 17, no. 2, March 2004 pp 163-177 Wiley

Papanastasiou, S.

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Fibonacci Increment Backoff Algorithm for MAC Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Manaseer,S. Ould-Khaoua,M. Mackenzie,L. Seventh Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, PGNET, Liverpool, UK pp 103-109

Manaseer, S.

422

On the performance of TCP Vegas in mobile ad hoc networks  

E-Print Network [OSTI]

Papanastasiou,S. Ould-Khaoua,M. Proc. International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2003), Montreal, Canada, July 20 - 24, 2003 pp 417-422 Society for Computer Simulation

Papanastasiou, S.

423

Simulation study of traffic-aware routing in mobile ad hoc networks  

E-Print Network [OSTI]

Al-Qassas,R. Ould-Khaoua,M. Mackenzie,L.M. DCS Tech Report Dept of Computing Science, University of Glasgow

Al-Qassas, R.

424

Improving the Performance of Counter-Based Broadcast Scheme for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Aminu,M. Ould-Khaoua,M. Mackenzie,L.M. Abdulai,J. Proceedings of the 2007 IEEE International Conference on Signal Processing and Communication (ICSPC 2007), 24-27 November 2007, Dubai, United Arab Emirates pp 1403 - 1406 IEEE Computer Society Press

Aminu, M.

425

On the performance of probabilistic flooding in mobile ad hoc networks  

E-Print Network [OSTI]

Bani Yassein,M. Ould-Khaoua,M. Papanastasiou,S. Proc. 1st Int. Workshop on Performance Modelling in Wired, Wireless, Mobile Networking and Computing (PMW2MNC' 05), held in conjunction with ICPADS'2005, Fukuoka, Japan, 20 - 22 July 2005, IEEE Computer Society Press

Bani Yassein, M.

426

Performance Analysis of Adjusted Probabilistic Broadcasting in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Bani-Yassein,M. Ould-Khaoua,M. Mackenzie,L.M. Papanastasiou,S. International Journal of Wireless Information Networks, vol. 13, no. 2, April 2006 pp 127 - 140 Springer

Bani-Yassein, M.; Ould-Khaoua, M.

427

Neighbour Coverage: A Dynamic Probabilistic Route Discovery for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L.M. Aminu,M. International Symposium on Performance Evaluation of Computer and Telecommunication Systems, (SPECTS' 2008) pp 165 - 172 IEEE

Abdulai, J.

428

Design and Evaluation of a Distributed Clustering Algorithm for Mobile ad hoc Networks  

Science Journals Connector (OSTI)

......motivated by the GPS quorum hybrid routing algorithm, where...a conceptual cellular grid. The proposed distributed...motivated by the GPS quorum hybrid routing algorithm, where...a conceptual cellular grid. The proposed distributed...is no pre-existing infrastructure or in which it is not......

Daniel Lacks; Mainak Chatterjee; Taskin Kocak

2009-08-01T23:59:59.000Z

429

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks1  

E-Print Network [OSTI]

, University of Waterloo, Canada Email: hai.jiang@ece.ualberta.ca, wangping@ntu.edu.sg, poor results demonstrate the effectiveness of the proposed scheme. Index Terms ­ medium access control, code-time nature of voice traffic); and 4) adaptive to user mobility. In this paper, we propose an effective MAC

Zhuang, Weihua

430

Dissemination in Opportunistic Mobile Ad-hoc Networks: the Power of the Crowd  

E-Print Network [OSTI]

Street Palo Alto, CA 94301, USA Email: {stratis.ioannidis, christophe.diot}@technicolor.com Abstract or periodically, while Vagabonds represent the rest of the population. We find that in most cases the majority of the population consists of Vagabonds. We evaluate the relative role of these two groups of users in data

Wang, Deli

431

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks CHIN-YANG HENRY TSENG  

E-Print Network [OSTI]

feel really lucky to be his student at UC Davis. I sincerely thank to Professor Matt Bishop in the OFFICE OF GRADUATE STUDIES of the UNIVERSITY OF CALIFORNIA DAVIS Approved By: Karl N. Levitt, Chair. I am very grateful that he spent his precious time and energy for advising my works

California at Davis, University of

432

An Architecture for Power-Saving Communications in a Wireless Mobile Ad Hoc Network  

E-Print Network [OSTI]

of energy-conserving communications. In comparison, existing protocols only exploit location information of mobile hosts to achieve the goal of energy conservation. The architecture addresses the power- saving. In comparison, existing protocols only exploit location information in limited layers. Similar to cellular

Tseng, Yu-Chee

433

Designing delay constrained hybrid ad hoc network infrastructure for post-disaster communication  

Science Journals Connector (OSTI)

Abstract Following a disaster-strike, rapid and reliable communication between relief/rescue workers in the affected regions, and the control stations located at a distance, is essential. This is to facilitate seamless information exchange about the status of victims, requirement of relief personnel/commodities, supply chain of goods and services, and so on, thus rendering relief operations more timely and effective. However, the availability of Internet in a post-disaster scenario is ruled out more often than not; wireless communication and mobile phones may not be usable either except in only selected areas. Besides, geographical obstructions such as broken bridges or closed roads add to the worries of personnel trying to develop a temporary network infrastructure for effective communication. Furthermore, availability of resources both technological and financial may prove to be a bottleneck in case of disasters in under-developed regions. Under such circumstances, a post-disaster communication network need to be developed to meet the following: (i) close to 100% information packet delivery, (ii) minimum latency for information exchange, and (iii) compliance to the resource constraints. In this paper, we propose a latency-aware four-tier planned hybrid architecture to tackle the aforementioned challenges and focus on extensive modeling and analysis of the planned network architecture. For detailed evaluation with the help of case study scenarios, we make use of the ONE Simulator, customized to suit our requirements. Additionally, we measure the improvement in network resources utilization and performance achieved with modeling of the architecture over that without modeling.

Sujoy Saha; Subrata Nandi; Partha Sarathi Paul; Vijay K. Shah; Akash Roy; Sajal K. Das

2014-01-01T23:59:59.000Z

434

Broadcasting and topology control in wireless ad hoc networks Xiang-Yang Li  

E-Print Network [OSTI]

that can approximate the minimum energy broadcast tree for non-adjustable power case. For adjustable power case, no localized methods can approximate the minimum energy broadcast tree within a constant factor networks. We discuss two energy models that could be used for broadcast: one is non-adjustable power

Stojmenovic, Ivan

435

Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits  

E-Print Network [OSTI]

in order to conserve energy [1]­[4]. Such a node appears to collaborate in packet forwarding, but only audits. Our approach provides significant energy savings compared to previously pro- posed methods, acknowledgment-based systems require a large amount of ACK messages to be transmitted, thus incurring a high

Lazos, Loukas

436

Multi-path Admission Control for Mobile Ad hoc Networks Anders Lindgren  

E-Print Network [OSTI]

Science and Electrical Engineering Lule°a University of Technology Elizabeth M. Belding-Royer Department

Belding-Royer, Elizabeth M.

437

10th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks  

E-Print Network [OSTI]

Karl TPC chairs Afef Feki John S. Baras Jianwei Huang Publication chair Hannes Frey Publicity chairs

Huang, Jianwei

438

Online Lifetime-Centric Multicast Routing: for AdU Hoc Networks with Directional Antennas  

E-Print Network [OSTI]

energy required to maintain a tree (broadcastlmulticast) [Z], [4], [5],[6], 1141, [24], E251.Thomas: Hou*. Yi Shi*, Hanif U. Sheralit, Jeffrey E. Wieselthied *The Bradley Department of Electrical-beam directional antenna and k provisioned with limited energy. We are interested in an online muIticast routing

Hou, Y. Thomas

439

Feasibility of an Aeronautical Mobile Ad Hoc Network Over the North Atlantic Corridor  

E-Print Network [OSTI]

Aerospace Center (DLR), Munich, Germany Email: {Daniel attractive scenario, the North Atlantic Corridor, and use realistic flight data to extract statistics about. INTRODUCTION Today's civil aviation airliners are typically equipped with a set of data communications

Schindelhauer, Christian

440

On Performance Optimization for Multi-Carrier MIMO Ad Hoc Networks  

E-Print Network [OSTI]

and algorithms for power control/allocation become key problems to harness their potential. However, due to non Hanif D. Sherali Department of Electrical and Computer Engineering Department of Industrial the capacity is affected by potential mutual interference on subcarriers, scheduling for subcarriers

Hou, Y. Thomas

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

IEEE Communications Magazine January 2001118 Toward Self-Organized Mobile Ad Hoc  

E-Print Network [OSTI]

be a replacement nor an alternative to current and future infrastructure-based networks. Instead application fields have been identified, such as relief operations in natural or manmade disas- ters, car of them. In addition, the nodes rely on batteries for their energy; therefore, energy savings are an impor

Vetterli, Martin

442

Does Cognition Come at a Net Energy Cost in Ad Hoc Wireless LANs?  

E-Print Network [OSTI]

the presence of primary users. The benefits in terms of reduced energy consumption in secondary users, however on energy consumption is particularly important when considering portable communication devices is analyzed and their impact on energy consumption is studied. Index Terms Cognitive Radios, Energy

Namboodiri, Vinod

443

An Energy Efficient Select Optimal Neighbor Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

. This is especially important in wireless sensor networks where energy consumption is the primary concern. A number node compared to CSMA/CA based MAC protocols such as IEEE 802.11. When electronic energy consumption is a considerable part of energy consumption, SON has a better energy performance than traditional optimal pruning

New South Wales, University of

444

E-Print Network 3.0 - ad hoc cognitive Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Sciences 85 Marian, 1 of 22 CURRICULUM VITAE Summary: multilingualism. Broad: Psycholinguistics (spoken and written language, language and cognition), on-line...

445

Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network  

E-Print Network [OSTI]

in a single­hop fashion. Otherwise, a route con­ sisting of several relaying hosts is needed to forward in a MANET, a mobile host has to work as a router and cooperate with other hosts to find routes and relay­H­FA07­1­4 (Learning Technology) and the National Science Coun­ cil, ROC, under grants NSC89­2218­E

Tseng, Yu-Chee

446

A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

presents and uses a realistic reception model by taking bit error rate (BER), derived from Intersil HFA3861 [2] and MAC-layer packet relaying [3], [40], [41]. For example, in Coop- MAC [40] and rDCF [41], cooperating relay nodes are determined in a proactive manner and are used to forward frames at higher bit

Yu, Chansu

447

The Power of Location Awareness in Wireless Mobile Ad Hoc Networks  

E-Print Network [OSTI]

of attention #3; This research is supported in part by the Ministry of Education, ROC, under grant 89-H-FA07 occurs, where a packet may need to be relayed by several hosts before reaching its #12;nal destination

Tseng, Yu-Chee

448

Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network Yu-Chee Tseng  

E-Print Network [OSTI]

for Promoting Aca- demic Excellence of Universities under grant numbers A-91-H-FA07-1-4 and 89-E-FA04-1-4. 1 of relaying packets for other nodes. A MANET has the merit that it is quickly deployable. Applications

Jiang, Jehn-Ruey

449

GeoGRID: A Geocasting Protocol for Mobile Ad Hoc Networks Based on GRID  

E-Print Network [OSTI]

, under grant 89-H-FA07-1-4 (Learning Technology), and the National Science Council, ROC, under grant NSC are relayed by several intermediate hosts before reaching the destination host. Applications of MANETs occur

Tseng, Yu-Chee

450

A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

presents and uses a realistic reception model by taking bit error rate (BER), derived from Intersil HFA3861 algorithms such as path-centric medium access [2] and MAC-layer packet relaying [3], [40], [41]. For example, in Coop- MAC [40] and rDCF [41], cooperating relay nodes are determined in a proactive manner and are used

Yu, Chansu

451

Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network  

E-Print Network [OSTI]

of Education, Taiwan (contract numbers 89-E- FA04-4, 89-E-FA04-1-4, and 89-H-FA07-1-4). Part of this work communicate directly in a single-hop fashion. Otherwise, a route consisting of several relaying hosts and relay messages. Routing has been studied inten- sively under a MANET environment (e.g., unicast [2, 3, 6

Tseng, Yu-Chee

452

Energy-Efficient Geographic Routing in Ad-hoc Wireless Networks  

E-Print Network [OSTI]

derive the optimal node transmission range, and then we propose the Optimal Range Forward (ORF) algorithm based on the optimal transmission range, which minimizes the total energy consumption of the transmission (summation of energy consumption of all hops). Furthermore, based on ORF, we propose the Optimal

Haddadi, Hamed

453

The slow start power controlled MAC protocol for mobile ad hoc networks and its performance analysis  

E-Print Network [OSTI]

is achieved by allowing more transmissions to take place simultaneously. The slow start principle used energy consumption and increase network throughput and lifetime. In our scheme the transmission power used for the RTS frames is not constant, but follows a slow start principle. The CTS frames, which

Varvarigo, Emmanouel "Manos"

454

A Framework for Throughput and Energy Efficiency in Mobile ad Hoc Networks  

E-Print Network [OSTI]

throughput and energy consumption - while maintaining connectivity. As an application, we evaluate two well on exhaustible power sources, such as batteries, and hence have strict requirements on the energy consumption networks which allows us to compare the average energy and time cost of different networks but exhibiting

Paris-Sud XI, Université de

455

A Transparent Collaborative Integration Approach for Ad Hoc Product Data Jingzhi Guo  

E-Print Network [OSTI]

> energyConsumption>228 kw/h/yearenergyConsumption> and SME2 (seller) encodes-commerce interoperable business systems. Core to this issue is how to maintain semantic consistency between heterogeneous. Introduction Product data integration [3] is an essential issue for many e-commerce interoperable systems. Core

Guo, Jingzhi

456

Cross-Layer Designs Architecture for LEO Satellite Ad Hoc Network  

E-Print Network [OSTI]

, the Netherlands Telephone:. +31 15 278 6177 {zhijiangchang,georgi}@ce.et.tudelft.nl Abstract. Future Low Earth

Kuzmanov, Georgi

457

Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks the Static Case  

E-Print Network [OSTI]

.8 - Mobile and Wireless Communications, Venice, Italy, Sep 23-25, 2003. c Lecture Notes of Computer Science based on different energy classes. In this paper, we study the problem of cooperation for the most basic

Bencsáth, Boldizsár

458

On the Optimal Number of Hops in Linear Wireless Ad Hoc Networks with Hybrid ARQ  

E-Print Network [OSTI]

Processing New Jersey Institute of Technology, Newark, New Jersey 07102-1982, USA e-mail: {iss2, osvaldo.simeone, yeheskel.barness}@njit.edu 2Next Generation System Research Team, Telecommunication R&D Center Samsung) protocols in a quasi-static fading envi- ronment. Data transmission is assumed to be delay-tolerant up

Yener, Aylin

459

Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th  

E-Print Network [OSTI]

is now fully decentralized and relies on text communication to achieve energy efficiency. Keywords FOSS, an issue for discussion, a case study, best practice or other matters of interest and has been reviewed

460

Performance Comparison of Two Location Based Routing Protocols for Ad Hoc Networks  

E-Print Network [OSTI]

Boleng, Brad Williams, Lucas Wilcox, William Navidi Department of Math. and Computer Sciences Colorado that floods all data packets). We used NS-2 to simulate 50 nodes moving according to the random waypoint model a flooding protocol. Second, promis- cuous mode operation improves the performance of DSR significantly

Wilcox, Lucas C.

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property  

E-Print Network [OSTI]

be tested in polynomial time and is monotone [1], to minimize the maximum assigned power. We also give, they communicate through multi-hop wireless links by using intermediate nodes to relay the message. Larger distance uv . In other words, wuv > wxy if uv > xy and wuv = wxy if uv = xy . For example

Li, Xiang-Yang

462

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property  

E-Print Network [OSTI]

be tested in polynomial time, to minimize the maximum assigned power. We also give polynomial time through multi-hop wireless links by using intermediate nodes to relay the message. Generally, nodes nodes u and v is a monotone increasing function of the Euclidean #12;distance uv . In other words, wuv

Li, Xiang-Yang

463

Efficient Broadcasting using Packet History in Mobile Ad-Hoc Spiros Agathos1  

E-Print Network [OSTI]

this problem. Among them, the class of algorithms that construct on-demand a connected dominating set, known, protocols used in wired networks cannot be ported in wireless networks due to mobility and the nature [3] and made clear that the limited bandwidth and energy resources necessitate the design

Papapetrou, Evaggelos

464

A novel architecture for multihops routing ad hoc underwater acoustic sensor networking  

Science Journals Connector (OSTI)

Underwater acoustic communication networks are an innovative issue which faces difficult medium problems such as long propagation time and dynamic network topology. In addition due to high error probabilities typical for this channel it is preferred to use anti collision network mechanism. Because of the long propagation time methods such as CTS/RTS requiring transmissions of pre?messages achieve relatively low network efficiency. Moreover TDMA methods do not utilize the network resources allowing reuse in the code domain (using CDMA) and in the spatial domain in case of nonhomogenic network topology which includes obstructions in the acoustic line of sight. In this paper we introduce a network concept based on the CDMA method confronting the acoustic underwater network challenges such as the near?far problem fast time varying topology multihops routing and message distribution protection. Using this concept a sea trial including broadcast multicast and unicast transmissions of SMS and navigation control messages was carried out in various scenarios including multihops near the shores of Israel. We present results from this sea trial demonstrating the efficacy of the proposed networking scheme.

Roee Diamant; Azriel Sinai

2008-01-01T23:59:59.000Z

465

Proceedings of the AD HOC Workshop on Ceramics for Li/FeS{sub 2} batteries  

SciTech Connect (OSTI)

Representatives from industry, the U.S. Advanced Battery Consortium (USABC), DOE, national laboratories, and other govt agencies met to develop recommendations and actions for accelerating the development of ceramic components critical to the successful introduction of the Li/FeS{sub 2} bipolar battery for electric vehicles. Most of the workshop is devoted to electrode materials, bipolar designs, separators, and bipolar plates. The bulk of this document is viewographs and is divided into: ceramics, USABC overview, SAFT`s Li/FeS{sub 2} USABC program, bipolar Li/FeS{sub 2} component development, design requirements for bipolar plates, separator design requirements, compatibility of ceramic insulators with lithium, characterization of MgO for use in separators, resistivity measurements of separators, sintered AlN separators for LiMS batteries, etc.

Not Available

1993-12-31T23:59:59.000Z

466

Protocols for multi-antenna ad-hoc wireless networking in interference environments  

E-Print Network [OSTI]

A fundamental question for the design of future wireless networks concerns the nature of spectrum management and the protocols that govern use of the spectrum. In the oligopoly model, spectrum is owned and centrally managed, ...

Hinton, Danielle A. (Danielle Ayodele), 1978-

2010-01-01T23:59:59.000Z

467

Ad Lucem Workshop Welcome  

Broader source: Energy.gov [DOE]

This presentation summarizes the information given by DOE during the DOE Ad Lucem workshop, Feb. 17, 2012.

468

Multicolor Maps from Compound Queries | OpenEI Community  

Open Energy Info (EERE)

Multicolor Maps from Compound Queries Multicolor Maps from Compound Queries Home > Groups > OpenEI Community Central Jweers's picture Submitted by Jweers(83) Contributor 16 May, 2013 - 14:22 ask queries compound queries developer Google maps maps multicolor result formats results Semantic Mediawiki Hi all, Recently, a couple of people on OpenEI have asked me how to do compound (or multicolor) maps like this one: Thanks to the new Google Maps v3 API, this is really easy. I put together a quick sample of how this is done, complete with code snippits, here: http://en.openei.org/wiki/User:Jweers/Test5. First, create a compound query, then atttribute a custom marker icon to each query using the ;param=value syntax. The new OpenEI maps extension will take care of the rest. Here is an example of it in use on OpenEI by NREL's Geothermal team:

469

www.cnrs.fr Hello jQuery !  

E-Print Network [OSTI]

www.cnrs.fr Hello jQuery ! par Daric Vladimir @IGM #12;JavaScript ?JavaScript ? · Mauvais choix apparaître ...Firefox 1.0.x, quelques problèmes peuvent apparaître ... #12;Hello jQyeryHello jQyery Demo Demo. #12;« Hello jQuery » décortiqué« Hello jQuery » décortiqué · Step 1 : télécharger jQueryStep 1

van Tiggelen, Bart

470

AdWords and Generalized On-line Matching Aranyak Mehta  

E-Print Network [OSTI]

§ Abstract How does a search engine company decide what ads to display with each query so as to maximize its of 1 - 1/e for this problem. 1 Introduction Internet search engine companies, such as Google, Yahoo user preferences. This gives search engine companies a unique opportunity to display highly targeted

Vazirani, Umesh

471

How big must complete XML query languages be?  

Science Journals Connector (OSTI)

Marx and de Rijke have shown that the navigational core of the w3c XML query language XPath is not first-order complete -- that is it cannot express every query definable in firstorder logic over the navigational predicates. How can one extend XPath ...

Clemens Ley; Michael Benedikt

2009-03-01T23:59:59.000Z

472

Mercury: Supporting Scalable Multi-Attribute Range Queries  

E-Print Network [OSTI]

Mercury: Supporting Scalable Multi-Attribute Range Queries Ashwin R. Bharambe Mukesh Agrawal 15213 Abstract This paper presents the design of Mercury, a scalable protocol for supporting multi-attribute range- based searches. Mercury differs from previous range-based query systems in that it supports mul

Keinan, Alon

473

Chaining, Referral, Subscription, Leasing: New Mechanisms in Distributed Query Optimization  

E-Print Network [OSTI]

Chaining, Referral, Subscription, Leasing: New Mechanisms in Distributed Query Optimization Arnaud, exploit!) a rich variety of information ow mechanisms like chaining, referral, proxying, brokering referral (following [33]), is when a site A ships a query to a site B and may get back, instead

Pennsylvania, University of

474

Encoding range minima and range top-2 queries  

Science Journals Connector (OSTI)

...problem of supporting lowest common ancestor (LCA) queries on a binary tree, the Cartesian...answer to RMQ(i,j) is the label of the LCA of the nodes labelled by-i and-j. Thus...in 2n+o(n) bits, while supporting LCA queries in O(1) time. 1 Unfortunately...

2014-01-01T23:59:59.000Z

475

Top-Down XML Keyword Query Processing Junfeng Zhou1  

E-Print Network [OSTI]

keyword query w.r.t. LCA/SLCA/ELCA semantics. By "top-down", we mean that we visit all common ancestor (CA to define meaningful results, for which the basic semantics is Lowest Common Ancestor (LCA). Based on LCA, the most widely adopted query semantics are Exclusive LCA (ELCA) [3,7,10,23,27] and Smallest LCA (SLCA) [3

New South Wales, University of

476

Overhead Analysis of Query Localization Optimization and Wenzheng Xu  

E-Print Network [OSTI]

to localize the query flooding to a limited region of the networks. The simulation results in [3] demonstrated of global flooding and provide an optimization solution to it. We finally perform experimental simulations routing histories to localize the query flood to a limited region of a network. However, the lifetime

Liang, Weifa

477

Preserving and Querying Histories of XML-Published Relational Databases  

E-Print Network [OSTI]

Preserving and Querying Histories of XML-Published Relational Databases Fusheng Wang and Carlo the evolution history of such a view as yet another XML document, whereby the complete history of the database, and identify and select those which are best for representing and querying database histories. We show

Zaniolo, Carlo

478

Efficient Complex Query Support for Multiversion XML Documents  

E-Print Network [OSTI]

Efficient Complex Query Support for Multiversion XML Documents Shu-Yao Chien1 , Vassilis J. Tsotras documents represents a critical requirement for many applications. Also, there has been much recent interest). In this paper, we examine the problem of supporting efficiently complex queries on multiversioned XML documents

Zhang, Donghui

479

Query Processing over Incomplete Autonomous Databases Garrett Wolf Hemal Khatri  

E-Print Network [OSTI]

Query Processing over Incomplete Autonomous Databases Garrett Wolf Hemal Khatri Bhaumik Chokshi}@asu.edu ABSTRACT Incompleteness due to missing attribute values (aka "null values") is very common in autonomous missing attributes, even if they wind up being relevant to a user query. Ideally we would like

Kambhampati, Subbarao

480

Optimizing Nested Queries with Parameter Sort Orders Ravindra Guravannavar  

E-Print Network [OSTI]

Optimizing Nested Queries with Parameter Sort Orders Ravindra Guravannavar Ramanujam H.s@sybase.com Indian Institute of Technology Bombay sudarsha@cse.iitb.ac.in Abstract Nested iteration is an important technique for query evaluation. It is the default way of execut- ing nested subqueries in SQL. Although

Sudarshan, S.

Note: This page contains sample records for the topic "ad hoc query" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Nested Queries in Object Bases Sophie Cluet Guido Moerkotte  

E-Print Network [OSTI]

Nested Queries in Object Bases Sophie Cluet Guido Moerkotte INRIA Lehrstuhl f¨ur Informatik III BP for object­oriented (oo) databases allow nested subqueries. This paper contains (1) the first algebra which is capable of handling arbitrary nested queries and (2) the first complete classification of oo nested

Mannheim, Universität

482

A typed higher-order calculus for querying XML databases  

Science Journals Connector (OSTI)

As the eXtensible Markup Language (XML) is about to emerge as a new standard for databases, the problem of providing solid logical grounds for XML query languages arises. For the relational data model first-order logic, i.e. the Relational Calculus turned ... Keywords: eXten-sible markup language, higher-order logic, object model, query language, type system

Qing Wang; Klaus-Dieter Schewe

2008-01-01T23:59:59.000Z

483

Article ID: Query Translation on the Fly in Deep Web  

E-Print Network [OSTI]

Article ID: Query Translation on the Fly in Deep Web Integration Jiang Fangjiao, Jia Linlin, Meng users to access the desired information, many researches have dedicated to the Deep Web (i.e. Web databases) integration. We focus on query translation which is an important part of the Deep Web integration

484

Combining query translation techniques to improve cross-language information retrieval  

Science Journals Connector (OSTI)

In this paper we address the combination of query translation approaches for cross-language information retrieval (CLIR). We translate queries with Google Translate and extend them with new translations obtained by mapping noun phrases in the query to ...

Benjamin Herbert; Gyrgy Szarvas; Iryna Gurevych

2011-04-01T23:59:59.000Z

485

Natural Gas EIA-176 Query System Readme(1999)  

Gasoline and Diesel Fuel Update (EIA)

176 Query System Readme 176 Query System Readme 1.0 INTRODUCTION TO THE EIA-176 FRONT END QUERY FACILITY This system provides a method of extracting and using the EIA-176 data, and saving the query results in various mediums and formats. There are pre-set data extractions available, which allow the user to select and run the most often-used queries. 1.1 Hardware Requirements The minimum hardware requirements are: - An IBM-compatible personal computer (PC) 386SX 16 MHZ with 2 megabytes RAM. (A 486DX 33MHZ with 4 megabytes RAM is recommended). - MS-DOS operating system (version 3.x or greater), or compatible, or Network operating system capable of emulating MS-DOS. - MS-DOS file handles should be set to at least 50 in the CONFIG.SYS. In Windows NT, this file is called CONFIG.NT.

486

Increasing ask query limit | OpenEI Community  

Open Energy Info (EERE)

Increasing ask query limit Increasing ask query limit Home > Groups > Utility Rate Rmckeel's picture Submitted by Rmckeel(297) Contributor 22 June, 2012 - 09:30 developer utility rate An NREL user who is trying to use the utility rate service was having an issue. He writes "I noticed that any rates past 10,000 are not accessible via json. For example, this query only returns two entries: http://en.openei.org/services/rest/utility_rates?version=latest&format=json_plain&offset=9998&limit=30&detail=basic". Twong mentioned "It looks like there's a default total max limit of 10000 results retrieved, even for special query pages in SemanticMediawiki. $smwgQMaxLimit Maximal number of results ever retrieved, even when using special query pages. Default: 10000"

487

Flowing from $AdS_5$ to $AdS_3$ with $T^{1,1}$  

E-Print Network [OSTI]

We construct supersymmetric domain wall solutions of type IIB supergravity that interpolate between $AdS_5\\times T^{1,1}$ in the UV and $AdS_3\\times\\mathbb{R}^2\\times S^2\\times S^3$ solutions in the IR. The $\\mathbb{R}^2$ factor can be replaced with a two-torus and then the solution describes a supersymmetric flow across dimensions, similar to wrapped brane solutions. While the domain wall solutions preserve $(0,2)$ supersymmetry, the $AdS_3$ solutions in the IR have an enhanced $(4,2)$ superconformal supersymmetry and are related by two T-dualities to the $AdS_3\\times S^3\\times S^3\\times S^1$ type IIB solutions which preserve a large $(4,4)$ superconformal supersymmetry. The domain wall solutions exist within the $N=4$ $D=5$ gauged supergravity theory that is obtained from a consistent Kaluza-Klein truncation of type IIB supergravity on $T^{1,1}$; a feature driving the flows is that two $D=5$ axion like fields, residing in the $N=4$ Betti multiplet, depend linearly on the two legs of the $\\mathbb{R}^2$ factor.

Aristomenis Donos; Jerome P. Gauntlett

2014-04-28T23:59:59.000Z

488

HDF5-FastQuery: An API for Simplifying Access to Data Storage,Retrieval, Indexing and Querying  

SciTech Connect (OSTI)

This work focuses on research and development activities that bridge a gap between fundamental data management technology index, query, storage and retrieval and use of such technology in computational and computer science algorithms and applications. The work has resulted in a streamlined applications programming interface (API) that simplifies data storage and retrieval using the HDF5 data I/O library, and eases use of the FastBit compressed bitmap indexing software for data indexing/querying. The API, which we call HDF5-FastQuery, will have broad applications in domain sciences as well as associated data analysis and visualization applications.

Bethel, E. Wes; Gosink, Luke; Shalf, John; Stockinger, Kurt; Wu,Kesheng

2006-06-15T23:59:59.000Z

489

Effect of pronunciations on OOV queries in spoken term detection  

E-Print Network [OSTI]

The spoken term detection (STD) task aims to return relevant segments from a spoken archive that contain the query terms whether or not they are in the system vocabulary. This paper focuses on pronunciation modeling for ...

Can, Dogan

490

Semantic Load Shedding for Prioritized Continuous Queries over Data Streams  

Science Journals Connector (OSTI)

A data stream management system (DSMS) has to handle high-volume and bursty data streams with large number of continuous queries. When an input rate of any data stream exceeds the system capacity, the DSMS has to...

Jaeseok Park; Haengrae Cho

2005-01-01T23:59:59.000Z

491

Towards a Query-by-Example System for Knowledge Graphs  

Science Journals Connector (OSTI)

We witness an unprecedented proliferation of knowledge graphs that record millions of heterogeneous entities and their diverse relationships. While knowledge graphs are structure-flexible and content-rich, it is difficult to query them. The challenge ...

Nandish Jayaram; Arijit Khan; Chengkai Li; Xifeng Yan; Ramez Elmasri

2014-06-01T23:59:59.000Z

492

Updating and Querying Databases that Track Mobile Units  

Science Journals Connector (OSTI)

In this paper, we consider databases representing information about moving objects (e.g., vehicles), particularly their location. We address the problems of updating and querying such databases. Specifically, the update problem is to determine when the ...

Ouri Wolfson; A. Prasad Sistla; Sam Chamberlain; Yelena Yesha

1999-07-01T23:59:59.000Z

493

Say What? Why users choose to speak their web queries Maryam Kamvar, Doug Beeferman  

E-Print Network [OSTI]

a higher probability of being typed than shorter queries. Index Terms: speech, voice, search, Google, query of voice web search (where the query is entered by speaking rather than by keyboard) is sparse, most likely on an aggregate level factors that are correlated with a decision to speak a web search query rather than type it

Tomkins, Andrew

494

An Efficient Query Tree Protocol for RFID Tag Anti-Collision  

E-Print Network [OSTI]

An Efficient Query Tree Protocol for RFID Tag Anti-Collision Ming-Kuei Yeh National Taipei Query Tree (EQT) protocol to improve both the Query Tree (QT) protocol and the Collision Tree (CT and the energy consumption is lessened. In the EQT protocol, the timeslots structure, the query and responses

Jiang, Jehn-Ruey

495

Adaptation of the Concept Hierarchy Model with Search Logs for Query Recommendation on Intranets  

E-Print Network [OSTI]

Adaptation of the Concept Hierarchy Model with Search Logs for Query Recommendation on Intranets for query recommendation on Intranets by ranking terms according to the strength of their links to the query for identical queries and rebuilding it from scratch periodically can be extremely inefficient due to the high

Kruschwitz, Udo

496

Condensative Stream Query Language for Data Streams Lisha Ma1 Werner Nutt2 Hamish Taylor1  

E-Print Network [OSTI]

Condensative Stream Query Language for Data Streams Lisha Ma1 Werner Nutt2 Hamish Taylor1 1 School the answer to a similar non-aggregate query making query processing condensative. Cur- rent proposals for declarative query languages over data streams do not support such condensative pro- cessing. Nor is it yet

Taylor, Hamish

497

Hadronization at the AdS wall  

E-Print Network [OSTI]

We describe hadronization events, using the AdS/CFT Correspondence, which display many of the qualitative features expected in QCD. In particular we study the motion of strings with separating end points in a back-reacted hard wall geometry. The solutions show the development of a linear QCD-like string. The end points oscillate in the absence of string breaking. We introduce string breaking by hand and evolve the new state forward in time to observe the separation of two string segments. A kink associated with this breaking evolves to the end points of the string inducing rho meson production. We explicitly compute the rho meson production at the end point.

Nick Evans; James French; Kristan Jensen; Ed Threlfall

2009-08-04T23:59:59.000Z

498

Parallel Index and Query for Large Scale Data Analysis  

SciTech Connect (OSTI)

Modern scientific datasets present numerous data management and analysis challenges. State-of-the-art index and query technologies are critical for facilitating interactive exploration of large datasets, but numerous challenges remain in terms of designing a system for process- ing general scientific datasets. The system needs to be able to run on distributed multi-core platforms, efficiently utilize underlying I/O infrastructure, and scale to massive datasets. We present FastQuery, a novel software framework that address these challenges. FastQuery utilizes a state-of-the-art index and query technology (FastBit) and is designed to process mas- sive datasets on modern supercomputing platforms. We apply FastQuery to processing of a massive 50TB dataset generated by a large scale accelerator modeling code. We demonstrate the scalability of the tool to 11,520 cores. Motivated by the scientific need to search for inter- esting particles in this dataset, we use our framework to reduce search time from hours to tens of seconds.

Chou, Jerry; Wu, Kesheng; Ruebel, Oliver; Howison, Mark; Qiang, Ji; Prabhat,; Austin, Brian; Bethel, E. Wes; Ryne, Rob D.; Shoshani, Arie

2011-07-18T23:59:59.000Z

499

CRAWLING DEEP WEB CONTENT THROUGH QUERY FORMS Jun Liu, Zhaohui Wu, Lu Jiang, Qinghua Zheng, Xiao Liu  

E-Print Network [OSTI]

CRAWLING DEEP WEB CONTENT THROUGH QUERY FORMS Jun Liu, Zhaohui Wu, Lu Jiang, Qinghua Zheng, Xiao: Deep Web, Deep Web Surfacing, Minimum Executable Pattern, Adaptive Query Abstract: This paper proposes-based Deep Web adaptive query method. The query method extends query interface from single textbox to MEP set

Shamos, Michael I.

500

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open