Powered by Deep Web Technologies
Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

How to Make Ad Hoc Proof Automation Less Ad Hoc  

E-Print Network [OSTI]

How to Make Ad Hoc Proof Automation Less Ad Hoc Georges Gonthier1 Beta Ziliani2 Aleks Nanevski3 Software Institute, Madrid ICFP 2011, Tokyo #12;Why proof automation at ICFP? Ad hoc polymorphism Overloading terms Ad hoc proof automation Overloading lemmas "How to make ad hoc polymorphism less ad hoc

Dreyer, Derek

2

Seminar: Ad Hoc Networks Konrad Meier Seminar Ad Hoc Networks  

E-Print Network [OSTI]

1 Seminar: Ad Hoc Networks Konrad Meier Seminar Ad Hoc Networks Feasibility of an Aeronautical Mobile Ad Hoc Network Over the North Atlantic Corridor Daniel Medina, Felix Hoffmann, Serkan Ayaz;2 What is the idea? Ad Hoc Network in the North Atlantic Corridor ­ multihop air to air communication

Schindelhauer, Christian

3

Ad Hoc Meetings | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Ad Hoc Meetings Ad Hoc Meetings Ad Hoc Meetings 43.pdf More Documents & Publications Radio and Spectrum Management ICAM Workshop PKI Workshop...

4

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes January 17, 2008 Present: Diane Armpriest bag session (thresholds for data). The agenda item for the next ad hoc assessment committee

O'Laughlin, Jay

5

Transportation Plan Ad Hoc Working Group | Department of Energy  

Office of Environmental Management (EM)

Transportation Plan Ad Hoc Working Group Transportation Plan Ad Hoc Working Group Transportation Plan Ad Hoc Working Group More Documents & Publications Nuclear Fuel Storage and...

6

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes March 6, 2008 Present: Diane Armpriest, Jane to the ad hoc assessment committee list, the associate dean list, and the department chair list

O'Laughlin, Jay

7

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes September 26, 2008 Present: Diane Armpriest, Alton why we assess ­ develop meaning for work Share success stories #12;The future of the Ad Hoc

O'Laughlin, Jay

8

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes November 8, 2007 Present: Rula Awwad Rafferty timeline had been modified after input from the ad hoc assessment committee at its previous meeting

O'Laughlin, Jay

9

Ad Hoc Assessment Committee Meeting Notes  

E-Print Network [OSTI]

Ad Hoc Assessment Committee Meeting Notes April 17, 2008 Present: Diane Armpriest, Rula. The consensus of the group was that the list should include ad hoc committee members, associate deans and on request. The ad hoc committee will not meet again this semester. Jeanne will call a meeting

O'Laughlin, Jay

10

Securing Ad Hoc Networks Lidong Zhou  

E-Print Network [OSTI]

Securing Ad Hoc Networks Lidong Zhou Department of Computer Science Zygmunt J. Haas School of Electrical Engineering Cornell University Ithaca, NY 14853 Abstract Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do

Schneider, Fred B.

11

Mobile Ad Hoc Networks Asis Nasipuri  

E-Print Network [OSTI]

1 Mobile Ad Hoc Networks Asis Nasipuri Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte, NC 28223-0001 I. INTRODUCTION A mobile ad hoc network of base stations, make ad hoc networks radically different from other wireless LANs. Whereas communication

Nasipuri, Asis

12

Ad-Hoc Personenlokalisierung in Drahtlosen Sensornetzwerken.  

E-Print Network [OSTI]

??In der Arbeit wird ein neues Konzept zur ad-hoc Personenlokalisierung entwickelt und untersucht. Anstze aus dem Bereich der Lokalisierung in selbstkonfigurierenden, drahtlosen Sensornetzwerken sowie aus (more)

Schmid, Johannes

2012-01-01T23:59:59.000Z

13

AdHoc Probe: End-to-end Capacity Probing in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

AdHoc Probe: End-to-end Capacity Probing in Wireless Ad Hoc Networks Ling-Jyh Chen1 , Tony Sun2 and systematic study in ad hoc, multihop wireless networks is still lacking. Yet the rate of a wireless link can deployment. In this paper, we present AdHoc Probe, a packet-pair based technique, to estimate end-to-end path

Chen, Ling-Jyh

14

AD HOC SEMINAR PROPOSAL FORM Updated July 2009  

E-Print Network [OSTI]

AD HOC SEMINAR PROPOSAL FORM Updated July 2009 Law School Rule 312(2): Ad Hoc Seminars. A group their own ad hoc research and seminar program. A student may enroll in an ad hoc seminar in the summer session are eligible to enroll in an ad hoc seminar starting in the spring of their first year

Reif, John H.

15

Routing protocols in ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc networking involves computers, typically wireless mobile nodes (MNs), that cooperatively form a network without specific user administration or configuration. In other words, ad hoc networking allows an arbitrary collection of MNs to create a ... Keywords: associativity-based routing (ABR), distributed bellman-ford (DBF), dynamic source routing (DSR), on-demand routing protocols

Dan Galatchi; Roxana Zoican

2005-03-01T23:59:59.000Z

16

Assign Ad Hoc Reviewer Step-By-Step Procedure  

E-Print Network [OSTI]

Proposal Management Reviewer Assign Ad Hoc Reviewer Step-By-Step Procedure Last updated: 12/19/2013 1 of 2 http://eresearch.umich.edu Assign an Ad Hoc Reviewer Based on the information provided as a Reviewer. Anyone who has an account in the system can be added as an Ad Hoc Reviewer. Who Can Assign Ad Hoc

Shyy, Wei

17

CAD-HOC: A CAD Like Tool For Generating Mobility Benchmarks In Ad-Hoc Networks  

E-Print Network [OSTI]

CAD-HOC: A CAD Like Tool For Generating Mobility Benchmarks In Ad-Hoc Networks Subodh Shah , Edwin of using unrealistic mobility scenarios for simulation of ad-hoc routing protocols. We present CAD-HOC, a cousin tool to Network Simulator (ns), which allows ad-hoc networking experimentation to be performed

Helal, Abdelsalam

18

Virtual infrastructure for wireless ad hoc networks  

E-Print Network [OSTI]

One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...

Gilbert, Seth, 1976-

2007-01-01T23:59:59.000Z

19

Intrusion detection in mobile ad hoc networks  

E-Print Network [OSTI]

Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line...

Sun, Bo

2005-08-29T23:59:59.000Z

20

2010 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc Networks  

E-Print Network [OSTI]

19-1 ©2010 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc NetworksOverview Characteristics, Applications, Issues Cellular vs. Ad Hoc Routing: Requirements, parameters, classification Dynamic Source Routing (DSR) Ad Hoc On-demand Distance Vector (AODV) Optimized Link State Routing (OLSR

Jain, Raj

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

2006 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc Networks  

E-Print Network [OSTI]

14-1 ©2006 Raj JainCSE574sWashington University in St. Louis Ad Hoc Networks:Ad Hoc Networks, Issues Cellular vs. Ad Hoc Routing: Requirements, parameters, classification Dynamic Source Routing (DSR) Ad Hoc On-demand Distance Vector (AODV) Optimized Link State Routing (OLSR) #12;14-3 ©2006 Raj

Jain, Raj

22

Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks Jon Arnold, Nigel Bean.sorell@adelaide.edu.au Abstract-- Wireless ad hoc networks provide a useful commu- nications infrastructure for the mobile Hoc Protocols, 802.11, Monitoring, Template Fitting, NS-2. I. INTRODUCTION Wireless Ad Hoc Networks

Roughan, Matthew

23

Distributed services for mobile ad hoc networks  

E-Print Network [OSTI]

DISTRIBUTED SERVICES FOR MOBILE AD HOC NETWORKS A Dissertation by GUANGTONG CAO Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2005 Major... Subject: Computer Science DISTRIBUTED SERVICES FOR MOBILE AD HOC NETWORKS A Dissertation by GUANGTONG CAO Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Cao, Guangtong

2005-11-01T23:59:59.000Z

24

Reliable Ad Hoc Group Communication using Local Neighborhoods  

E-Print Network [OSTI]

1 Reliable Ad Hoc Group Communication using Local Neighborhoods Lawrence Klos, Golden G. Richard Abstract - In this paper an enhanced reliability protocol added to the ODMRP multicast ad hoc protocol by operational phase. Index Terms ­ Mobile Networking, Ad Hoc Wireless, Multicast, Reliable, ODMRP. I

Richard III, Golden G.

25

Maintaining connectivity in a mobile ad hoc network  

E-Print Network [OSTI]

This thesis focuses on the problem of maintaining graphics. connectivity in a mobile ad hoc network. Mobile ad hoc networks are without a fixed topology and are dynamically changing. This makes the problem of maintaining connectivity among all nodes...

Reuben, Ron S.

2012-06-07T23:59:59.000Z

26

Dynamic address allocation protocols for Mobile ad hoc networks  

E-Print Network [OSTI]

Address allocation is an important issue in Mobile ad hoc networks. This thesis proposes solutions to assign unique IP addresses to nodes participating in Mobile ad hoc networks and evaluates the proposed solutions. Address allocation protocols...

Patchipulusu, Praveena

2001-01-01T23:59:59.000Z

27

Node Connectivity in Vehicular Ad Hoc Networks with Structured Mobility  

E-Print Network [OSTI]

in vehicular networks; 2) we demonstrate, through simulation, the impacts of marco- and micro-mobility modelsNode Connectivity in Vehicular Ad Hoc Networks with Structured Mobility Ivan W. H. Ho, Kin K. Leung@cmu.edu Abstract1 Vehicular Ad hoc NETworks (VANETs) is a subclass of Mobile Ad hoc NETworks (MANETs). However

Leung, Kin K.

28

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan, Vaidyanathan protocol for ad-hoc net- works called ATP (ad-hoc transport protocol). We show through ns2 based simulations that ATP outperforms both default TCP and TCP-ELFN. Categories and Subject Descriptors C.2

Sivakumar, Raghupathy

29

Ad Hoc Committee on Employment Policies May 4, 2000  

E-Print Network [OSTI]

Ad Hoc Committee on Employment Policies Report May 4, 2000 Respectfully submitted by: D. Quinn School of Government Sally Zeckhauser, Vice President for Administration #12;Ad Hoc Committee Executive Summary The Committee and Its Process President Rudenstine appointed the Ad Hoc Committee in April

Chou, James

30

Ad Hoc and Sensor Networks Santosh Kumar and Lan Wang  

E-Print Network [OSTI]

Ad Hoc and Sensor Networks Santosh Kumar and Lan Wang Dept. of Computer Science The University. Such an infrastructureless network is called an Ad Hoc network; more specifically, "a network that is setup, literally communication, an Ad Hoc network may be used for other purposes such as monitoring the physical environment

Wang, Lan

31

Evaluation des performances des protocoles de routage Ad hoc  

E-Print Network [OSTI]

Evaluation des performances des protocoles de routage Ad hoc Abdelali Boushaba1 , Mohammed Oumsis2 quatre protocoles de routage Ad hoc: DSR, AODV, OLSR et DSDV et d'autre part, d'examiner l'impact de la'activité. Mots-clés--Réseaux mobiles Ad hoc; DSR; AODV; DSDV; OLSR; évaluation des performances; simulation, NS-2

Paris-Sud XI, Université de

32

SBA: A Simple Backoff Algorithm for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

SBA: A Simple Backoff Algorithm for Wireless Ad Hoc Networks Tahiry RAZAFINDRALAMBO1 and Isabelle of ad hoc networks based on IEEE 802.11 DCF degrade when congestion increases. The issues concern SBA with IEEE 802.11 and several alternatives to 802.11 in ad hoc networks. We show that SBA achieves

Paris-Sud XI, Université de

33

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks Xiang-Yang Li Yu Wang Ophir important aspects in ad-hoc wireless networks. To ensure the security, several cryptography protocols must efficient when applied to wireless ad-hoc networks. In this paper, we propose a key agreement protocol

Wang, Yu

34

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks Wei Yu, Yan Sun and K. J disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node AND BACKGROUND A mobile ad hoc network is a group of mobile nodes without requiring centralized administration

Sun, Yan Lindsay

35

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK  

E-Print Network [OSTI]

SETTING INITIAL SECRET KEYS IN A MOBILE AD HOC NETWORK Murat Cihan1 and C¸etin Kaya Ko¸c2,3 1 I@eecs.oregonstate.edu Abstract. Mobile ad hoc networks require specialized authentication protocols due to the mobility of users and lack of always-available trusted servers. There are a variety of mobile ad hoc authentication protocols

36

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Scalable Address Allocation Protocol for Mobile Ad Hoc Networks Yu Chen Google, UK chenyu in ad hoc networks. In our protocol, each node that has been assigned an address manages a disjoint of node's degree, regardless of the network size. I. INTRODUCTION A wireless mobile ad hoc network

Paris-Sud XI, Université de

37

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Enhancing Routing Protocol with Memory in Mobile Ad Hoc Networks Yongjun Dai, Changhee Joo prevalent, TCP performance over mobile ad hoc networks attracts more attention. The earlier studies on TCP in wireless networks have shown that it performs poorly in ad hoc networks. They tackled the problem

Bahk, Saewoong

38

DIFFUSION MECHANISMS FOR MULTIMEDIA BROADCASTING IN MOBILE AD HOC NETWORKS  

E-Print Network [OSTI]

DIFFUSION MECHANISMS FOR MULTIMEDIA BROADCASTING IN MOBILE AD HOC NETWORKS E. Baccelli Hitachi HSAL: Philippe.Jacquet@inria.fr ABSTRACT Scarce bandwidth and interferences in mobile ad-hoc networks yield in view to gain enough performance and allow applications such as multimedia diffusion in an ad hoc

Paris-Sud XI, Université de

39

Asynchronous Document Dissemination in Dynamic Ad Hoc Networks  

E-Print Network [OSTI]

Asynchronous Document Dissemination in Dynamic Ad Hoc Networks Frédéric Guidec, Hervé Roussain.Guidec|Herve.Roussain}@univ-ubs.fr Abstract This paper presents a document-oriented model for information dis- semination in dynamic ad hoc of which are capable of ad hoc communication. Our work aims at fostering the de- sign, the implementation

Paris-Sud XI, Université de

40

Effects of Beamforming on the Connectivity of Ad Hoc Networks  

E-Print Network [OSTI]

Effects of Beamforming on the Connectivity of Ad Hoc Networks Xiangyun Zhou, Haley M. Jones, Salman on the connectivity of wireless ad hoc networks. We study different beamforming techniques using the uniform circular information. Index Terms-- ad hoc networks, antenna arrays, beamforming, connectivity. I. INTRODUCTION Mobile

Zhou, Xiangyun "Sean"

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Ad Hoc Positioning System (APS) Dragos Niculescu and Badri Nath  

E-Print Network [OSTI]

Ad Hoc Positioning System (APS) Dragos Niculescu and Badri Nath Computer Science Department Rutgers University Piscataway, NJ 08855 Abstract--Many ad hoc network protocols and applications assume the knowledge the aid of GPS in each node of an ad hoc network is im- portant in cases where GPS is either

Ha, Dong S.

42

Brief Contributions________________________________________________________________________________ Topology Control of Ad Hoc Wireless  

E-Print Network [OSTI]

________________________________________________________________________________ Topology Control of Ad Hoc Wireless Networks for Energy Efficiency Maggie X. Cheng, Member, IEEE, Mihaela, Yinfeng Xu, and Ding-Zhu Du Abstract--In ad hoc wireless networks, to compute the transmission power-complete problem. In this paper, we consider the approximated solutions for the MENC problem in ad hoc wireless

Wang, Lusheng

43

Group-based Ad-hoc Network for Multimedia Communications  

E-Print Network [OSTI]

Group-based Ad-hoc Network for Multimedia Communications \\ Koichiro Ban and Hamid Gharavi National is concerned with evaluating ad-hoc networks for group-oriented tactical operations. For such operations, a cellular-based ad-hoc network architecture has been constructed for real-time multimedia communications

44

Selective Backbone Construction for Topology Control in Ad Hoc Networks  

E-Print Network [OSTI]

Selective Backbone Construction for Topology Control in Ad Hoc Networks Haitao Liu and Rajiv Gupta,gupta}@cs.arizona.edu Abstract-- A key step in controlling topology in ad hoc networks is the construction of the backbone which. Keywords: Ad hoc networks, topology control, backbone, energy conservation. I. INTRODUCTION Multi

Gupta, Rajiv

45

Virtual Hierarchy Synthesis for Hybrid Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Virtual Hierarchy Synthesis for Hybrid Mobile Ad Hoc Networks Hyemee Park, Tae-Jin Lee ad hoc networks to fixed IP networks is one of the topics receiving more attention within the MANET working group of the IETF. In such integrated scenarios, commonly known as hybrid ad hoc networks, mobile

Lee, Tae-Jin

46

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and  

E-Print Network [OSTI]

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

Sen, Sevil

47

Supporting Dynamic Ad hoc Collaboration Capabilities  

SciTech Connect (OSTI)

Modern HENP experiments such as CMS and Atlas involve as many as 2000 collaborators around the world. Collaborations this large will be unable to meet often enough to support working closely together. Many of the tools currently available for collaboration focus on heavy-weight applications such as videoconferencing tools. While these are important, there is a more basic need for tools that support connecting physicists to work together on an ad hoc or continuous basis. Tools that support the day-to-day connectivity and underlying needs of a group of collaborators are important for providing light-weight, non-intrusive, and flexible ways to work collaboratively. Some example tools include messaging, file-sharing, and shared plot viewers. An important component of the environment is a scalable underlying communication framework. In this paper we will describe our current progress on building a dynamic and ad hoc collaboration environment and our vision for its evolution into a HENP collaboration environment.

Agarwal, Deborah A.; Berket, Karlo

2003-07-14T23:59:59.000Z

48

ICS 351: Today's plan Wireless ad-hoc Networks  

E-Print Network [OSTI]

: ­ agriculture ­ science and ecology Emergency Communications (P2P) Vehicle Ad-hoc Networks (VANETs): ­ Vehicle-to-vehicle-hoc Networks Mobile computers: laptops (and everything else), vehicle-mounted computers, etc. Fields ­ Vehicle-to-infrastructure ­ Infra-Vehicle (within a vehicle) #12;4 Wireless Ad-hoc Networks: More

Biagioni, Edoardo S.

49

Security Communications Protocol Ad Hoc Working Group | Department...  

Office of Environmental Management (EM)

Protocol Ad Hoc Working Group More Documents & Publications Overview for Newcomers Isotope Program Transportation Shipping Radioactive Waste by Rail from Brookhaven National...

50

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance  

E-Print Network [OSTI]

1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming in mobile ad hoc networks. Specifically, we focus on ad hoc networks where the spa- tial diversity technique technique can enhance the performance of mobile ad hoc networks significantly. Key words: ad hoc networks

Reisslein, Martin

51

Adoption of Vehicular Ad Hoc Networking Protocols by Networked Robots  

Science Journals Connector (OSTI)

This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several ... Keywords: Networked robot, Robotic ad hoc network, V2I, V2V, Vehicular ad hoc network, Wireless robot

Wim Vandenberghe; Ingrid Moerman; Piet Demeester

2012-06-01T23:59:59.000Z

52

ATP: A Reliable Transport Protocol for Ad-hoc Networks  

E-Print Network [OSTI]

ATP: A Reliable Transport Protocol for Ad-hoc Networks Karthikeyan Sundaresan Vaidyanathan-point of proposing a new transport protocol called ATP #12;Outline Problems with TCP ATP design elements ATP Protocol to the characteristics of the reverse path in wireline networks #12;ATP: Ad-hoc Transport Protocol TCP's components

Sivakumar, Raghupathy

53

Energy Aware Implementation of an Ad Hoc Routing Protocol  

E-Print Network [OSTI]

estimates of the potential for energy savings. We show potential savings of fifty six percent in energy functions of an energy aware ad hoc routing protocol are · Energy based link cost with transmit powerEnergy Aware Implementation of an Ad Hoc Routing Protocol by Shweta Bhandare Scriptor B

Brown, Timothy X.

54

Approximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

and a set of destination nodes, the problem is to build a minimum-energy multicast tree for the requestApproximate Minimum-Energy Multicasting in Wireless Ad Hoc Networks Weifa Liang, Senior Member, IEEE Abstract--A wireless ad hoc network consists of mobile nodes that are equipped with energy

Liang, Weifa

55

E-Print Network 3.0 - access ad hoc Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ad hoc Search Powered by Explorit Topic List Advanced Search Sample search results for: access ad hoc Page: << < 1 2 3 4 5 > >> 1 Bengali, Hindi and Telugu to English Ad-hoc...

56

E-Print Network 3.0 - acrr ad hoc Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ad hoc Search Powered by Explorit Topic List Advanced Search Sample search results for: acrr ad hoc Page: << < 1 2 3 4 5 > >> 1 ACRR: Ad-hoc On-Demand Distance Vector Routing with...

57

E-Print Network 3.0 - ad hoc code Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

code Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc code Page: << < 1 2 3 4 5 > >> 1 How to Make Ad Hoc Proof Automation Less Ad Hoc...

58

E-Print Network 3.0 - ad hoc group Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences 10 A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi, Carlo Marchetti, Roberto Baldoni Summary: ad- hoc networks...

59

E-Print Network 3.0 - ad hoc process Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Baldoni Summary: A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi... belonging to distinct mobile ad- hoc networks by taking...

60

E-Print Network 3.0 - ad hoc review Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Baldoni Summary: A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi... belonging to distinct mobile ad- hoc networks by taking...

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Ad hoc continuum-atomistic thermostat for modeling heat flow in molecular dynamics simulations  

E-Print Network [OSTI]

Ad hoc continuum-atomistic thermostat for modeling heat flow in molecular dynamics simulations J 2004) An ad hoc thermostating procedure that couples a molecular dynamics (MD) simulation

Brenner, Donald W.

62

Studies in rough set theory based routing protocols for vehicular ad hoc networks on freeways;.  

E-Print Network [OSTI]

??Vehicular Ad hoc NETworks (VANETs) are self-organizing ad hoc networks that are specifically designed for communication among vehicles. VANETs are a special case of Mobile (more)

Shylaja B S

2013-01-01T23:59:59.000Z

63

Energy efficient and fairness improved medium access scheduling algorithms for mobile ad hoc networks;.  

E-Print Network [OSTI]

??In mobile ad hoc networks dynamically changing topologies are newlinethe direct result of the mobility of the nodes which characterize the ad hoc newlinenetworks Each (more)

Priakanth P

2015-01-01T23:59:59.000Z

64

Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks  

E-Print Network [OSTI]

1-1 Introduction to Ad hoc Networks CS-647: Advanced Topics in Wireless Networks Drs. Baruch Awerbuch 2008 #12;1-2 Outline What is an ad hoc network? Challenges facing ad hoc networks History of Ad C. K. Toh, Chapter 3, "Ad Hoc Wireless Networks", Prentice Hall, 2002 D. P. Agrawal and Qing

Amir, Yair

65

Robust message routing for mobile (wireless) ad hoc networks.  

SciTech Connect (OSTI)

This report describes the results of research targeting improvements in the robustness of message transport in wireless ad hoc networks. The first section of the report provides an analysis of throughput and latency in the wireless medium access control (MAC) layer and relates the analysis to the commonly used 802.11 protocol. The second section describes enhancements made to several existing models of wireless MAC and ad hoc routing protocols; the models were used in support of the work described in the following section. The third section of the report presents a lightweight transport layer protocol that is superior to TCP for use in wireless networks. In addition, it introduces techniques that improve the performance of any ad hoc source routing protocol. The fourth section presents a novel, highly scalable ad hoc routing protocol that is based on geographic principles but requires no localization hardware.

Goldsby, Michael E.; Johnson, Michael M.; Kilman, Dominique Marie (Sandia National Laboratories, Albuquerque, NM); Bierbaum, Neal Robert; Chen, Helen Y.; Ammerlahn, Heidi R.; Tsang, Rose P.; Nicol, David M. (University of Illinois, Urbana, IL)

2004-01-01T23:59:59.000Z

66

Throughput Analysis of Wireless Ad-Hoc Cognitive Radio Networks  

E-Print Network [OSTI]

is independent of the primary frequency bandwidths and usage statistics; otherwise, they follow water-filling-like strategies. Next, we study the asymptotic performance of two multi-hop overlaid ad-hoc networks that utilize the same temporal, spectral...

Banaei, Armin

2014-04-25T23:59:59.000Z

67

Verteilte Zugangskontrolle in offenen Ad-hoc-Netzen.  

E-Print Network [OSTI]

??In Ad-hoc-Netzen sind aktive Mitarbeit aller Teilnehmer und Einbringung eigener, knapper Ressourcen zugunsten Anderer unverzichtbar. Das hier vorgestellte verteilte Zugangskontrollsystem schliet dazu unkooperative Nutznieer aus (more)

Kraft, Daniel

2007-01-01T23:59:59.000Z

68

Routing and Traversal via Location Awareness in Ad-Hoc Networks  

E-Print Network [OSTI]

Routing and Traversal via Location Awareness in Ad-Hoc Networks Evangelos Kranakis Ladislav Stacho of an ad-hoc network in order to provide for ef- ficient information dissemination. We explore several new and route discovery in ad-hoc networks. 1 Challenges in Ad-Hoc Networking The current rapid growth

Kranakis, Evangelos

69

E-Print Network 3.0 - ad hoc networking Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

networking Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc networking...

70

An Ad-Hoc Workflow System Architecture Based on Mobile Agents and Rule-Based Processing  

E-Print Network [OSTI]

An Ad-Hoc Workflow System Architecture Based on Mobile Agents and Rule-Based Processing Jie Meng opportunity (an e-business process). In this position paper, we argue that the ad-hoc workflow and mobile the architecture and implementation of a simple mobile-agent-based ad-hoc workflow system. Keywords: Ad-hoc

Helal, Abdelsalam

71

E-Print Network 3.0 - ad hoc query Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

query Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc query...

72

E-Print Network 3.0 - ad hoc networks Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

networks Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc networks...

73

Trust in Ad hoc Networks A Novel Approach based on Clustering  

E-Print Network [OSTI]

Trust in Ad hoc Networks A Novel Approach based on Clustering J. Boodnah and E.M. Scharf Department of Electronic Engineering, Queen Mary, University of London Abstract Ad hoc Networks by virtue of their nature constraints to the network. 1. Introduction: Mobile Ad hoc Networks ­ Uses and Characteristics Mobile ad hoc

Haddadi, Hamed

74

E-Print Network 3.0 - ad hoc queries Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

queries Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc queries...

75

E-Print Network 3.0 - ad hoc network Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

network Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc network...

76

Topology Control for Fault-Tolerant Communication in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Topology Control for Fault-Tolerant Communication in Wireless Ad Hoc Networks Bernd Thallner-generation wireless ad hoc networks, which are increasingly being considered also for critical application domains in a fully distributed ("ad hoc") manner. Increasingly, wireless ad hoc networks are also being considered

77

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks  

E-Print Network [OSTI]

Comparison of two Self-Organization and Hierarchical Routing Protocols for Ad Hoc Networks Bet. In this article, we compare two self-organization and hierarchical rout- ing protocols for ad hoc networks-organization and hierarchical routing in ad hoc networks. keywords: ad hoc networks, hierarchical routing, DHT, comparison

Paris-Sud XI, Université de

78

A Framework for Misuse Detection in Ad Hoc Networks--Part I  

E-Print Network [OSTI]

, resource management, site security monitoring. I. INTRODUCTION Ad hoc networks provide the only means

Sarkar, Saswati

79

TOWARDS A POWER EFFICIENT PROGRAMMING MODEL FOR AD HOC In this paper, we describe the design and implementation of a distributed operating system for ad hoc net-  

E-Print Network [OSTI]

1 TOWARDS A POWER EFFICIENT PROGRAMMING MODEL FOR AD HOC NETWORKS Abstract In this paper, we describe the design and implementation of a distributed operating system for ad hoc net- works. The goal of our system is to extend total system lifetime for ad hoc networking applications through power

Sirer, Emin Gun

80

1st Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS'04), Florence, Italy, Fault Tolerant Communication Topologies for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

1st Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (DIWANS'04), Florence, Italy, June 2004 Fault Tolerant Communication Topologies for Wireless Ad Hoc Networks Bernd, distributed algorithms, failure locality 1 Introduction Wireless sensor networks, mobile ad hoc networks

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Enhanced AOMDV for energy conservation in hybrid ad hoc networks  

Science Journals Connector (OSTI)

Hybrid ad hoc networks are a combination of a fixed network, a base station or free standing mobile ad hoc network (MANET). The energy conservation is a major issue in hybrid ad hoc network with limited battery life of mobile terminals. The lifetime of a network will be improved by suitably reducing the requirement of power for connections. This paper proposed a novel energy efficient ad hoc on-demand multipath distance vector (EEAOMDV) routing protocol that uses ad hoc on demand multipath distance vector (AOMDV) routing protocol as a basic routing strategy. The selected route satisfies quality of service in energy stable and the delay constraint on the application. The operation of EEAOMDV has three phases. In the first route discovery phase, the delay and energy constraints are built into the AOMDV route discovery mechanism. During link failure, the second phase is invoked to search for an energy stable alternate path locally. The third phase chooses the optimal path from available multiple paths from source to destination pair in the hybrid network. Simulation was performed to determine the packet delivery ratio, routing overhead, throughput, end-to-end delay and average energy consumption are experienced by varying nodes and pause time.

S. Santhi; G. Sudha Sadasivam

2014-01-01T23:59:59.000Z

82

DESIGN AND IMPLEMENTATION OF A SINGLE SYSTEM IMAGE OPERATING SYSTEM FOR AD HOC NETWORKS  

E-Print Network [OSTI]

DESIGN AND IMPLEMENTATION OF A SINGLE SYSTEM IMAGE OPERATING SYSTEM FOR AD HOC NETWORKS Hongzhou and implementation of a distributed operating system for ad hoc networks. Our system simplifies the programming of ad longevity by effectively distributing energy consumption and avoiding hotspots. 1 Introduction Ad hoc

Sirer, Emin Gun

83

Ad Hoc Mobile Networking and General Mobility Issues Ramon Lawrence  

E-Print Network [OSTI]

Ad Hoc Mobile Networking and General Mobility Issues Ramon Lawrence Department of Computer Science of networking and mobility come many interesting opportunities and difficult problems. Mobile computing allows around in the environment. Unfortunately, to support this mobility places several restrictive restraints

Lawrence, Ramon

84

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks  

E-Print Network [OSTI]

effectively to reduce redundant transmissions. Simulation results of applying these two algorithms show are discussed and compared through simulation under both the static and dynamic environments. Index Terms--Ad hoc wireless networks, broadcast, dominant pruning, flooding. æ 1 INTRODUCTION IN areas where

Wu, Jie

85

Energy Efficient Broadcast Routing in Static Ad Hoc Wireless Networks  

E-Print Network [OSTI]

such that the energy cost of the broadcast tree is minimized. Each node in the network is assumed to have a fixed level a broadcast tree such that the energy cost of the broadcast tree is minimized. We first prove that the problemEnergy Efficient Broadcast Routing in Static Ad Hoc Wireless Networks Deying Li, Xiaohua Jia

Jia, Xiaohua

86

Optimum Transmission Range for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

to determine the optimal transmission range that gives the maximum efficiency of energy consumption. Different, and security issues, we inves- tigate the efficiency of energy consumption of wireless ad hoc networks there are studies on increasing battery capacity and reducing the energy consumption of system opera- tion and data

Deng, Jing

87

E-Print Network 3.0 - ad hoc connection Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

serve as a topology for ad-hoc... for Ad Hoc Networks with Variable Transmission Range David Peleg (Weizmann) and Liam Roditty 12;... : There is an intrinsic connection between...

88

E-Print Network 3.0 - ad-hoc network based Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ad-hoc network based Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc network based Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel...

89

Utilising behaviour history and fuzzy trust levels to enhance security in ad-hoc networks.  

E-Print Network [OSTI]

??A wireless Ad-hoc network is a group of wireless devices that communicate with each other without utilising any central management infrastructure. The operation of Ad-hoc (more)

Hallani, Houssein

2007-01-01T23:59:59.000Z

90

E-Print Network 3.0 - ad hoc study Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

study Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc study Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for wireless ad-hoc...

91

E-Print Network 3.0 - ad hoc mobile Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mobile Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc mobile Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for wireless ad-hoc...

92

Ad Hoc Advisory Group to the Madrid Conference on Food Security Chaired by Prof. Jeffrey Sachs  

E-Print Network [OSTI]

Ad Hoc Advisory Group to the Madrid Conference on Food Security Chaired by Prof. Jeffrey Sachs Minister Rodriguez Zapatero of Spain, invited Professor Jeffrey Sachs to lead an Ad Hoc Advisory Group

93

E-Print Network 3.0 - ad hoc grids Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

grids Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc grids Page: << < 1 2 3 4 5 > >> 1 Toward an Architecture for Ad Hoc Grids Kaizar Amin...

94

E-Print Network 3.0 - ad hoc para Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

para Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc para Page: << < 1 2 3 4 5 > >> 1 Um Framework para a Simulao de Redes Mveis Ad hoc...

95

AN AD HOC INVESTIGATORY COMMITTEE AT the University of North Carolina at Chapel  

E-Print Network [OSTI]

Retraction AN AD HOC INVESTIGATORY COMMITTEE AT the University of North Carolina at Chapel Hill has implicated. The last author disputes this finding of the ad hoc committee. Although some findings

Palumbi, Stephen

96

Michelle Niemann Ad-hoc Preliminary Examination List: A New Organicism?  

E-Print Network [OSTI]

Michelle Niemann Ad-hoc Preliminary Examination List: A New Organicism? 11/28/08 Sections: I. Theoretical and Critical Approaches Explanation: This ad-hoc prelims list is designed to (1) provide

Wisconsin at Madison, University of

97

Throughput Capacity of UWB Ad-Hoc Networks with Infrastructure Support  

Science Journals Connector (OSTI)

To provide scalable capacity of wireless ad-hoc networks, we employ a joint approach of both Ultra-Wide-Band (UWB) radio and hybrid architecture (ad-hoc network with infrastructure support). By using the AP(acces...

Fan Zhang; Xiaoyun Kang

2006-01-01T23:59:59.000Z

98

An On-Demand Energy-Efficient Routing Algorithm for Wireless Ad Hoc Networks  

Science Journals Connector (OSTI)

Ad hoc networks are non-infrastructure networks which consist of mobile nodes. Since the mobile nodes have limited battery power, it is very important to use energy efficiently in ad hoc networks. In order ... ro...

Hong-Ryeol Gil; Joon Yoo; Jong-Won Lee

2003-01-01T23:59:59.000Z

99

Extending the Coverage of a 4G Telecom Network Using Hybrid AD-HOC Networks: A Case Study  

Science Journals Connector (OSTI)

Ad-hoc networks that are connected with the infrastructure Internet are named hybrid ad-hoc networks. In 4G communications scenarios, hybrid ad-hoc networks seem to be valuable ... network interfaces, may reach t...

Tnia Calada; Manuel Ricardo

2006-01-01T23:59:59.000Z

100

UAV surveillance using multihop ad-hoc wireless networks: a demonstrator  

E-Print Network [OSTI]

UAV surveillance using multihop ad-hoc wireless networks: a demonstrator Daniël Heimans, Maurits de

Boucherie, Richard J.

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc  

E-Print Network [OSTI]

Sequenced Distance Vector Protocol . . . . . . . . . . . . . . . . . . . . 9 2.2.1 Routing Table Management-hoc On Demand Distance Vector Routing Protocol . . . . . . . . . . . . . . . . 10 2.3.1 Route Discovery and Multipoint Relays . . . . . . . . . . . . . . . . . . . 11 2.4.3 Spreading Topology Informations

Braun, Torsten

102

Evaluation of Ad-Hoc and Mobility Architectures using Satellite Communications  

E-Print Network [OSTI]

, terminal, session, network) or its "range" (micro- mobility/macro-mobility). In terrestrial networks be done using ad-hoc networks principle, but the communications from one group to another can be compared to the interconnection of ad- hoc networks. We propose in this paper to interconnect these terrestrial ad-hoc networks

Paris-Sud XI, Université de

103

A Peer-to-Peer Approach to Asynchronous Data Dissemination in Ad Hoc Networks  

E-Print Network [OSTI]

A Peer-to-Peer Approach to Asynchronous Data Dissemination in Ad Hoc Networks Hervé Roussain.Roussain|Frederic.Guidec}@univ-ubs.fr Keywords : ubiquitous computing, peer-to-peer computing, ad hoc networking, data dissemination Abstract--This paper presents a model for the dis- semination of information in highly dynamic ad hoc networks

Paris-Sud XI, Université de

104

A Centralized Ad-Hoc Network Architecture (CANA) Based on Enhanced HiperLAN/2  

E-Print Network [OSTI]

A Centralized Ad-Hoc Network Architecture (CANA) Based on Enhanced HiperLAN/2 Konstantinos-mail: {simoens, pietro.pellati}@motorola.com Abstract-- In ad-hoc networks, where a user can enter, leave or move that require very high bit-rates, is a challenging problem. Here, a Centralized Ad-Hoc Network Architecture

Stavrakakis, Ioannis

105

Ad Hoc Synchronization Considered Harmful Weiwei Xiong+, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou, Zhiqiang Ma*  

E-Print Network [OSTI]

Ad Hoc Synchronization Considered Harmful Weiwei Xiong+, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou Abstract Many synchronizations in existing multi­threaded pro­ grams are implemented in an ad hoc way. The first part of this paper does a comprehensive characteristic study of ad hoc synchronizations

Zhou, Yuanyuan

106

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks Venugopalan Ramasubramanian@ece.cornell.edu, egs@cs.cornell.edu} ABSTRACT A central challenge in ad hoc networks is the design of rout- ing--Routing Protocols General Terms Design, Performance Keywords Hybrid, Adaptive, Ad Hoc Networks This work

Keinan, Alon

107

Ad Hoc BSD Faculty Science Review Committee March 11, 2009 September 24, 2009  

E-Print Network [OSTI]

1 Ad Hoc BSD Faculty Science Review Committee March 11, 2009 ­ September 24, 2009 A Proposal ...................................................... Pages 31-34 Ad Hoc BSD Faculty Science Committee Members ................................ Pages 35 .................................................................................. Pages 37-38 #12;3 I. Executive Summary: The Ad Hoc BSD Faculty Science Review Committee was convened

Sherman, S. Murray

108

Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks  

E-Print Network [OSTI]

Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks M. C. Valenti 1 D. Torrieri 2 S, 2013 Salvatore Talarico (shortinst)Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks June 11, 2013 1 / 23 #12;Outline 1 Frequency-Hopping Ad Hoc Networks 2 Outage Probability with Adjacent

Valenti, Matthew C.

109

APPLICATION FOR AD HOC INTERDISCIPLINARY DOCTORAL PROGRAM (Please type or wordprocess)  

E-Print Network [OSTI]

APPLICATION FOR AD HOC INTERDISCIPLINARY DOCTORAL PROGRAM (Please type or wordprocess) Approval school Current Address Telephone: Home Office Permanent Address Telephone Proposed Ad Hoc Doctoral Committee Ad hoc committee chair Rank UT EID Department GSC member: Yes No Committee member Rank UT EID

Johnston, Daniel

110

Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks  

E-Print Network [OSTI]

1 Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks Seung-Jong Park the issue of transmission power con- trol in wireless ad-hoc networks. In general, it is assumed that minimum transmission power achieves the optimal throughput of an ad-hoc network because it produces

Park, Seung-Jong "Jay"

111

Exploring Multi-path Communication in Hybrid Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Exploring Multi-path Communication in Hybrid Mobile Ad Hoc Networks Roberto Speicys Cardoso the challenges involved in implementing multi- path communication on a middleware for hybrid mobile ad hoc words: Multi-path routing, middleware, ad hoc networks 1 Introduction Ambient computing requires

Paris-Sud XI, Université de

112

The Impacts of Physical Layer Parameters on the Connectivity of Ad-Hoc Networks  

E-Print Network [OSTI]

The Impacts of Physical Layer Parameters on the Connectivity of Ad-Hoc Networks Javad Kazemitabar,hyousefi,hamidj]@uci.edu The Impacts of Physical Layer Parameters on the Connectivity of Ad-Hoc Networks ­ p.1/20 #12;Outline Layer Parameters on the Connectivity of Ad-Hoc Networks ­ p.2/20 #12;Outline · Background Ergodic SER

Yousefi'zadeh, Homayoun

113

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

114

IFI-aktuelt: Gjesteforelesning, C-K. Toh Future Research Challenges in Ad Hoc Networking  

E-Print Network [OSTI]

IFI-aktuelt: Gjesteforelesning, C-K. Toh Future Research Challenges in Ad Hoc Networking Fredag 23.8 kl. 13:15, Lille auditorium Future Research Challenges in Ad Hoc Networking by C-K. Toh, Ph technologies are mature, it is still a form of cellular local data network. Ad hoc mobile networks are entirely

Toh, C-K.

115

A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks  

E-Print Network [OSTI]

A Calculus for Power-Aware Multicast Communications in Ad Hoc Networks Lucia Gallina and Sabina,srossi}@dsi.unive.it Abstract. We present CMN# , a process calculus for formally model- ling and reasoning about Mobile Ad Hoc to reason about cost-effective ad hoc routing protocols, we also allow unicast and multicast communications

Paris-Sud XI, Université de

116

Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks  

E-Print Network [OSTI]

Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks Cheikh Sarr, Claude Chaudet, Guillaume for bandwidth-constrained applications. In multihop ad hoc networks, such evaluation becomes even more difficult mechanism to estimate the available bandwidth in IEEE 802.11-based ad hoc networks. Through simulations, we

Paris-Sud XI, Université de

117

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Clique-Based Randomized Multiple Access for Energy-Efficient Wireless Ad Hoc Networks Paul G protocol design for wireless ad hoc networks is between proactive and reactive coor- dination, where describe Clique-Based Randomized Multiple Access (CRMA), a distributed MAC protocol for wireless ad hoc

118

Ad Hoc Committee to Examine Governance Structure & Organization of UW-Madison's  

E-Print Network [OSTI]

#12;Ad Hoc Committee to Examine Governance Structure & Organization of UW-Madison's Division Sciences) 17 April 2012 #12; 1 FINAL REPORT Ad Hoc Committee to Examine Governance Structure & Organization of UW-Madison's Division of International Studies The Ad Hoc Committee to Examine Governance

Sheridan, Jennifer

119

Towards an Opportunistic and Location-Aware Service Provision in Disconnected Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Towards an Opportunistic and Location-Aware Service Provision in Disconnected Mobile Ad Hoc as a promising method to support communication in disconnected mobile ad hoc networks. This new communication model relies on the "store, carry and forward" principle, and ex- ploits ad hoc communication and device

Paris-Sud XI, Université de

120

Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking  

E-Print Network [OSTI]

1 Safari: A Self-Organizing, Hierarchical Architecture for Scalable Ad Hoc Networking Shu Du Ahamed Rice University Abstract As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper, we

Druschel, Peter

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls  

E-Print Network [OSTI]

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality at strategic locations in the ad hoc network. We first show that, given the locations of attackers and victims

Kasera, Sneha Kumar

122

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks  

E-Print Network [OSTI]

Joint Routing and Server Selection for Multiple Description Video Streaming in Ad Hoc Networks ad hoc networks. In this paper, we study the important problem of joint routing and server selection for MD video in ad hoc networks. We take a cross-layer approach to formulate the task as a combinatorial

Hou, Y. Thomas

123

A bidding algorithm for optimized utility-based resource allocation in ad hoc networks  

E-Print Network [OSTI]

A bidding algorithm for optimized utility-based resource allocation in ad hoc networks Calin for bandwidth allo- cation in wireless ad hoc networks. The quality of service (QoS) levels for each end in hotspot scenarios, and also propose an asynchronous version that is more feasible for ad hoc environments

124

Report on a Working Session on Security in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Report on a Working Session on Security in Wireless Ad Hoc Networks Levente Butty´an Jean organized a working session de- voted to the topic of security in wireless ad hoc networks. This event took setting. Securing wireless ad hoc networks is particularly diffi- cult for many reasons including

Chen, Yuanzhu Peter

125

Seminar Ad Hoc Networks Welcome! -1 -University of Freiburg Alexander Schtzle  

E-Print Network [OSTI]

Seminar Ad Hoc Networks Welcome! - 1 - University of Freiburg Alexander Schätzle A Localized Algorithm for Bi-Connectivity of Connected Mobile Robots Ad Hoc Networks- Seminar, WS 08/09 Computer: Alexander Schätzle Freiburg, 25. November 2008 #12;Seminar Ad Hoc Networks Introduction - 2 - University

Schindelhauer, Christian

126

The Impact of Interference on Optimal Multi-path Routing in Ad Hoc Networks  

E-Print Network [OSTI]

The Impact of Interference on Optimal Multi-path Routing in Ad Hoc Networks Roland de Haan, Richard-to-end performance measures such as through- put in ad hoc networks, emphasizing the performance trade-off between-destination pairs and different radio ranges are analyzed. Keywords: Ad hoc networks, Interference, Capacity, Multi

Boucherie, Richard J.

127

Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform  

E-Print Network [OSTI]

Report of the Ad Hoc Committee on Washington Natural Resource Agency Reform February 16, 2010 recommended formation of an ad hoc committee to evaluate opportunities for SFR and others in College. As a result, the Washington Natural Resource Agency Reform ad hoc Committee was established and given

Borenstein, Elhanan

128

Ad-hoc Technology in Future IP based Mobile Communication Frank Fitzek  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Frank Fitzek acticom Gmb@asu.edu Abstract In this paper we outline our future research activities in the field of ad--hoc communication systems for IP based services. We summarize why omnipresent technologies fail to support ad--hoc

Reisslein, Martin

129

A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks Ping Wang, Member, IEEE, Hai Jiang, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract--In wireless ad hoc networks information exchanges among the nodes. Index Terms--Wireless ad hoc networks, medium access control, fairness

Jiang, Hai

130

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong, Jungsoo Park for IPv6 mobile ad hoc networks. The auto-networking technologies consist of IPv6 unicast address. These technologies are based on IPv6's inherent autoconfiguration facility, which can provide ad hoc users

Jeong, Jaehoon "Paul"

131

A REFERENCE PICTURE SELECTION SCHEME FOR VIDEO TRANSMISSION OVER AD-HOC NETWORKS  

E-Print Network [OSTI]

A REFERENCE PICTURE SELECTION SCHEME FOR VIDEO TRANSMISSION OVER AD-HOC NETWORKS USING MULTIPLE, Polytechnic University 6 Metrotech, Brooklyn, NY, 11201, USA ABSTRACT Enabling video transmission over ad-hoc networks is more challenging than over conventional mobile networks because a connection path in an ad-hoc

Panwar, Shivendra S.

132

Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Using Variable-Range Transmission Power Control in Wireless Ad Hoc Networks Javier Gomez and Andrew networks such as ad hoc and sensor networks. First, using previous work by Steele [18], we show that in this paper highlight the need to design future MAC and routing protocols for wireless ad hoc and sensor

Gomez-Castellanos, Javier

133

Ad-hoc Technology in Future IP based Mobile Communication Systems  

E-Print Network [OSTI]

Ad-hoc Technology in Future IP based Mobile Communication Systems Martin Reisslein Arizona State Heinrich Hertz Institut #12;Content · Required Research · Ad-hoc Testbed · Expected Results and Time Frame-Configuration · Assignment and release of IP addresses ­ omnipresent related protocols can not deployed in ad- hoc networks

Reisslein, Martin

134

Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks  

E-Print Network [OSTI]

1 Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks Yan Lindsay-- The performance of ad hoc networks depends on co- operation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes without centralized

Sun, Yan Lindsay

135

A Cross layer Analysis of TCP Instability in Multihop Ad hoc Networks  

E-Print Network [OSTI]

1 A Cross layer Analysis of TCP Instability in Multihop Ad hoc Networks Ehsan Hamadani, Veselin to the nature of some ad hoc network applications (e.g. emergency operation, battlefield communication), TCP of any pre-existing network infrastructure or centralized administration. During recent years ad hoc

Rakocevic, Veselin

136

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Marco Fiore, Member Papadimitratos, Member, IEEE Abstract--A growing number of ad hoc networking protocols and location verification, mobile ad hoc networks, vehicular networks. I. INTRODUCTION Location awareness has become

Paris-Sud XI, Université de

137

Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks Hervé Roussain-based software applications on mobile devices (such as laptops or personal digital assistants) capable of ad hoc also makes it possible for mobile devices to com- municate directly in ad hoc mode, that is, without

Paris-Sud XI, Université de

138

On Local Algorithms for Topology Control and Routing in Ad Hoc Networks  

E-Print Network [OSTI]

On Local Algorithms for Topology Control and Routing in Ad Hoc Networks Lujun Jia and Rajmohan 3400 N. Charles Street Baltimore, MD 21218, USA scheideler@cs.jhu.edu Abstract An ad hoc network. Indeed, an important task of an ad hoc network is to determine an appropri­ ate topology over which high

Chan, Agnes Hui

139

Ad Hoc Networking Critical Features and Performance Metrics Madhavi W. Subbarao  

E-Print Network [OSTI]

Ad Hoc Networking Critical Features and Performance Metrics Madhavi W. Subbarao Wireless Communications Technology Group, NIST October 7, 1999 A mobile ad hoc network MANET is an autonomous collection networking features and performance metrics for assessing the behav- ior of an ad-hoc network are identi ed

140

The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks  

E-Print Network [OSTI]

The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks Sonja Buchegger IBM EPFL-DSC CH-1015 Lausanne, Switzerland jean-yves.leboudec@epfl.ch Abstract: Mobile ad-hoc networks rely- liciously pose a threat to availability in mobile ad- hoc networks. Several approaches have been pro- posed

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Evaluation of a Routing Architecture for Wireless Messaging Ad-Hoc Networks  

E-Print Network [OSTI]

Evaluation of a Routing Architecture for Wireless Messaging Ad-Hoc Networks Megha Goel1 and M´ark F self-organizing ad-hoc networks can be used to provide the short messaging service, at a much lower of ad- hoc network routing in which mobile nodes are allowed to relay in place of static nodes. We

Bencsáth, Boldizsár

142

A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks  

E-Print Network [OSTI]

A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks Ahmad Al-Hanbali, Roland, The Netherlands ABSTRACT Ad hoc network routing protocols may fail to operate in the absence of an end, Performance analysis. 1. INTRODUCTION End-to-end connectivity is not a natural property of ad hoc networks

Boucherie, Richard J.

143

Too Much Mobility Limits the Capacity of Wireless Ad-hoc Networks  

E-Print Network [OSTI]

Too Much Mobility Limits the Capacity of Wireless Ad-hoc Networks Syed Ali Jafar Electrical@ece.uci.edu Abstract-- We consider a ? user isotropic fast fading ad-hoc network with no channel state information determine the capacity region of this ad-hoc network for any partition of the users into transmitters

Jafar, Syed A.

144

Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks  

E-Print Network [OSTI]

Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks.Hauspie, David.Simplot}@lifl.fr Abstract Ad hoc network normally has critical connectivity properties before, respectively. The experiments with random unit graph model of ad hoc networks show high correspondence of local

Paris-Sud XI, Université de

145

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks  

E-Print Network [OSTI]

A Framework for Service Provision in Intermittently Connected Mobile Ad hoc Networks Nicolas Le Mobile ad hoc networks have been recently receiving much attention due to the important prospects and military scenarios, civil- ian mobile ad hoc services usable in everyday life are con- sidered from now

Paris-Sud XI, Université de

146

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks  

E-Print Network [OSTI]

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks Jes´us Friginal, ddandres, pgil}@disca.upv.es Abstract Ad hoc networks are wireless, self-configuring and self- maintaining in this domain has been based on simulation, thus obviating aspects influencing the behav- ior of real ad hoc

Paris-Sud XI, Université de

147

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks  

E-Print Network [OSTI]

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks Yih-Chun Hu a University, Houston, TX 77005, USA Abstract An ad hoc network is a collection of wireless computers (nodes stations or access points. Although many previous ad hoc network routing protocols have been based in part

Ramkumar, Mahalingam

148

MRTP: A Multi-Flow Realtime Transport Protocol for Ad Hoc Networks  

E-Print Network [OSTI]

MRTP: A Multi-Flow Realtime Transport Protocol for Ad Hoc Networks Shiwen Mao, Dennis Bushmitch@research.panasonic.com, sathya@research.panasonic.com Abstract-- Transporting multimedia data over ad hoc networks is a challenging problem. However, the mesh topology of ad hoc networks implies the existence of multiple paths

Panwar, Shivendra S.

149

A Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc  

E-Print Network [OSTI]

A Multiobjective Performance Evaluation Framework for Routing in Wireless Ad Hoc Networks Katia.runser, jean-marie.gorce@insa-lyon.fr Abstract--Wireless ad hoc networks are seldom characterized by one single. Instead, we address this problem by proposing a new modeling framework for routing in ad hoc networks

Paris-Sud XI, Université de

150

Optimally Increasing Secure Connectivity in Multi-hop Wireless Ad Hoc Networks  

E-Print Network [OSTI]

1 Optimally Increasing Secure Connectivity in Multi-hop Wireless Ad Hoc Networks Seyit Ahmet--We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after, integrity and confidentiality in multi-hop wire- less ad hoc networks. An example of such networks are multi

Bystroff, Chris

151

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

152

Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks Mawloud Omar, Yacine University of Technology, France. bouabdal@hds.utc.fr Abstract A mobile ad hoc network (MANET) is a wireless that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc

Paris-Sud XI, Université de

153

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

154

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong which can provide mobile nodes in IPv6 mobile ad hoc network with secure name-to-address resolution and service discovery. Because mobile ad hoc network has dynamic topology, the current DNS is inappropriate

Jeong, Jaehoon "Paul"

155

Routing with a density-based probabilistic algorithm for mobile ad-hoc networks  

Science Journals Connector (OSTI)

Ad-hoc networks can operate even when there is a scarcity of network infrastructure. This research examines ad-hoc networks that have varying node densities. These environments can be found in areas struck by disasters to urban city environments. Mobile ... Keywords: Broadcast Management, Density Based Probabilistic Algorithm, Mobile Ad-Hoc Networks, Nodes Connectivity Management, Nodes Density

Hean-Loong Ong; Essam Natsheh; Tat-Chee Wan

2011-04-01T23:59:59.000Z

156

NAC Ad-Hoc Task Force on Planetary Defense August 17 and 20, 2010 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense August 17 and 20, 2010 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense MINUTES Meeting Date: August 17 and 20, 2010 AGENDA: · Ad-Hoc Task Force Final Report and Recommendations ATTENDING: Ad-Hoc Task Force: Tom Jones (Co-Chair), Rusty

Waliser, Duane E.

157

Randomized location service in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

of the node. Home regions near a node are aware of the nodes exact location (that is, the unit region it occupies) while home regions that are far from the node know only of a larger region that contains the node. Camp, Boleng and Wilcox [12] have dcvclopcd..., *' in Proc. IEEE Wireless Communication and Networking Conference (WCNC), Orlando, FL, 2002, pp. 874-578. [12] T. Camp, J. Boleng and L. Wilcox, "Location Information Services in Mobile Ad Hoc Networks, " in IEEE Int. Conf. Communications, 2002, pp. 3318...

Bhattacharya, Sangeeta

2012-06-07T23:59:59.000Z

158

Modelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata  

E-Print Network [OSTI]

protocols using Ad hoc On-demand Distance Vector AODV [DPR02] as our test protocol. AODV is one of mobile adModelling Ad hoc On-demand Distance Vector (AODV) Protocol with Timed Automata Sibusisiwe Chiyangwa On-demand Distance Vector protocol (AODV). Keywords: automatic veri#12;cation, model checking, real

Oxford, University of

159

E-Print Network 3.0 - ad hoc meeting Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering 8 A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi, Carlo Marchetti, Roberto Baldoni Summary: . As an example,...

160

E-Print Network 3.0 - ad hoc working Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Sciences 16 A Middleware Architecture for Inter ad-hoc networks Communication Mauro Patini, Roberto Beraldi, Carlo Marchetti, Roberto Baldoni Summary: modems within the...

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

E-Print Network 3.0 - ad hoc committee Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc committee Page: << < 1 2 3 4 5 > >> 1 MAA CURRICULUM VITAE GERALD J. PORTER...

162

Modeling and simulation of intrusion detection system in mobile ad-hoc networks.  

E-Print Network [OSTI]

??The thesis investigates the process of modeling and simulation of the mobile ad-hoc networks. It provides a overview of the actual state of art together (more)

Jarmal, Piotr

2008-01-01T23:59:59.000Z

163

A Study of Energy-efficient Routing Supporting Coordinated Sleep Scheduling in Wireless Ad Hoc Networks.  

E-Print Network [OSTI]

??A wireless ad hoc network is a collection of wireless computing devices that self-configure to form a network independently of any fixed infrastructure. Many wireless (more)

Lou, Chong

2015-01-01T23:59:59.000Z

164

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network [OSTI]

Anonymity: New Passive Threats in Mobile Ad Hoc Networkson new anonymity threats and classify the correspondingagainst the new anonymity threats in mobile networks. The

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

165

Geocasting in mobile ad hoc networks: a grid based approach to GeoTORA  

E-Print Network [OSTI]

Networking and Com- puting (MOBIHOC), Boston, MA, August 2000, pp. 37-44. [16] H. Zhou and S. Singh, "Content based multicast (CBM) in ad hoc networks" in Proceedings of ACM/IEEE Workshop on Mobile Ad Hoc Networking and Computing (MOBIHOC), Boston, MA... Networking and Com- puting (MOBIHOC), Boston, MA, August 2000, pp. 37-44. [16] H. Zhou and S. Singh, "Content based multicast (CBM) in ad hoc networks" in Proceedings of ACM/IEEE Workshop on Mobile Ad Hoc Networking and Computing (MOBIHOC), Boston, MA...

Macwan, Mikin

2012-06-07T23:59:59.000Z

166

IEEE ICC 2014 -Ad-hoc and Sensor Networking Symposium 978-1-4799-2003-7/14/$31.00 2014 IEEE 305  

E-Print Network [OSTI]

IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 978-1-4799-2003-7/14/$31.00 ©2014 IEEE 305 ICC 2014 - Ad-hoc and Sensor Networking Symposium 306 #12;IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 307 #12;IEEE ICC 2014 - Ad-hoc and Sensor Networking Symposium 308 #12;IEEE ICC 2014 - Ad-hoc

Bahk, Saewoong

167

Trusting Routers and Relays in Ad hoc Networks. Prashant Dewan and Partha Dasgupta  

E-Print Network [OSTI]

with tangential goals belonging to the members of the network. In such situations micro payments can be cashedTrusting Routers and Relays in Ad hoc Networks. Prashant Dewan and Partha Dasgupta Arizona State University dewan@asu.edu, partha@asu.edu Abstract The current generation of ad hoc networks relies on other

Dasgupta, Partha

168

The integration of ad hoc sensor and cellular networks for multi-class data transmission  

E-Print Network [OSTI]

The integration of ad hoc sensor and cellular networks for multi-class data transmission Fei Hu a. On the other hand, large-scale Ad hoc Sensor Networks (ASN), when deployed among mobile patients who may carry different kinds of micro-sensors to measure ECG, blood pressure, basal temperature or other physiological

Kumar, Sunil

169

Towards commercial mobile ad hoc network applications: a radio dispatch system  

Science Journals Connector (OSTI)

We propose a novel and plausibly realistic application scenario for mobile ad hoc networks in the form of a radio dispatch system. We evaluate the system from both financial and technical perspectives to gain a complete picture of its feasibility. Using ... Keywords: application, mobile ad hoc networks, performance

Elgan Huang; Wenjun Hu; Jon Crowcroft; Ian Wassell

2005-05-01T23:59:59.000Z

170

Intelligent stale-frame discards for real-time video streaming over wireless ad hoc networks  

Science Journals Connector (OSTI)

This paper presents intelligent early packet discards (I-EPD) for real-time video streaming over amultihop wireless ad hoc network. In a multihop wireless ad hoc network, the quality of transferring real-time video streams could be seriously degraded, ...

Tsang-Ling Sheu; Yung-Shih Chi

2009-01-01T23:59:59.000Z

171

From Soldier to Scholar: Report of the Council of Presidents Ad Hoc Committee  

E-Print Network [OSTI]

the Council of Presidents Ad Hoc Committee on Strengthening Services to Veterans) to assess the dimensions 1 #12; 2 From Soldier to Scholar: Report of the Council of Presidents Ad Hoc Committee on Strengthening Services to Veterans Introduction The United States of America has been

Qiu, Weigang

172

A Token Ring Protocol for Dynamic Ad-hoc Wireless Environments  

SciTech Connect (OSTI)

A wireless ad-hoc networking protocol is presented. The protocol is designed to be flexible, easy to use and adaptable to a wide variety of potential applications. The primary considerations in design are small code size, guaranteed bandwidth access, limited delay, and error resilience in a highly dynamic ad-hoc environment. These considerations are achieved through the use of token ring protocol.

Top, P; Kohlhepp, V; Dowla, F

2005-09-30T23:59:59.000Z

173

Optimization Algorithms for Information Retrieval and Transmission in Distributed Ad Hoc Networks  

E-Print Network [OSTI]

An ad hoc network is formed by a group of self-configuring nodes, typically deployed in two or three dimensional spaces, and communicating with each other through wireless or some other media. The distinct characteristics of ad hoc networks include...

Lu, Hong

2010-01-14T23:59:59.000Z

174

Comit ad hoc sur la Formation continue l'Universit de Montral  

E-Print Network [OSTI]

Rapport Comité ad hoc sur la Formation continue à l'Université de Montréal Mars 2010 #12;Table mandat du Comité ad hoc sur la formation continue, tel que défini par le Provost, consiste à réfléchir

Charette, André

175

Centralized algorithms for maintaining connectivity in a mobile ad hoc network  

E-Print Network [OSTI]

This thesis focuses on the problem of maintaining connectivity in a mobile ad hoc network (MANET). In a connected MANET, communication is possible between any pair of nodes. The nodes in a mobile ad hoc network are constantly moving causing frequent...

Karwa, Tapan P.

2012-06-07T23:59:59.000Z

176

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks  

E-Print Network [OSTI]

Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Suyang Ju Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate Faculty of the University of Kansas School...: Intelligent Approaches for Routing Protocols In Cognitive Ad-Hoc Networks Dissertation Committee: _____________________________________ Dr. Joseph B. Evans, Advisor Professor, EECS _____________________________________ Dr. Victor Frost...

Ju, Suyang

2011-12-31T23:59:59.000Z

177

Hybrid Resource Discovery Mechanism in Ad Hoc Grid Using Structured Overlay  

E-Print Network [OSTI]

Hybrid Resource Discovery Mechanism in Ad Hoc Grid Using Structured Overlay Tariq Abdullah1, Luc.onana, david.calomme}@umh.ac.be Abstract. Resource management has been an area of research in ad hoc grids, decentralized or in a hybrid manner. In this paper, we discuss a micro economic based, hybrid resource discovery

Kuzmanov, Georgi

178

Vehicular Ad Hoc Networks: A New Challenge for Localization-Based Systems  

Science Journals Connector (OSTI)

A new kind of ad hoc network is hitting the streets: Vehicular Ad Hoc Networks (VANets). In these networks, vehicles communicate with each other and possibly with a roadside infrastructure to provide a long list of applications varying from transit safety ... Keywords: Data Fusion, Localization, Vehicular Networks

Azzedine Boukerche; Horacio A. B. F. Oliveira; Eduardo F. Nakamura; Antonio A. F. Loureiro

2008-07-01T23:59:59.000Z

179

A MAC Protocol for Wireless Ad Hoc Networks with Power Control  

E-Print Network [OSTI]

is an important factor in ad hoc networks. One way to conserve energy supported by the standard [1] is the power-hop neighborhood. Through many simulations we show that our algorithm outperforms the IEEE 802.11 standard, also IEEE 802.11 [1] has become the standard for Wire- less LAN's both in infrastructure and in ad hoc mode

180

LIFETIME-AWARE MULTICAST ROUTING IN WIRELESS AD HOC Morteza Maleki and Massoud Pedram  

E-Print Network [OSTI]

studies on the construction of energy-efficient broadcast and multicast tree in ad hoc networks ([6}@usc.edu Abstract. One of the main design constraints in mobile ad hoc networks (MANETs) is that they are energy constrained. Hence, routing algorithms must be developed to consider energy consumption of the nodes

Pedram, Massoud

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency  

E-Print Network [OSTI]

, and security issues, we investigate the efficiency of energy consumption in wireless ad hoc networks-efficient mechanisms is of importance. In wireless ad hoc networks, energy consumption at each node is mainly due energy consumption of system operation and data processing, energy consumption economy of radio

Deng, Jing

182

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor Networks  

E-Print Network [OSTI]

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor their connecti- vity properties and their performances in terms of energy consumption, throughput and other and the evaluation or esti- mation of energy consumption in ad-hoc WSNs. The frame- work is based on a variant

Rossi, Sabina

183

Report of the Ad Hoc Committee to Determine the Needs and Structure of UW-Madison's Research Enterprise  

E-Print Network [OSTI]

1 Report of the Ad Hoc Committee to Determine the Needs and Structure of UW-Madison's Research the University of Wisconsin-Madison's preeminence in research and graduate education. The ad hoc committee has

Sheridan, Jennifer

184

Report of the Ad Hoc Committee on Library and Computing Resources Prepared for President Burish and Provost Boetsch  

E-Print Network [OSTI]

Report of the Ad Hoc Committee on Library and Computing Resources Prepared for President Burish, Provost Boetsch appointed the Ad Hoc Committee on Library and Computing Resources to consider the current

Marsh, David

185

Lifetime-Extended, Power-Aware, Non-position Base Localized Routing in Hybrid Ad-Hoc/Infrastructure Network  

Science Journals Connector (OSTI)

This paper presents a localized routing protocol for both hybrid ad-hoc/infrastructure networks and conventional ad-hoc networks. The ... that the proposed protocol improves efficiency in both hybrid and conventi...

Xueqing Li; Roshdy H. M. Hafez

2004-01-01T23:59:59.000Z

186

On the Reliability and Additional Overhead of Reliable On-Demand Multicast Routing Protocol for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

for Mobile Ad Hoc Networks Kumaran Sambandan, Gergely V. Záruba, and David Levine Department of Computer applications currently envisioned for mobile ad hoc networks require multicasting. Several multicasting protocols have been proposed for mobile ad hoc networks, one of the most popular being the On Demand

Záruba, Gergely

187

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005 1325 Cooperation in Wireless Ad Hoc Networks: A  

E-Print Network [OSTI]

a market-based approach to stimulate cooperation in ad hoc networks where nodes charge a price for relaying to illustrate our results. Index Terms--Ad hoc network, pricing, rate control, wireless networks. I. INTRODUCTION AWIRELESS ad hoc network is a collection of nodes which form a network independently of any fixed

188

Abstract--A mobile ad hoc network is a wireless communication network which does not rely on a fixed  

E-Print Network [OSTI]

Abstract--A mobile ad hoc network is a wireless communication network which does not rely protecting the security of the network is essential. Like many distributed systems, security in ad hoc. The experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc

Lyu, Michael R.

189

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. VOLUME, NO. NUMBER, MONTH YEAR 1 Transmission Capacity of Wireless Ad Hoc  

E-Print Network [OSTI]

Capacity of Wireless Ad Hoc Networks with Successive Interference Cancellation Steven Weber, Member, IEEE Abstract-- The transmission capacity of a wireless ad hoc network can be defined as the maximum allowable classes of multiuser channels, but has not been carefully evaluated in the context of an ad hoc wireless

de Veciana, Gustavo

190

Abstract-Mobile Ad Hoc NETworks (MANETs) are an emerging class of network architectures that are characterized  

E-Print Network [OSTI]

Abstract- Mobile Ad Hoc NETworks (MANETs) are an emerging class of network architectures on the overall performance of ad hoc networks. This study will contribute to the modeling and development of adaptive ad hoc protocols (routing, medium access control, scheduling and buffer management). Using 2k r

Perkins, Dmitri

191

Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-enhanced and standard IEEE 802.11 nodes can coexist in a MANET is also discussed. Keywords: mobile ad hoc network, promiscuous mode, broadcast, IEEE 802.11, routing. #12;2 1. Introduction In mobile ad hoc networks (MANETs

Chen, Sheng-Wei

192

Abstract--Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc Network  

E-Print Network [OSTI]

Abstract--Reconfigurable Radio Systems (RRS), based on Software Defined Radio (SDR) and Mobile Ad-hoc by the proposed scheme, while keeping the important false positive rate at a very low level. Keywords--Mobile ad-hoc (SDR), Mobile Ad-hoc Networks (MANETs) and Cognitive Radio (CR). Research on these technologies has

193

1. Introduction Ad hoc networks are a hot research topic. The enabling technology for this field includes: (1)  

E-Print Network [OSTI]

1 1. Introduction Ad hoc networks are a hot research topic. The enabling technology for this field, with their computers turned on and connected. Ad hoc networks are a natural result of user demand meeting the enabling technology. Highly mobile devices that dynamically organize ad hoc networks, intercommunicate, pass

Yasinsac, Alec

194

Implementing Ad Hoc to Terrestrial Network Gateways Jonathan McGee, Manish Karir, and John S. Baras  

E-Print Network [OSTI]

Implementing Ad Hoc to Terrestrial Network Gateways Jonathan McGee, Manish Karir, and John S. Baras we describe our experience of implementing a gateway between ad hoc and terrestrial routing protocols terrestrial network interface and MAODV on a wireless ad hoc network interface.Although we focus primarily

Baras, John S.

195

A Distributed Protocol for the Bounded-Hops Converge-cast in Ad-Hoc Networks0  

E-Print Network [OSTI]

A Distributed Protocol for the Bounded-Hops Converge-cast in Ad-Hoc Networks0 Andrea E. F. Clementi (centralized) heuristics. 1 Introduction An ad-hoc (wireless) network consists of a set of radio stations connected by wireless links. In an ad hoc network, a transmission range is assigned to every station

Rossi, Gianluca

196

The University of Texas at Austin Talk at EURECOM -p. 1/30 Transmission Capacity of Wireless Ad Hoc  

E-Print Network [OSTI]

;· · Talk Outline Introduction Network Model Transmission Capacity Framework Multi-Antenna Wireless Ad Hoc The University of Texas at Austin Talk at EURECOM - p. 2/30 We consider a wireless ad hoc network with multi-Antenna Wireless Ad Hoc Networks Perfect Channel Knowledge Linear Precoding with CSIT Imperfect Channel Knowledge

Gesbert, David

197

On Using Reputations in Ad hoc Networks to Counter Malicious Nodes Prashant Dewan, Partha Dasgupta and Amiya Bhattacharya  

E-Print Network [OSTI]

On Using Reputations in Ad hoc Networks to Counter Malicious Nodes Prashant Dewan, Partha Dasgupta, partha, amiya}@asu.edu Abstract Nodes in mobile ad hoc networks have a limited trans- mission range for ad hoc networks. Instead of choosing the shortest path to the destination, the source node chooses

Dasgupta, Partha

198

Cognitive radio ad hoc networks (CRAHNs): Cognitive radio ad hoc networks (CRAHNs): Resource allocation techniques based on Bio-inspired computing  

E-Print Network [OSTI]

Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled spectrum (this is nothing but the "common carrier principle" adopted in oil/gas/electricity pipelines/networks.), since all ad hoc networks share a common pool of channels, exhausting the available channels will force ad hoc networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. CR network proved to next generation wireless communication system that proposed as a way to reuse under-utilised spectrum of licensee user (primary network) in an opportunistic and non-interfering basis. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. Adding this layer of such intelligence to the ad hoc network by looking at the overall geography of the network known as cogni...

Singh, Santosh Kumar

2010-01-01T23:59:59.000Z

199

Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages Matthias Rosenschon a  

E-Print Network [OSTI]

Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages Matthias Rosenschon studied in the literature up to now. This paper describes an approach for gateway discovery based on HELLO-hoc networks, MANET, gateway discovery, AODV, HELLO packets 1. INTRODUCTION Multihop wireless access networks

Rakocevic, Veselin

200

Presentation to the EAC - Workforce Ad Hoc Committee Panel Discussion - Wanda Reder  

Broader source: Energy.gov (indexed) [DOE]

Workforce Ad Hoc Committee Workforce Ad Hoc Committee Panel Discussion Wanda Reder June 11, 2012 DOE EAC create an EAC Workforce Ad Hoc Working Group to review the workforce needs and make recommendations to ensure those with appropriate skills sets are available to support the future grid. - Consists EAC members and invited participants - Coordinate with others - Committee activity will sunset after their recommendations - Participants: * Chairs: Wanda Reder; Vice-Chair: Tom Sloan * DOE Point of Contact: David Meyer, Gil Bindewald, Anjan Bose * Members: Barbara Kenny, NSF; Ann Randazzo, CEWD, Dennis Ray, PSERC, Barbara Tyran, EPRI; Elaine Ulrich, DOE; - Additional EAC participation is encouraged! 2012 Workforce Ad-Hoc Background * Electric demand growing via electrification to

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A Node Stability Index-Based Connected Dominating Set Algorithm for Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

We propose a Node Stability Index (NSI)-based algorithm to determine stable connected dominating sets (CDS) for Mobile Ad hoc Networks ... algorithm prefers to include (to the CDS) covered nodes that have the lar...

Natarajan Meghanathan

2012-01-01T23:59:59.000Z

202

Quality of Service (QoS) security in mobile ad hoc networks  

E-Print Network [OSTI]

With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET...

Lu, Bin

2006-10-30T23:59:59.000Z

203

Two algorithms for leader election and network size estimation in mobile ad hoc networks  

E-Print Network [OSTI]

We develop two algorithms for important problems in mobile ad hoc networks (MANETs). A MANET is a collection of mobile processors (?nodes?) which communicate via message passing over wireless links. Each node can communicate directly with other...

Neumann, Nicholas Gerard

2005-02-17T23:59:59.000Z

204

E-Print Network 3.0 - ad hoc communication Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc communication Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for...

205

E-Print Network 3.0 - ad-hoc time series Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

series Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc time series Page: << < 1 2 3 4 5 > >> 1 International Journal of Information...

206

E-Print Network 3.0 - ad hoc panel Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

panel Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc panel Page: << < 1 2 3 4 5 > >> 1 Part 500, Chapter 25 SCIENTIFIC MISCONDUCT REVIEW...

207

P2P-basierte Gruppenkommunikation in drahtlosen Ad-hoc-Netzen.  

E-Print Network [OSTI]

??Die Konzeption eines Gruppenkommunikationsdienstes, welcher nicht nur die Anforderungen eines Kommunikationsnetzes, sondern auch die unterschiedlicher Anwendungen erfllt, zeigt sich als Herausforderung. Im Kontext drahtloser Ad-hoc-Netze (more)

Baumung, Peter

2008-01-01T23:59:59.000Z

208

E-Print Network 3.0 - ad-hoc wireless environments Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc wireless environments Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models...

209

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

This paper studies delay properties of the well-known maximum weight scheduling algorithm in wireless ad hoc networks. We consider wireless networks with either one-hop or multihop flows. Specifically, this paper shows ...

Modiano, Eytan H.

210

E-Print Network 3.0 - ad-hoc network protocols Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Powered by Explorit Topic List Advanced Search Sample search results for: ad-hoc network protocols Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for...

211

The design and implementation of a distributed photo sharing Android application over ad-hoc wireless  

E-Print Network [OSTI]

We present a distributed photo-sharing Android application, CameraDP, that primarily relies on ad-hoc Wifi. The app runs on top of the novel DIstributed Programming Layer Over Mobile Agents (DIPLOMA) programming abstraction. ...

Li, HaoQi, M. Eng. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

212

E-Print Network 3.0 - ad hoc routing Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

routing Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc routing Page: << < 1 2 3 4 5 > >> 1 Sum-of-Sinusoid channel models for wireless...

213

E-Print Network 3.0 - ad hoc theatre Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

theatre Search Powered by Explorit Topic List Advanced Search Sample search results for: ad hoc theatre Page: << < 1 2 3 4 5 > >> 1 his year, Indiana University celebrates its 75th...

214

Children and Implicature 1 Ad-hoc Implicature in Preschool Children  

E-Print Network [OSTI]

Children and Implicature 1 Ad-hoc Implicature in Preschool Children Alex J. Stiller Department version of this work was presented to the Cognitive Science Society in Stiller, Goodman, and Frank (2011

Pratt, Vaughan

215

Mobility Management Using Virtual Multi-parent Tree in Infrastructure Incorporated Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

Mobile nodes in the integrated network of infrastructure networks and mobile ad hoc networks need ... other traditional methods - proactive, reactive, and hybrid by resorting to simulation. The result shows...

Trung-Dinh Han; Hoon Oh

2009-01-01T23:59:59.000Z

216

Performance analysis of distributed time division multiple access protocols in mobile ad hoc environments  

E-Print Network [OSTI]

Tactical wireless mobile ad hoc networks rely upon distributed medium access control (MAC) protocols for coordination and assignment of channel resources among dispersed and mobile users. One such protocol is the distributed ...

Dastangoo, Siamak

217

E-Print Network 3.0 - ad hoc methods Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

leveling 22 7,142,524 System and method for using an ad-hoc ... Source: Toh, C-K. - Mobile Network Protocol Laboratory & Department of Electrical and Electronic Engineering,...

218

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Broader source: Energy.gov (indexed) [DOE]

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

219

RAMBONODES for the Metropolitan Ad Hoc Network Jacob Beal Seth Gilbert  

E-Print Network [OSTI]

RAMBONODES for the Metropolitan Ad Hoc Network Jacob Beal Seth Gilbert MIT Computer Science at this scale. Other algorithms for the MAN setting includes Beal's prior work with PERSISTENTNODE [2, 3], where

Gilbert, Seth

220

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi of an on-demand minimum energy routing protocol and suggests mechanisms for their imple- mentation. We of an on-demand minimum energy routing protocol in terms of energy savings with an existing on-demand ad

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Abstract--Location discovery is a fundamental problem in wireless ad hoc networks. Most of the ad hoc routing  

E-Print Network [OSTI]

, Section 4 our approach for optimal flooding, Section 5 presents the simulation results of OFP, Section 6 hoc routing protocols use some form of flooding to discover the location and route of a mobile node. Despite various optimizations, many messages are propagated unnecessarily. We propose the Optimal Flooding

Jain, Raj

222

A modeling framework for supporting and evaluating performance of multi-hop paths in mobile ad-hoc wireless networks  

Science Journals Connector (OSTI)

Performance evaluation is a crucially important part of designing any mobile ad-hoc wireless networks. For a more comprehensive evaluation, mathematical analysis is essential, along with simulation. In this paper, we present a detailed analytical model ... Keywords: Mobile ad-hoc networks, Multi-hop paths, Node mobility model, Performance analysis

Le The Dung; Beongku An

2012-09-01T23:59:59.000Z

223

Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

at Boulder Boulder, CO-80309 Abstract--A minimum energy routing protocol reduces the energy con- sumption the energy consumption of a wireless ad hoc network. Past research has focused on energy savings schemes1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc

Brown, Timothy X.

224

A Layer-2 Framework for Interconnecting Ad Hoc Networks to Fixed Internet: Test-bed Implementation and Experimental Evaluation  

Science Journals Connector (OSTI)

......advanced ad hoc networking technologies, employing mechanisms that...using the IEEE 802.11 technology [2]) using an ad hoc routing...mobility and facilitates the Intranet communications. In our architecture...wireless link because wired technologies are still more reliable and......

E. Ancillotti; R. Bruno; M. Conti; E. Gregori; A. Pinizzotto

2007-07-01T23:59:59.000Z

225

PARAMETERIZED NEIGHBORHOODBASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Munawar, Sagar Naik, Paul A.S. Ward  

E-Print Network [OSTI]

PARAMETERIZED NEIGHBORHOOD­BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Flooding is a simple routing technique that can be used to transmit data from one node to every other node in a network. The focus of this paper is to investigate im­ provements to flooding techniques used in ad hoc

Ward, Paul A.S.

226

Knowledge adaptation for ad hoc multimedia event detection with few exemplars  

Science Journals Connector (OSTI)

Multimedia event detection (MED) has a significant impact on many applications. Though video concept annotation has received much research effort, video event detection remains largely unaddressed. Current research mainly focuses on sports and news event ... Keywords: ad hoc med, knowledge adaptation, multimedia event detection (med), structural adaptive regression (sar)

Zhigang Ma; Yi Yang; Yang Cai; Nicu Sebe; Alexander G. Hauptmann

2012-10-01T23:59:59.000Z

227

Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommunications -Dynamic Power-Conscious Routing Concepts  

E-Print Network [OSTI]

Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommunications - Dynamic Power networks MANETs for emer- gency telecommunication. A MANET is an autonomous collection of mobile nodes into mobile nodes. A MANET for emergency telecommunication may operate in a stand-alone manner or be connected

228

Context Representation, Transformation and Comparison for Ad Hoc Product Data Exchange  

E-Print Network [OSTI]

and Chengzheng Sun School of Computing and Information Technology Griffith University, Brisbane, QLD 4111 enterprises (SMEs) encode their Web product data in ad hoc formats for electronic product catalogues- eration between Web-based firms [9][13]. However, millions of small and medium sized enterprises (SMEs

Guo, Jingzhi

229

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks  

E-Print Network [OSTI]

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks is proposed, called Keywords Cognitive Radio Networks, routing, dynamic spectrum allocation, cross-layer design 1. INTRODUCTION

Melodia, Tommaso

230

Convoy driving through ad-hoc coalition formation Majid Ali Khan and Ladislau Boloni  

E-Print Network [OSTI]

and low power wireless communication abilities. We assume that it can read the speed of the vehicle of Electrical and Computer Engineering University of Central Florida Orlando, Florida, 32816 Email: khan in an ad-hoc manner between vehicles whose drivers do not know each other, might not have common goals

Bölöni, Ladislau L

231

A Robust Clustering Algorithm for Mobile Ad Hoc Networks Zhaowen Xing  

E-Print Network [OSTI]

cooperative infrastructures. Thus, each node operates as an autonomous end system and a router for others + (603) 7967-6367 Email: kkphang@um.edu.my Chapter submitted to Handbook of Research on Next Generation Clustering Algorithm for Mobile Ad Hoc Networks ABSTRACT To mimic the operations in fixed infrastructures

Gruenwald, Le

232

Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application  

E-Print Network [OSTI]

for MANETs in two important areas: trust bias minimization and applica- tion performance maximization1 Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance as an active research area as evidenced by the proliferation of trust/reputation protocols to support mobile

Chen, Ing-Ray

233

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey  

E-Print Network [OSTI]

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey Zhongliang Zhao, Torsten and software are allowing the rapid development of small unmanned aerial vehicles (UAVs), capable of per fiber-reinforce plastic materials let UAVs become an aerial platform, that can be equipped

Braun, Torsten

234

A Mobility Model For UAV Ad hoc Network Ouns Bouachir, Alinoe Abrassart, Fabien Garcia, Nicolas Larrieu  

E-Print Network [OSTI]

A Mobility Model For UAV Ad hoc Network Ouns Bouachir, Alinoe Abrassart, Fabien Garcia, Nicolas, there is an in- creasing attention on micro-UAVs in the military area as well as in the civilian domain. They are used as swarm (several UAVs) forming a UAS (Unmanned Aircraft System) since they are relatively cheap

Boyer, Edmond

235

Energy-based adaptation in simulations of survivability of ad hoc communication  

E-Print Network [OSTI]

Energy-based adaptation in simulations of survivability of ad hoc communication Massimiliano Raciti are overloaded or not available. Unfortunately, the constrained capacity of their batteries and the energy of the resources. Real- time adaptation can further minimise their impact on the energy consumption, increasing

236

Measuring performance of ad hoc networks using timescales for information flow  

E-Print Network [OSTI]

on and off. By sending out queries and listening for replies, devices can learn the identity of other devices adaptive power algorithm, that uses only information local to each device, for building ad hoc networks, constant power, algorithm. I. INTRODUCTION Understanding how a collection of wireless devices that know

D'Souza, Raissa

237

Comparison of two wireless ad hoc routing protocols on a hardware test-bed  

E-Print Network [OSTI]

. These protocols are tested predominately using software simulation. Very few implementations have demonstratedComparison of two wireless ad hoc routing protocols on a hardware test-bed Shweta Bhandare (DSR) protocol and our Energy Aware Dynamic Source Routing protocol (EADSR). The implementation

Brown, Timothy X.

238

Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking  

E-Print Network [OSTI]

Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking protocols re- quires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network

Sirer, Emin Gun

239

AN ECONOMICAL, DEPLOYABLE AND SECURE VEHICULAR AD HOC NETWORK Baber Aslam, Ping Wang and Cliff Zou  

E-Print Network [OSTI]

of VANET deployment. VANETs have hybrid architecture containing both the infrastructure and the ad hoc vehicles have wireless communication devices installed along with an elaborate road side infrastructure infrastructure will exist. In this paper, we present an economical, scalable and deployable VANET system design

Zou, Cliff C.

240

Multicast Capacity in Mobile Wireless Ad Hoc Network with Infrastructure Support  

E-Print Network [OSTI]

. Index Terms--Wireless ad hoc network; multicast capacity; mobility; infrastructure; hybrid network that infrastructure can offer a linear capacity increase in hybrid network, when the number of base stations increases the multicast capacity in a static hybrid network with infrastructure support. Establishing the multicast tree with the

Wang, Xinbing

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Cross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks  

E-Print Network [OSTI]

) and the multicast routing tree (network layer property) in order to construct an energy-efficient key distributionCross-Layer Design for Energy-Efficient Secure Multicast Communications in Ad Hoc Networks Loukas, University of Washington, Seattle, WA Abstract-- We consider the problem of secure multicast in an energy

Poovendran, Radha

242

Minimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

trees with multiple optimization objectives. A. Related Work A number of energy-aware broadcast] that the problem of finding a minimum-energy broadcast tree is NP-hard. Particularly in [2], they have shownMinimizing Energy and Maximizing Network Lifetime Multicasting in Wireless Ad Hoc Networks Weifa

Liang, Weifa

243

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura  

E-Print Network [OSTI]

Supporting Secure Ad-hoc User Collaboration in Grid Environments Markus Lorch, Dennis Kafura is a key requirement. Current grid security mechanisms support individual users who are members of well-defined virtual organizations. Recent research seeks to provide manageable grid security services for self

Kafura, Dennis

244

Realistic Large Scale ad hoc Animal Monitoring Bartosz Wietrzyk, Milena Radenkovic  

E-Print Network [OSTI]

Realistic Large Scale ad hoc Animal Monitoring Bartosz Wietrzyk, Milena Radenkovic School for profitability of animal production as well as welfare of animals and farmers. In this paper we define requirements for such monitoring on the basis of questionnaires distributed to potential users and processing

Aickelin, Uwe

245

Current networks require ad-hoc operating procedures by expert administrators to handle  

E-Print Network [OSTI]

1 Abstract Current networks require ad-hoc operating procedures by expert administrators to handle and operational procedures; and coordinate these changes with those caused by built-in element procedures ­ handle implemented in two complementary versions and is now being applied to automate several configuration

Yemini, Yechiam

246

A Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks  

E-Print Network [OSTI]

to re-establish broken routes. Thus, a considerable global energy gain can be achieved by minimizing. The choice of the primary route in MEA-DSR is conditioned by two factors: 1) the residual energy of nodesA Multipath Energy-Aware On demand Source Routing Protocol for Mobile Ad-Hoc Networks S. Chettibi

Boyer, Edmond

247

Autonomous Undersea Systems Network (AUSNet) Protocols To Support Ad-Hoc AUV Communications  

E-Print Network [OSTI]

Autonomous Undersea Systems Network (AUSNet) ­ Protocols To Support Ad-Hoc AUV Communications@technologysystemsinc.com D. Richard Blidberg Steve Chappell Sai Mupparapu Autonomous Undersea Systems Institute 86 Old reports progress within the AUSNET (Autonomous Undersea Systems Network) program. AUSNET addresses

248

AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS  

E-Print Network [OSTI]

AUTONOMOUS UNDERSEA SYSTEMS NETWORK (AUSNET) ­ PROTOCOLS TO SUPPORT AD-HOC AUV COMMUNICATIONS. Richard Blidberg Steve Chappell Autonomous Undersea Systems Institute Lee, NH (www.ausi.org) blidberg@ausi.org chappell@ausi.org Abstract This paper reports progress within the AUSNET (Autonomous Undersea Systems

249

Dynamic Rate and Power Allocation in Wireless Ad Hoc Networks with Elastic and Inelastic Traffic  

Science Journals Connector (OSTI)

In this paper, we focus on the problem of dynamic rate and power allocation in wireless ad hoc networks with slow-fading channels, where a mixture of elastic and inelastic traffic is supported. A stochastic optimization problem incorporating the quality ... Keywords: Dynamic resource allocation, Elastic flows, Inelastic flows, Particle swarm optimization (PSO), QoS requirements, Stochastic duality theory

Fei Wang; Xiaofeng Liao; Songtao Guo; Hongyu Huang; Tingwen Huang

2013-05-01T23:59:59.000Z

250

Constructing Minimum-Energy Broadcast Trees In Wireless Ad Hoc Networks  

E-Print Network [OSTI]

networks are not available or not economical to build [3]. These span the commercial, public as well it is not economical to build a fixed in- frastructure for a short temporary usage. In tactical battle- fieldConstructing Minimum-Energy Broadcast Trees In Wireless Ad Hoc Networks Weifa Liang Department

Liang, Weifa

251

On the Energy Efficiency of Cognitive Radios -A Simulation Study of the Ad Hoc Wireless  

E-Print Network [OSTI]

on energy consumption in the ad hoc WLAN scenario. Limiting this study to just the WLAN scenario allows us on selected spectrum. The benefits in terms of reduced energy consumption, however, due to easier channel important parameters and their impact on energy consumption. Index Terms--Cognitive Radios, Energy

Namboodiri, Vinod

252

A Scalable Message Passing Interface Implementation of an Ad-Hoc Parallel I/o system  

Science Journals Connector (OSTI)

In this paper we present the novel design, implementation, and evaluation of an ad-hoc parallel I/O system (AHPIOS). AHPIOS is the first scalable parallel I/O system completely implemented in the Message Passing Interface (MPI). The MPI implementation ... Keywords: distributed file systems, parallel I/O, parallel systems, parallelism and concurrency

Florin Isaila; Francisco Javier Garcia Blas; Jess Carretero; Wei-Keng Liao; Alok Choudhary

2010-05-01T23:59:59.000Z

253

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks  

E-Print Network [OSTI]

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks François Ingelrest.Mitton,David.Simplot}@lifl.fr Abstract--We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our

Paris-Sud XI, Université de

254

Energy-ef cient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network  

E-Print Network [OSTI]

Energy-ef cient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network Wenzhong Li City University of Hong Kong Kowloon, Hong Kong Email: wenzhong@cityu.edu.hk Edward Chan City dynamically. Most existing cache strategies perform replacement independently, and they seldom consider

Chan, Edward

255

Energy-efficient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc  

E-Print Network [OSTI]

Energy-efficient Cache Replacement Policies for Cooperative Caching in Mobile Ad Hoc Network Edward Chan a, ,Wenzhong Li a,b ,Daoxu Chen b aCity University of Hong Kong, Kowloon, Hong Kong b. Most existing cache strategies perform replacement independently, and they seldom consider coordinated

Chan, Edward

256

Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks  

E-Print Network [OSTI]

Modular Topology Control and Energy Model for Wireless Ad Hoc Sensor Networks Niranjan in a harsh terrain typically are battery operated and, therefore, require energy efficient network protocols. In order to ease the analysis of the energy usage of proposed network protocols, this paper proposes

Jay Yang, Shanchieh

257

New Flooding Control Schemes Applied In Route Initialisation For The Ad Hoc On Demand Routing Protocols  

E-Print Network [OSTI]

New Flooding Control Schemes Applied In Route Initialisation For The Ad Hoc On Demand Routing College London * Email: uceephu@ucl.ac.uk Abstract: This paper introduces a new route request flooding. This scheme aims to control and reduce the route request flooding. Furthermore, the scheme combines

Haddadi, Hamed

258

Localized Low-Weight Graph and Its Applications in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

with O(log n) bits) and small computation cost, where n is the number of wireless nodes. Test results through multi- hop wireless links by using intermediate nodes to relay the message. Consequently, each if the Euclidean distance uv is less than one unit. Wireless ad hoc networks require special treatment

259

American Institute of Aeronautics and Astronautics Ad Hoc UAV Ground Network (AUGNet)  

E-Print Network [OSTI]

which act as relays. We envision two scenarios for this type of network. In the first, the UAV acts and analysis. This paper describes these components and performance results measured at an outdoor test range of distance and/or terrain. The UAV, with a better view of the nodes, maintains connectivity as an ad hoc

Brown, Timothy X.

260

Applications of k-Local MST for Topology Control and Broadcasting in Wireless Ad Hoc  

E-Print Network [OSTI]

the local broadcast communication model. Test results are corroborated in the simulation study. We study some other way. More specifically, it is enough for our protocols when each node knows the distance intermediate nodes to relay the messages. Consequently, each node in the wireless ad hoc network also acts

Li, Xiang-Yang

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A Simulation Model of DYMO for Ad Hoc Routing in OMNeT++  

E-Print Network [OSTI]

A Simulation Model of DYMO for Ad Hoc Routing in OMNeT++ Christoph Sommer Isabel Dietrich Falko describe a simulation model of DYMO, Permission to make digital or hard copies of all or part of this work of MANETs are available as simulation models, including the complete TCP/IP stack and an AODV implementation

Breu, Ruth

262

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network  

E-Print Network [OSTI]

An On-demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi the necessary features of an on-demand minimum energy routing protocol and suggests mechanisms the performance of an on-demand minimum energy routing protocol in terms of energy savings with an existing on

Brown, Timothy X.

263

On the Connectivity in One-Dimensional Ad Hoc Wireless Networks with a Forbidden Zone  

E-Print Network [OSTI]

the ocean temperature for an accurate weather prediction, detecting the 1 Email: xdhu@mspil.edu.cn 2 Email region [7]. As each node in the ad hoc networks has a limit transmis- sion power and the networks have in the future. 2. Main results and proofs In order to state our main results, we first introduce some

264

Finance and Administration Ad Hoc Committee on Diversity and Inclusion At the December 3 Finance and Administration stem department heads' meeting, an  

E-Print Network [OSTI]

Finance and Administration Ad Hoc Committee on Diversity and Inclusion At the December 3 Finance initiative at Lehigh University. An ad hoc committee has been established to brainstorm ideas and develop

Napier, Terrence

265

Report to the Faculty Senate from the ad hoc Faculty Senate Exigency Plan Study Committee (Torbjrn Wandel, John Bohac, Sal Costa, Betsy Delmonico, Peter Rolnick [chair])  

E-Print Network [OSTI]

Report to the Faculty Senate from the ad hoc Faculty Senate Exigency Plan Study Committee (Torbjörn Wandel, John Bohac, Sal Costa, Betsy Delmonico, Peter Rolnick [chair]) March 16, 2011 The ad hoc Faculty

Gering, Jon C.

266

arXiv:0804.3902v1[cs.DS]24Apr2008 Minimum-energy broadcast in random-grid ad-hoc  

E-Print Network [OSTI]

arXiv:0804.3902v1[cs.DS]24Apr2008 Minimum-energy broadcast in random-grid ad-hoc networks ranges to the nodes of an ad-hoc network in order to guarantee a directed spanning tree from a given in ad-hoc networks. In ad-hoc net- works, nodes are able to vary their transmission ranges in order

Rossi, Gianluca

267

Ad Hoc Sample Policy Accepting Samples from Private Citizens or NGOs. Our lab works with over 50 different partners across the political spectrum. One reason  

E-Print Network [OSTI]

Ad Hoc Sample Policy ­ Accepting Samples from Private Citizens or NGOs. Our lab works with over 50 have enacted the following laboratory policy: All ad hoc samples (i.e., samples not part of an ongoing ask that if anyone is submitting an ad hoc sample to the lab they use the chain of custody form found

268

NAC Ad-Hoc Task Force on Planetary Defense July 8-9, 2010 CORRECTED 9/15/10 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense July 8-9, 2010 ­ CORRECTED 9/15/10 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense CORRECTED MINUTES Meeting Date: July 8 - 9, 2010 AGENDA: · Ad-Hoc Task Force Timeline · Fact Finding Report · Next Generation Ground-Based Search · Space

Waliser, Duane E.

269

NAC Ad-Hoc Task Force on Planetary Defense Apr 15-16, 2010 CORRECTED 6/10/10 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense Apr 15-16, 2010 ­ CORRECTED 6/10/10 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense CORRECTED MINUTES Meeting Date: April 15-16, 2010 AGENDA: · Ad-Hoc Task Force Terms of Reference · NASA Near Earth Objects Observation (NEOO) Program

Waliser, Duane E.

270

Abstract--This paper develops an analytical model for evaluating the Quality of Service (QoS) in wireless ad-hoc  

E-Print Network [OSTI]

S) in wireless ad-hoc networks. In doing so it extends the trunking theory concepts to encompass the effect of co. INTRODUCTION In the last few years mobile ad-hoc networks for personal communication services have emerged nature of ad-hoc networks makes them more robust to systemic failures, easier to deploy, and more

Haimovich, Alexander

271

Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.  

SciTech Connect (OSTI)

Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

2003-12-01T23:59:59.000Z

272

PNNI routing support for ad hoc mobile networking: A flat architecture  

SciTech Connect (OSTI)

This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Form Contribution 97-0766. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. This contribution covers the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all reside at the same level in a PNNI hierarchy. Future contributions will cover the general case where those top-most LGNs reside at different hierarchy levels. This contribution considers a flat ad hoc network architecture--in the sense that each mobile network always participates in the PNNI hierarchy at the preconfigured level of its top-most LGN.

Martinez, L.; Sholander, P.; Tolendino, L.

1997-12-01T23:59:59.000Z

273

An Algorithm for Selecting a Group Leader in Mobile Robots Realized by Mobile Ad Hoc Networks and Object Entropy  

Science Journals Connector (OSTI)

This paper proposes a novel algorithm for mobile robots to select a group leader and to ... perform a specific work. The concepts of mobile ad hoc network (MANET) and object ... selection of a group leader. A log...

Sang-Chul Kim

2007-01-01T23:59:59.000Z

274

Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks  

SciTech Connect (OSTI)

In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

2002-10-01T23:59:59.000Z

275

Detect DDoS flooding attacks in mobile ad hoc networks  

Science Journals Connector (OSTI)

Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First of all, we present a quantitative model to characterise the flooding attack. We then provide analytical models of detecting flooding attack. In these models, we give an analytical framework to evaluate the number of routing control packets. At last, we design two flow based detection features to identify the flooding attacks. Both simulation and analytical results show that our proposed detection approach can detect the flooding attack accurately and effectively.

Yinghua Guo; Sylvie Perreau

2010-01-01T23:59:59.000Z

276

TECHNICAL REPORT TR-09-02, UC DAVIS, SEPTEMBER 2009. 1 On the Connectivity and Multihop Delay of Ad Hoc Cognitive  

E-Print Network [OSTI]

delay of ad hoc cognitive radio networks, where the transmission delay of each hop consists]. In this technical report, we focus on the connectivity and multihop delay of ad hoc cognitive radio networks. DueTECHNICAL REPORT TR-09-02, UC DAVIS, SEPTEMBER 2009. 1 On the Connectivity and Multihop Delay of Ad

Islam, M. Saif

277

Fusion of one-class classifiers for protocol-based anomaly detection in AODV-based mobile ad hoc networks  

Science Journals Connector (OSTI)

Ad hoc on-demand distance vector (AODV) is a widely used routing protocol for mobile ad hoc networks that fully trusts all participants and has no security considerations. As a result, malicious nodes can violate the protocol and disrupt the network operations. In this paper, a protocol-based anomaly detection method in ad hoc networks with AODV routing protocol is proposed. In doing so, we use a step-by-step approach for modelling the normal behaviour of AODV, and utilise a combination of support vector data description (SVDD) and mixture of Gaussians (MoGs) one-class classifiers to classify any deviation from the normal behaviour as an anomaly. These two classifiers are chosen among six utilised classifiers according to their diversity and better accuracy. Simulation results demonstrate the effectiveness of the proposed method for detecting many types of attacks (e.g., wormhole, blackhole, rushing and denial of service (DoS)).

Mohammad Rahmanimanesh; Saeed Jalili; Ahmad R. Sharafat

2013-01-01T23:59:59.000Z

278

On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks without Common Control Channel  

E-Print Network [OSTI]

Cognitive radio (CR) technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the spectrum in an opportunistic manner. Since unlicensed users are temporary visitors to the licensed spectrum, they are required to vacate the spectrum when a licensed user reclaims it. Due to the randomness of the appearance of licensed users, disruptions to both licensed and unlicensed communications are often difficult to prevent. In this chapter, a proactive spectrum handoff framework for CR ad hoc networks is proposed to address these concerns. In the proposed framework, channel switching policies and a proactive spectrum handoff protocol are proposed to let unlicensed users vacate a channel before a licensed user utilizes it to avoid unwanted interference. Network coordination schemes for unlicensed users are also incorporated into the spectrum handoff protocol design to realize channel rendezvous. Moreover, a distributed channel selection scheme to eliminate collisions a...

Song, Yi

2011-01-01T23:59:59.000Z

279

An Ad-Hoc Method for Obtaining chi**2 Values from Unbinned Maximum Likelihood Fits  

E-Print Network [OSTI]

A common goal in an experimental physics analysis is to extract information from a reaction with multi-dimensional kinematics. The preferred method for such a task is typically the unbinned maximum likelihood method. In fits using this method, the likelihood is a goodness-of-fit quantity in that it effectively discriminates between available hypotheses; however, it does not provide any information as to how well the best hypothesis describes the data. In this paper, we present an {\\em ad-hoc} procedure for obtaining chi**2/n.d.f. values from unbinned maximum likelihood fits. This method does not require binning the data, making it very applicable to multi-dimensional problems.

M. Williams; C. A. Meyer

2008-06-30T23:59:59.000Z

280

On effectiveness of cooperation enforcement mechanisms in wireless ad hoc networks  

Science Journals Connector (OSTI)

Wireless ad hoc networks are resource constrained, infrastructureless peer to peer networks where nodes are responsible for performing routing activity for other nodes to establish end to end communication. Due to limited resources (energy and bandwidth), in certain networks, nodes may behave selfishly and not forward packets for other nodes. Many cooperation enforcement mechanisms are proposed in literature to enforce packet forwarding on resource constrained nodes, and are shown to perform better than the defenseless dynamic source routing (DSR) protocol under their own set of assumptions. However, they do not consider the effect on network lifetime and energy consumption. Here we analyse routing overhead, end to end packet delivery ratio (PDR), and per packet energy cost of DSR and a representative set of cooperation enforcement mechanisms using various network scenario to show that in absence of infrastructure support cooperation enforcement mechanisms in their present form are not effective in dealing with node selfishness.

Manish Chaturvedi; Sanjay Srivastava

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

PARAMETERIZED NEIGHBORHOOD-BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Munawar, Sagar Naik, Paul A.S. Ward  

E-Print Network [OSTI]

PARAMETERIZED NEIGHBORHOOD-BASED FLOODING FOR AD HOC WIRELESS NETWORKS Vijay Dheap, Mohammad Ahmad Flooding is a simple routing technique that can be used to transmit data from one node to every other node in a network. The focus of this paper is to investigate im- provements to flooding techniques used in ad hoc

Ward, Paul A.S.

282

A link availability-based QoS-aware routing protocol for mobile ad hoc sensor networks  

Science Journals Connector (OSTI)

With more and more wireless devices being mobile, there is a constant challenge to provide reliable and high quality communication services among these devices. In this paper, we propose a link availability-based QoS-aware (LABQ) routing protocol for ... Keywords: Ad hoc network, Mobility, QoS, Routing, Sensor

Ming Yu; Aniket Malvankar; Wei Su; Simon Y. Foo

2007-12-01T23:59:59.000Z

283

Self-limiting adaptive protocols for controlled flooding in ad hoc networks Larry Hughes and Ying Zhang  

E-Print Network [OSTI]

Self-limiting adaptive protocols for controlled flooding in ad hoc networks Larry Hughes and Ying power consumption, reduce traffic, and restrict flooding, are of growing importance. In this paper-aware nodes, can reduce the number of nodes involved in a transmission. Simulation results show

Hughes, Larry

284

An ad hoc mobile network is a collectionof mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continualbasis. In order to facilitatecommunicationwithin the networ  

E-Print Network [OSTI]

Abstract An ad hoc mobile network is a collectionof mobile nodes that are dynamically routes between nodes. The primary goal of such an ad hoc network routing protocol is correct.This articleexamines routing protocols for ad hoc networksand evaluates these protocols based on a given set

Toh, C-K.

285

Characterizing the Interaction Between Routing and MAC Protocols in Ad-Hoc Networks  

SciTech Connect (OSTI)

We empirically study the effect of mobility on the performance of protocols designed for wireless ad-hoc networks. An important objective is to study the interaction of the Routing and MAC layer protocols under different mobility parameters. We use three basic mobility models: grid mobility model, random waypoint model, and exponential correlated random model. The performance of protocols is measured in terms of (i) latency, (ii) throughput, (iii) number of packets received, (iv) long term fairness and (v) number of control packets at the MAC and routing layer level. Three different commonly studied routing protocols are used: AODV, DSR and LAR1. Similarly three well known MAC protocols are used: MACA, 802.1 1 and CSMA. Our main contribution is simulation based experiments coupled with rigorous statistical analysis to characterize the interaction of MAC layer protocols with routing layer protocols in ad-hoc networks. From the results, we can conclude the following: e No single MAC or Routing protocol dominated the other protocols in their class. Probably more interestingly, no MAURouting protocol combination was better than other combinations over all scenarios and response variables. 0 In general, it is not meaningful to speak about a MAC or a routing protocol in isolation. Presence of interaction leads to trade-offs between the amount of control packets generated by each layer. The results raise the possibility of improving the performance of a particular MAC layer protocol by using a cleverly designed routing protocol or vice-versa. Thus in order to improve the performanceof a communication network, it is important to study the entire protocol stack as a single algorithmic construct; optimizing individual layers in the seven layer OS1 stack will not yield performance improvements beyond a point. A methodological contribution of this paper is the use of statistical methods such as analysis of variance (ANOVA), to characterize the interaction between the protocols, mobility patterns and speed. Such methods allow us to analyze complicated experiments with large input space in a systematic manner.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

286

E-Print Network 3.0 - ad hoc on-demand Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

hoc network... , but there are presently no complete proposals for ... Source: Johnson, David B. - Department of Computer Science, Rice University Collection: Computer...

287

Adaptive Control Parameters for Dispersal of Multi-Agent Mobile Ad Hoc Network (MANET) Swarms  

SciTech Connect (OSTI)

A mobile ad hoc network is a collection of independent nodes that communicate wirelessly with one another. This paper investigates nodes that are swarm robots with communications and sensing capabilities. Each robot in the swarm may operate in a distributed and decentralized manner to achieve some goal. This paper presents a novel approach to dynamically adapting control parameters to achieve mesh configuration stability. The presented approach to robot interaction is based on spring force laws (attraction and repulsion laws) to create near-optimal mesh like configurations. In prior work, we presented the extended virtual spring mesh (EVSM) algorithm for the dispersion of robot swarms. This paper extends the EVSM framework by providing the first known study on the effects of adaptive versus static control parameters on robot swarm stability. The EVSM algorithm provides the following novelties: 1) improved performance with adaptive control parameters and 2) accelerated convergence with high formation effectiveness. Simulation results show that 120 robots reach convergence using adaptive control parameters more than twice as fast as with static control parameters in a multiple obstacle environment.

Kurt Derr; Milos Manic

2013-11-01T23:59:59.000Z

288

Enabling optimization in LCA: from ad hoc to structural LCA approachbased on a biodiesel well-to-wheel case study  

Science Journals Connector (OSTI)

Applied life cycle assessment (LCA) studies often lead to a comparison of ... alternatives; we call this the ad hoc LCA approach. This can seem surprising since ... most promising. We call it the structural LCA

Ivan T. Herrmann; Martin Lundberg-Jensen

2014-01-01T23:59:59.000Z

289

Manufacturing Change at the John Deere Harvester Works: Report on the Visit of the Ad Hoc Lean Aircraft Initiative Team, June 7, 1994  

E-Print Network [OSTI]

On June 7, 1994, an Ad Hoc team from LAI visited John Deere to conduct an informal benchmark of John Deere's successful change to Leaner Manufacturing. This report summarizes the results of that trip, as well as summarizing ...

Stahl, Fred

290

An Overview of Scaling Laws in Ad Hoc and Cognitive Radio Networks  

E-Print Network [OSTI]

of secondary spectrum licensing (SSL). Regulations on the usage of licensed spectra are being loosened, encouraging unused primary spectrum to be licensed, often in an opportunistic manner, to secondary devices-hoc networks, cognitive networks, cognitive radio. 1. Introduction 1.1. Secondary spectrum opportunities

Vu, Mai

291

Design and Evaluation of a Distributed Clustering Algorithm for Mobile ad hoc Networks  

Science Journals Connector (OSTI)

......are presented: power consumption per...clusterheads, power consumption...delay reveal that system performance is...enforcement, and rescue operations. As various kinds...demonstrate that the system performance is...show up to 45% power savings and up...hoc Networks. Handbook on Algorithms......

Daniel Lacks; Mainak Chatterjee; Taskin Kocak

2009-08-01T23:59:59.000Z

292

EXPLOITING DYNAMIC SOURCE ROUTING TO ENABLE UNDERSEA NETWORKING OVER AN AD-HOC TOPOLOGY  

E-Print Network [OSTI]

optimized to support a dynamically evolving topology of truly semi-autonomous networked robots. Emerging-hoc (self-forming, self- maintaining) networks from an assorted collection of platforms, ranging from simple sensors to unmanned autonomous vehicles to manned submersibles, would allow a richly interactive

293

On the Approximation Ratio of the MST-based Heuristic for the Energy-Efficient Broadcast Problem in Static Ad-Hoc Radio Networks  

E-Print Network [OSTI]

are located (see [28, 32]). Energy conservation is a critical issue in an ad-hoc wire- less networkOn the Approximation Ratio of the MST-based Heuristic for the Energy-Efficient Broadcast Problem@dia.unisa.it Abstract We present a technique to evaluate the approximation ra- tio on random instances of the Minimum

Bermond, Jean-Claude

294

Multi-transceiver simulation modules for free-space optical mobile ad hoc networks  

E-Print Network [OSTI]

and Murat Yuksel University of Nevada - Reno, CSE Department, MS 171 1664 N. Virginia Street, Reno, NV 89557 advantage of propagating in all directions enabling a receiver to roam inside the transmission sphere significant difference between FSO and RF is the requirement of line- of-sight in FSO, adding space

Yuksel, Murat

295

Extended Virtual Spring Mesh (EVSM): The Distributed Self-Organizing Mobile Ad Hoc Network for Area Exploration  

SciTech Connect (OSTI)

Mobile Ad hoc NETworks (MANETs) are distributed self-organizing networks that can change locations and configure themselves on the fly. This paper focuses on an algorithmic approach for the deployment of a MANET within an enclosed area, such as a building in a disaster scenario, which can provide a robust communication infrastructure for search and rescue operations. While a virtual spring mesh (VSM) algorithm provides scalable, self-organizing, and fault-tolerant capabilities required by aMANET, the VSM lacks the MANET's capabilities of deployment mechanisms for blanket coverage of an area and does not provide an obstacle avoidance mechanism. This paper presents a new technique, an extended VSM (EVSM) algorithm that provides the following novelties: (1) new control laws for exploration and expansion to provide blanket coverage, (2) virtual adaptive springs enabling the mesh to expand as necessary, (3) adapts to communications disturbances by varying the density and movement of mobile nodes, and (4) new metrics to assess the performance of the EVSM algorithm. Simulation results show that EVSM provides up to 16% more coverage and is 3.5 times faster than VSM in environments with eight obstacles.

Kurt Derr

2011-12-01T23:59:59.000Z

296

Homoclinic chaos in axisymmetric Bianchi-IX cosmological models with an ad hoc quantum potential  

SciTech Connect (OSTI)

In this work we study the dynamics of the axisymmetric Bianchi-IX cosmological model with a term of quantum potential added. As it is well known, this class of Bianchi-IX models is homogeneous and anisotropic with two scale factors, A(t) and B(t), derived from the solution of Einstein's equation for general relativity. The model we use in this work has a cosmological constant and the matter content is dust. To this model we add a quantum-inspired potential that is intended to represent short-range effects due to the general relativistic behavior of matter in small scales and play the role of a repulsive force near the singularity. We find that this potential restricts the dynamics of the model to positive values of A(t) and B(t) and alters some qualitative and quantitative characteristics of the dynamics studied previously by several authors. We make a complete analysis of the phase space of the model finding critical points, periodic orbits, stable/unstable manifolds using numerical techniques such as Poincare section, numerical continuation of orbits, and numerical globalization of invariant manifolds. We compare the classical and the quantum models. Our main result is the existence of homoclinic crossings of the stable and unstable manifolds in the physically meaningful region of the phase space [where both A(t) and B(t) are positive], indicating chaotic escape to inflation and bouncing near the singularity.

Correa, G. C.; Stuchi, T. J.; Joras, S. E. [Instituto de Fisica, Universidade Federal do Rio de Janeiro, Caixa Postal 68528, Rio de Janeiro, RJ 21941-972 (Brazil)

2010-04-15T23:59:59.000Z

297

A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems  

SciTech Connect (OSTI)

The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

Hope Forsmann; Robert Hiromoto; John Svoboda

2007-04-01T23:59:59.000Z

298

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

299

The "Hot Potato" Case: Challenges in Multiplayer Pervasive Games Based on Ad hoc Mobile Sensor Networks and the Experimental Evaluation of a Prototype Game  

E-Print Network [OSTI]

In this work, we discuss multiplayer pervasive games that rely on the use of ad hoc mobile sensor networks. The unique feature in such games is that players interact with each other and their surrounding environment by using movement and presence as a means of performing game-related actions, utilizing sensor devices. We discuss the fundamental issues and challenges related to these type of games and the scenarios associated with them. We also present and evaluate an example of such a game, called the "Hot Potato", developed using the Sun SPOT hardware platform. We provide a set of experimental results, so as to both evaluate our implementation and also to identify issues that arise in pervasive games which utilize sensor network nodes, which show that there is great potential in this type of games.

Chatzigiannakis, Ioannis; Akribopoulos, Orestis; Logaras, Marios; Kokkinos, Panagiotis; Spirakis, Paul

2010-01-01T23:59:59.000Z

300

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...N. Couper Lisa Craig Robert A. Cramer Alison K. Criss Peter D. Crompton Jorge H...Jose L. Puente Odile Puijalon R. Pyles Alison J. Quayle Marianne Quiding- Jarbrink...Winstanley Sebastian E. Winter Kim S. Wise Jeffrey H. Withey Christiane Wolz Hector...

Ferric C. Fang

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Ad hoc UEC Conference Call  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

will review draft program by Mon Aug 11 so authors can be notified by Aug 13 * 51 posters submitted before the deadline, 2 late; can accept them all but poster session space...

302

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Bhattacharya Kay Bidle Jill R. Blankenship John Boothroyd Katherine Borkovich Barry J. Bowman Nanette R. Boyle Axel A. Brakhage...Houten C. C. Wang Jianyang Wang Christopher M. West Robert Wheeler Malcolm S. Whiteway Heather Wilkinson Bryony A. P. Williams...

Aaron P. Mitchell

2011-12-01T23:59:59.000Z

303

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Ward Peter A. Ward Juliane Bubeck Wardenburg Jason Warfel Katherine Wasson Valerie J. Waters W. Ray Waters Eleanor Watson Tassili...Weiss Siegfried Weiss Susan Welkos Hannah Wexler Robert T. Wheeler Robert A. Whiley Marvin Whiteley Lothar H. Wieler Willem...

Ferric C. Fang

2011-12-01T23:59:59.000Z

304

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Klein Michele M. Klingbeil Kirstine Klitgaard David J. Klumpp Katherine L. Knight Leigh Knodler Laura J. Knoll Fumie Kobayashi Scott...Welch Rodney A. Welch Melanie Wellington Haitao Wen Robert T. Wheeler Marvin Whiteley Brian L. Wickes Willem J. Wiersinga Odilia...

Ferric C. Fang

2014-12-01T23:59:59.000Z

305

Acknowledgment of Ad Hoc Reviewers  

Science Journals Connector (OSTI)

...Leys Chunhao Li Ganwu Li Lin-Xi Li Stephen J. Libby Andrew H...Cecilia Wall Hui Wang Jianyang Wang Jin-Town Wang Peng George Wang Ping Wang Ruobing Wang Shaohui Wang...Xavier Guoqing Xia Lijun Xia Ping Xu Qingfu Xu Xuenan Xuan Anjali...

Ferric C. Fang

2014-12-01T23:59:59.000Z

306

Clock synchronization for mobile ad hoc networks  

E-Print Network [OSTI]

As mobile networking advances, there is a need for services such as clock synchronization that improve performance and support the development of higher-level applications. This can be achieved by adapting existing algorithms (such as the Network...

Chandra, Rajan

2013-02-22T23:59:59.000Z

307

Distributed algorithms for mobile ad hoc networks  

E-Print Network [OSTI]

]. In the algorithms in [9], each node keeps a value, called its height, from a totally ordered set (typically, a tuple of integers), and links are logically considered to be directed from higher to lower heights. The heights are manipulated when topology changes... in advance the type and dimensions of the polyhedron that is used for the quanti- zation of S; furthermore, the nodes must be able to measure the distance that they cover when they move. All this adds to the complexity of the algorithm. Also, the ?ori...

Malpani, Navneet

2012-06-07T23:59:59.000Z

308

applications exploring added: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the conference (if available): FUNDING REQUEST 6. Amount Requested from the Ad Hoc Committee: ** Attach case indicate the outcome of your request for funding from each...

309

Ad hoc routing protocols with multipoint relaying Ad hoc routing protocols with multipoint  

E-Print Network [OSTI]

. Route repairs are performed by new route request flooding. We show with simulation that the use of MPR the flooding overhead of control traffic. In this paper we show that multipoint relaying can be used as well and route replies are all flooded via Multipoint Relays (MPR). They both open routes to their originators

Paris-Sud XI, Université de

310

E-Print Network 3.0 - added 177lu radioisotope Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(TLD) SERVICE Summary: .B. The National Dosimetry Service charges additional fees for ad hoc dosimeter requests. Please allow a minimum... Left Ring Right...

311

E-Print Network 3.0 - ad aristeneto persistenze Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Workflows, teilweise strukturierte Workflows und nicht strukturierte Workflows (Ad-hoc-Workflows). Wf... verschiedene Gruppen von Benutzern unterschieden. Da gibt es...

312

E-Print Network 3.0 - age ad multos Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: evaluation of the authorized views is highly required. To this end, ad-hoc query evaluation techniques... of lightness, battery life, security and production...

313

Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks  

E-Print Network [OSTI]

2004. 3 Joint Scheduling and Power Control for Multicastingusers. This joint scheduling and power control problem is38 Joint Scheduling and Power Control for Multicasting in

Tan, Choo Chin

2013-01-01T23:59:59.000Z

314

Power and spectrum efficient communications in wireless ad hoc networks  

E-Print Network [OSTI]

Ephremides, Joint Scheduling and Power Control for WirelessOptimal Power Control, Scheduling, and Routing in UWBDistributed Joint Scheduling and Power Control Algorithm for

Qu, Qi

2008-01-01T23:59:59.000Z

315

Power and spectrum efficient communications in wireless ad hoc networks  

E-Print Network [OSTI]

on-cooperation message (AoC) with its own user ID included;requesting node receives the AoC message from a neighbor, it

Qu, Qi

2008-01-01T23:59:59.000Z

316

Improving Probabilistic Route Discovery in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L.M. Proceedings of 32nd IEEE Conference on Local Computer Networks (LCN 2007) pp 739-746 IEEE Computer Society Press

Abdulai, J.

317

Adjusted Probabilistic Route Discovery in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L. Journal of Computers and Electrical Engineering, 2008. pp 168-182 Elsevier Science

Abdulai, J.

318

A Dynamic Probabilistic Route Discovery for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L.M. Mohammed,A. International Journal of Communication Networks and Distributed Systems, Volume 4(1) pp 108 - 130

Abdulai, J.

319

Ad-hoc Collaborative Document Annotation on a Tablet PC  

E-Print Network [OSTI]

The use of technology as an effective educational tool has been an elusive goal in the past. Specifically, previous attempts at using small personal computers in the classroom to aid students as collaborative and note-taking ...

Huang, Albert

320

Ad hoc physical Hilbert spaces in Quantum Mechanics  

E-Print Network [OSTI]

The overall principles of what is now widely known as PT-symmetric quantum mechanics are listed, explained and illustrated via a few examples. In particular, models based on an elementary local interaction V(x) are discussed as motivated by the naturally emergent possibility of an efficient regularization of an otherwise unacceptable presence of a strongly singular repulsive core in the origin. The emphasis is put on the constructive aspects of the models. Besides the overall outline of the formalism we show how the low-lying energies of bound states may be found in closed form in certain dynamical regimes. Finally, once these energies are found real we explain that in spite of a manifest non-Hermiticity of the Hamiltonian the time-evolution of the system becomes unitary in a properly amended physical Hilbert space.

Francisco M. Fernndez; Javier Garcia; Iveta Semordov; Miloslav Znojil

2014-05-28T23:59:59.000Z

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Overview of the INEX 2007 ad hoc track  

E-Print Network [OSTI]

Fuhr,N. Kamps,J. Lalmas,M. Malik,S. Trotman,A. Focused access to XML documents: Sixth Workshop of the INitiative for the Evaluation of XML Retrieval (INEX 2007) pp 1-23 LNCS, Springer

Fuhr, N.; Kamps, J.; Lalmas, M.

322

Bandwidth-efficient routing protocol for mobile ad hoc networks  

E-Print Network [OSTI]

Al-Qassas,R. Al-Ayyoub,A. Ould-Khaoua,M. IEE Proceedings-Software, vol. 150, no. 4, 2003 pp 230-234 IEE

Al-Qassas, R.

323

Self-Stabilizing Local Routing in Ad Hoc Networks  

Science Journals Connector (OSTI)

......MANET) have no fixed network infrastructure (nodes are free to change...need for any existing network infrastructure or administration. Each node...networks modelled as a honeycomb grid is proposed in ref. [15...collected data. Protocol is a hybrid of the protocols and . The......

Doina Bein; Ajoy K. Datta; Vincent Villain

2007-03-01T23:59:59.000Z

324

User level routing for mobile ad hoc networks  

E-Print Network [OSTI]

an alternative architecture where routing is implemented in the user level. User level implementation has many benefits, such as ease of implementation, co-existence of multiple protocols, application specific customizations, and ease of deployment. This thesis...

Virk, Navjot

2001-01-01T23:59:59.000Z

325

Multiple-antenna systems in ad-hoc wireless networks  

E-Print Network [OSTI]

The increasing demand for wireless communication services has resulted in crowding of the electromagnetic spectrum. The "spectral-commons" model, where a portion of the electromagnetic spectrum is public and used on an ...

Govindasamy, Siddhartan, 1975-

2008-01-01T23:59:59.000Z

326

Hybrid Key Management for Mobile Ad Hoc Networks  

Science Journals Connector (OSTI)

Many public key infrastructure (PKI) approaches have been proposed in ... networks (MANETs). We present a new hybrid key management infrastructure, which combines the concepts of PKIs for MANET with trusted-third...

David Sanchez Sanchez; Heribert Baldus

2006-01-01T23:59:59.000Z

327

Performance Enhancement of Ad Hoc Networks with Janitor Based Routing  

E-Print Network [OSTI]

We propose and analyze a new on the fly strategy that discovers, repairs and maintains routes in hierarchical and distributed fashion called Janitor Based Routing (JBR). The main motivation behind our JBR protocol is to decrease flooding and routing overhead and increase efficiencies in packet movement. An analytical model for the proposed JBR is presented and detailed simulation is used to observe the performance of JBR. This route discovery and maintenance protocol clearly achieved improvement in terms of reduction of flooding, routing overhead, and, hence, provides enhanced reliability.

Siddique, Isnain; Hashem, M M A

2012-01-01T23:59:59.000Z

328

Enhanced Security Design for Threshold Cryptography in Ad Hoc Network  

E-Print Network [OSTI]

to move arbitrarily. Due to lack of a centralized secure infrastructure, the communication is prone routes through spoofing ARP or IP packets, passively or actively. Due to bandwidth constraints and energy conservation, an efficient implementation of the scheme is critical. We present a new approach to facilitate

Wang, Xiong

329

Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks  

E-Print Network [OSTI]

to find a minimum-energy multicast tree such that the totalof energy-efficient broadcast and multicast trees inof energy-efficient broadcast and multicast trees in

Tan, Choo Chin

2013-01-01T23:59:59.000Z

330

Automation strategies: existing theory or ad hoc decisions?  

Science Journals Connector (OSTI)

Automating manufacturing systems potentially improves competitiveness. Empirical studies show that the most successful result is achieved when decisions concerning automation are linked to the manufacturing strategies and competitive priorities of the company. It is suggested that automation is regarded as a separate decision group, within the manufacturing strategy content field.

Mats Winroth; Kristina Safsten; Johan Stahre

2007-01-01T23:59:59.000Z

331

Achieving Congestion Diversity in Wireless Ad-hoc Networks  

E-Print Network [OSTI]

consisting of 12 802.11g nodes. This small test-bed enables an imperical comparison of CDP's performance is particularly acute in multi-hop networks, where nodes must relay each others packets. We present a congestion- varying distance metric that approximates the queue draining times along each path. Our proposed

Snoeren, Alex

332

RamboNodes for the Metropolitan Ad Hoc Network  

E-Print Network [OSTI]

We present an algorithm to store data robustly in a large, geographically distributed network by means of localized regions of data storage that move in response to changing conditions. For example, data might migrate away ...

Beal, Jacob

2003-12-17T23:59:59.000Z

333

E-Print Network 3.0 - ad floram japoniae Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the most com- plex component of a dialogue system that is generally approached in a ad-hoc fashion Source: Levin, Esther - Department of Computer Science, City College, City...

334

E-Print Network 3.0 - advisory panel ad Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fusion 10 AREA ADVISORY SR1.3.3.1K, Summary: Advisory Committees, is a perennially used ad hoc committee now awaiting formal charge codification... ACADEMIC AREA ADVISORY...

335

E-Print Network 3.0 - ad pode ditar Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computer Technologies and Information Sciences 12 Um Novo Modelo para Confianca em Redes Ad Hoc Pedro B. Velloso1 Summary: significativo aumento no consumo de energia que pode ser...

336

E-Print Network 3.0 - added transportation capacity Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department... As node density D , transport capacity converges to zero at rate O(1D)...

337

Nuclear Energy Research Advisory Committee Meeting  

Broader source: Energy.gov (indexed) [DOE]

30-May 1, 2001, Crystal City Marriott, Arlington, Virginia 30-May 1, 2001, Crystal City Marriott, Arlington, Virginia NERAC members present: John Ahearne Benjamin F. Montoya Joseph Comfort Sekazi Mtingwa Michael L. Corradini Lura Powell Jose Luis Cortez Richard Reba Maureen S. Crandall Joy Rempe James Duderstadt (Chair) Allen Sessoms (Monday only) Marvin Fertel Daniel C. Sullivan (Monday only) Steve Fetter John Taylor Beverly Hartline Ashok Thadani (ad hoc) Leslie Hartz Charles E. Till Andrew Klein Neil Todreas Dale Klein Joan Woodard Robert Long NERAC members absent: Thomas Cochran Linda C. Knight Allen Croff Warren F. Miller, Jr. J. Bennett Johnston C. Bruce Tarter Also present: Ralph Bennet, Director, Advanced Nuclear Energy, Idaho National Engineering and Environmental Laboratory Nancy Carder, NERAC Staff Yoon I. Chang, Associate Laboratory Director, Argonne National Laboratory

338

C:\TEMP\Jan2001Minutes.PDF  

Broader source: Energy.gov (indexed) [DOE]

DRAFT DRAFT Minutes for the Nuclear Energy Research Advisory Committee Meeting January 10-11, 2001, Crystal City Marriott, Arlington, Virginia NERAC members present: John Ahearne Robert Long Thomas Cochran Sekazi Mtingwa Joseph Comfort Lura Powell Jose Luis Cortez Richard Reba Maureen S. Crandall Joy Rempe Allen Croff Allen Sessoms James Duderstadt (Chair) John Taylor Marvin Fertel Ashok Thadani (ad hoc) Steve Fetter Charles E. Till Beverly Hartline Neil Todreas Andrew Klein Joan Woodard Dale Klein NERAC members absent: Michael L. Corradini Warren F. Miller, Jr. Leslie Hartz Benjamin F. Montoya J. Bennett Johnston Daniel C. Sullivan Linda C. Knight C. Bruce Tarter Also present: Thomas Blejwas, Director, Nuclear and Risk Technologies Center, Sandia National Laboratories Nancy Carder, NERAC Staff

339

Nuclear Energy Research Advisory Committee Meeting April 15-16, 2002, Marriott Crystal City Hotel, Arlington, Virginia  

Broader source: Energy.gov (indexed) [DOE]

15-16, 2002, Marriott Crystal City Hotel, Arlington, Virginia 15-16, 2002, Marriott Crystal City Hotel, Arlington, Virginia NERAC members present: John Ahearne (Monday only) Robert Long Thomas Cochran Warren F. Miller, Jr. Joseph Comfort Benjamin F. Montoya Michael L. Corradini Sekazi Mtingwa Jose Luis Cortez Lura Powell Maureen S. Crandall Richard Reba (Tuesday only) Allen Croff Joy Rempe James Duderstadt (Chair) Daniel C. Sullivan (Monday morning only) Steve Fetter John Taylor Beverly Hartline Ashok Thadani (ad hoc; Monday only) Leslie Hartz Charles E. Till Andrew Klein Neil Todreas (Tuesday only) Dale Klein (Monday only) NERAC members absent: Marvin Fertel Allen Sessoms J. Bennett Johnston C. Bruce Tarter Linda C. Knight Joan Woodard Also present: Ralph Bennett, Director for Advanced Nuclear Energy, Idaho National Engineering and

340

D:\NE WEB Sites\NE\nerac\nov2001minutes.wpd  

Broader source: Energy.gov (indexed) [DOE]

November 5-6, 2001, DoubleTree Hotel, Arlington, Virginia November 5-6, 2001, DoubleTree Hotel, Arlington, Virginia NERAC members present: John Ahearne Robert Long Joseph Comfort Warren F. Miller, Jr. Michael L. Corradini Benjamin F. Montoya Jose Luis Cortez Sekazi Mtingwa Allen Croff Lura Powell James Duderstadt (Chair) Richard Reba Marvin Fertel Joy Rempe Beverly Hartline John Taylor Andrew Klein Charles E. Till Dale Klein (Monday only) Neil Todreas NERAC members absent: Thomas Cochran Allen Sessoms Maureen S. Crandall Daniel C. Sullivan Steve Fetter C. Bruce Tarter Leslie Hartz Ashok Thadani (ad hoc) J. Bennett Johnston Joan Woodard Linda C. Knight Also present: Robert Card, Under Secretary, USDOE Nancy Carder, NERAC Staff Charles Forsberg, Researcher, Oak Ridge National Laboratory Norton Haberman, Senior Technical Advisor, NE, USDOE

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

On the Cost and Quality Tradeoff in Constructing Minimum-Energy Broadcast Trees in Wireless Ad  

E-Print Network [OSTI]

On the Cost and Quality Tradeoff in Constructing Minimum-Energy Broadcast Trees in Wireless Ad Hoc], each having a different complexity and produc- ing a broadcast tree with a different energy cost. Thus to the quality of the trees constructed. II. BUILDING BLOCKS The three ingredients that constitute any minimum-energy

Hu, Y. Charlie

342

Supersymmetric holography on AdS3  

E-Print Network [OSTI]

The proposed duality between Vasiliev's supersymmetric higher spin theory on AdS3 and the 't Hooft limit of the 2d superconformal Kazama-Suzuki models is analysed in detail. In particular, we show that the partition functions of the two theories agree in the large N limit.

Candu, Constantin

2012-01-01T23:59:59.000Z

343

Supersymmetric holography on AdS3  

E-Print Network [OSTI]

The proposed duality between Vasiliev's supersymmetric higher spin theory on AdS3 and the 't Hooft limit of the 2d superconformal Kazama-Suzuki models is analysed in detail. In particular, we show that the partition functions of the two theories agree in the large N limit.

Constantin Candu; Matthias R. Gaberdiel

2012-03-08T23:59:59.000Z

344

E-Print Network 3.0 - ad-hoc wireless sensor Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in wireless sensor networks The rapid progress of wireless communication and embedded micro-sensing MEMS... technologies has made wireless sensor networks possible. A wireless...

345

E-Print Network 3.0 - ad hoc sensor Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering ; Computer Technologies and Information Sciences 60 A Taxonomy of Wireless Micro-Sensor Network Models Sameer Tilak Summary: to configure, maintain and optimize...

346

Design and analysis of distributed primitives for mobile ad hoc networks  

E-Print Network [OSTI]

by the network, which poses a serious challenge for the design and analysis of reliable protocols. In this work, three different approaches are used to handle mobility. The first part of the dissertation employs the simple technique of ignoring the mobility...

Chen, Yu

2006-10-30T23:59:59.000Z

347

Localization in Ad Hoc and Sensor Wireless Networks with Bounded Errors  

E-Print Network [OSTI]

region can be found with a mean error of one foot and a two-foot error bound. Keywords: Localization, error bound, sensor network, position, distance estimates 1 Introduction Advancements in low-power of a networked sensor include: (1) small physical size, (2) low power consumption, (3) limited processing power

Terwilliger, Mark

348

Social Welfare Based Routing in Ad hoc Networks Mingming Lu and Jie Wu  

E-Print Network [OSTI]

is to save energy. Existing energy-efficient routing protocols save energy by selecting the lowest energy cost route. However, energy saving is not equal to energy efficiency. Consider a large number, and hence most packets transmitted through this path are lost, it is energy waste rather than energy saving

Wu, Jie

349

An analytical and simulation study of wireless ad hoc networks with and without cooperation  

E-Print Network [OSTI]

terrain, replacing the batteries for nodes might not bepower, and replacing the batteries of the nodes may not beare usually operated by batteries and have limited power

Ip, Louisa Pui Sum

2010-01-01T23:59:59.000Z

350

Analysis of an Ad Hoc Network with Autonomously Moving Nodes Department of Informatics  

E-Print Network [OSTI]

of Stellenbosch 7600 Stellenbosch, South Africa M. Mandjes Korteweg-de Vries Institute for Mathematics Plantage or throughput. Here radio interference plays a pivotal role, as it defines an interesting trade-off: nodes may prefer to be close together in order to reduce the energy needed to transmit data, but on the other hand

Krzesinski, Tony

351

Auction-based Agent Negotiation in Cognitive Radio Ad Hoc Networks  

E-Print Network [OSTI]

of spectrum. To solve the problem of congestion, cognitive radio networks use dynamic spectrum access spectrum access. 1 Introduction The Cognitive Radio (CR) is a form of wireless communication in which are not and can move to unused channels. This optimizes the use of available radio frequency spectrum while

352

Throughput and Delay Analysis for Real-Time Applications in Ad-Hoc Cognitive Networks  

E-Print Network [OSTI]

to the primary users, so as not to interfere with the licensed use of the spectrum. Cognitive radio, a term first of cognitive radios and primary spectrum licensing seem intuitive, the fundamental theoretical limits. INTRODUCTION Based on evidence that a fixed (licensed) spectrum allo- cation can result in a highly inefficient

Cosman, Pamela C.

353

Energy-Efficiency of Cooperative Sensing Schemes in Ad hoc WLAN Cognitive Radios  

E-Print Network [OSTI]

being unused especially when it comes to licensed spectrum of legacy technologies. One example is the TV spectrum. However, for a radio to use the spectrum opportunistically it should be aware and intelligent) opportunistically cash in on the licensed spectrum allocated to rightful owners that is not being used in time

Namboodiri, Vinod

354

Vehicle interconnection metric and clustering protocol for improved connectivity in vehicular ad hoc networks  

Science Journals Connector (OSTI)

The SUMO [25...] simulator was used for vehicle movement data generation. It is a microtraffic simulator and provides information about the movement and position of every vehicle individually, which is a key fact...

Samo Vodopivec; Melita Hajdinjak

2014-10-01T23:59:59.000Z

355

Connectivity of vehicular ad hoc networks with continuous node distribution patterns  

E-Print Network [OSTI]

nodes, given market penetration rates. Traffic signal Policec density and market penetration rate along the path. Forc density by ?(x), market penetration rate by (x), and node

Jin, W L; Wang, Bruce

2010-01-01T23:59:59.000Z

356

An Adjusted Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Aminu,M. Ould-Khaoua,M. Mackenzie,L.M. Abdulai,J. Proceedings of the Tenth International Conference on Computer Modeling and Simulation(EUROSIM/UKSIM 2008), 1-3 April 2008, University of Cambridge, UK. pp 441 - 446 IEEE Computer Society Press

Aminu, M.

357

Probabilistic Counter-Based Route Discovery for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Mohammed,A. Ould-Khaoua,M. Mackenzie,L.M. Perkins,C. Abdulai,J. Proceedings of the 5th International Wireless Communication and Mobile Computing Conference (IWCMC 2009) pp 1335 - 1339 ACM

Mohammed, A.; Ould-Khaoua, M.

358

Performance Study of Traffic-Aware Routing in Mobile Ad hoc Networks  

E-Print Network [OSTI]

Al-Qassas,R. Ould-Khaoua,M. Mackenzie,L.M. Proceedings of the 6th Annual Network Symposium (PGNET'05), Liverpool John Moores University pp 279-284

Al-Qassas, R.

359

Traffic Locality Oriented Route Discovery Algorithm with Chase Packets for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

AL-Rodhaan,M. Mackenzie,L.M. Ould-Khaoua,M. The 2009 International Conference on Wireless Networks (ICWN'09), USA, July 13-16, 2009.

AL-Rodhaan, M.

360

Performance Analysis of an Adaptive Probabilistic Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Mohammed,A. Ould-Khaoua,M. Mackenzie,L.M. Abdulai,J. International Journal of Simulation Systems Science and Technology, Volume 10 (1) pp xx

Mohammed, A.; Ould-Khaoua, M.

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Integrating Service-Oriented Mobile Units to Support Collaboration in Ad-hoc Scenarios .  

E-Print Network [OSTI]

??Advances in wireless communication and mobile computing extend collaboration scenarios. Mobile workers using computing devices are currently able to collaborate in order to carry out (more)

Neyem, Andrs

2008-01-01T23:59:59.000Z

362

Analytical Study of Backoff Algorithms for MAC Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Manaseer,S. Ould-Khaoua,M. Mackenzie,L. 22nd Uk Performance Engineering Workshop, Bournemouth University pp 89-94

Manaseer, S.

363

An Efficient Counter-Based Broadcast Scheme for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Aminu,M. Ould-Khaoua,M. Mackenzie,L.M. Proceeding of the 4th European Performance Engineering Workshop, EPEW 2007 Berlin, Germany, LNCS 4748, 27 - 28 September 2007 pp 275 - 283 Springer Verlag

Aminu, M.

364

Ad-hoc wireless network coverage with networked robots that cannot localize  

E-Print Network [OSTI]

We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...

Correll, Nikolaus

365

Exploring the performance of TCP Vegas in mobile ad hoc networks  

E-Print Network [OSTI]

Papanastasiou,S. Ould-Khaoua,M. International Journal of Communication, vol. 17, no. 2, March 2004 pp 163-177 Wiley

Papanastasiou, S.

366

Fibonacci Increment Backoff Algorithm for MAC Protocol in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Manaseer,S. Ould-Khaoua,M. Mackenzie,L. Seventh Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, PGNET, Liverpool, UK pp 103-109

Manaseer, S.

367

On the performance of TCP Vegas in mobile ad hoc networks  

E-Print Network [OSTI]

Papanastasiou,S. Ould-Khaoua,M. Proc. International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2003), Montreal, Canada, July 20 - 24, 2003 pp 417-422 Society for Computer Simulation

Papanastasiou, S.

368

Simulation study of traffic-aware routing in mobile ad hoc networks  

E-Print Network [OSTI]

Al-Qassas,R. Ould-Khaoua,M. Mackenzie,L.M. DCS Tech Report Dept of Computing Science, University of Glasgow

Al-Qassas, R.

369

Improving the Performance of Counter-Based Broadcast Scheme for Mobile Ad hoc Networks  

E-Print Network [OSTI]

Aminu,M. Ould-Khaoua,M. Mackenzie,L.M. Abdulai,J. Proceedings of the 2007 IEEE International Conference on Signal Processing and Communication (ICSPC 2007), 24-27 November 2007, Dubai, United Arab Emirates pp 1403 - 1406 IEEE Computer Society Press

Aminu, M.

370

On the performance of probabilistic flooding in mobile ad hoc networks  

E-Print Network [OSTI]

Bani Yassein,M. Ould-Khaoua,M. Papanastasiou,S. Proc. 1st Int. Workshop on Performance Modelling in Wired, Wireless, Mobile Networking and Computing (PMW2MNC' 05), held in conjunction with ICPADS'2005, Fukuoka, Japan, 20 - 22 July 2005, IEEE Computer Society Press

Bani Yassein, M.

371

Performance Analysis of Adjusted Probabilistic Broadcasting in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Bani-Yassein,M. Ould-Khaoua,M. Mackenzie,L.M. Papanastasiou,S. International Journal of Wireless Information Networks, vol. 13, no. 2, April 2006 pp 127 - 140 Springer

Bani-Yassein, M.; Ould-Khaoua, M.

372

Neighbour Coverage: A Dynamic Probabilistic Route Discovery for Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Abdulai,J. Ould-Khaoua,M. Mackenzie,L.M. Aminu,M. International Symposium on Performance Evaluation of Computer and Telecommunication Systems, (SPECTS' 2008) pp 165 - 172 IEEE

Abdulai, J.

373

Design and Evaluation of a Distributed Clustering Algorithm for Mobile ad hoc Networks  

Science Journals Connector (OSTI)

......motivated by the GPS quorum hybrid routing algorithm, where...a conceptual cellular grid. The proposed distributed...motivated by the GPS quorum hybrid routing algorithm, where...a conceptual cellular grid. The proposed distributed...is no pre-existing infrastructure or in which it is not......

Daniel Lacks; Mainak Chatterjee; Taskin Kocak

2009-08-01T23:59:59.000Z

374

Real-Time Spatio-Temporal Query Processing in Mobile Ad-Hoc Sensor Networks  

E-Print Network [OSTI]

that has multiple sensors (e.g., mo- tion sensors, acoustic sensors, infrared light emitting diodes, and pa

375

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks1  

E-Print Network [OSTI]

, University of Waterloo, Canada Email: hai.jiang@ece.ualberta.ca, wangping@ntu.edu.sg, poor results demonstrate the effectiveness of the proposed scheme. Index Terms ­ medium access control, code-time nature of voice traffic); and 4) adaptive to user mobility. In this paper, we propose an effective MAC

Zhuang, Weihua

376

Dissemination in Opportunistic Mobile Ad-hoc Networks: the Power of the Crowd  

E-Print Network [OSTI]

Street Palo Alto, CA 94301, USA Email: {stratis.ioannidis, christophe.diot}@technicolor.com Abstract or periodically, while Vagabonds represent the rest of the population. We find that in most cases the majority of the population consists of Vagabonds. We evaluate the relative role of these two groups of users in data

Wang, Deli

377

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks CHIN-YANG HENRY TSENG  

E-Print Network [OSTI]

feel really lucky to be his student at UC Davis. I sincerely thank to Professor Matt Bishop in the OFFICE OF GRADUATE STUDIES of the UNIVERSITY OF CALIFORNIA DAVIS Approved By: Karl N. Levitt, Chair. I am very grateful that he spent his precious time and energy for advising my works

California at Davis, University of

378

An Architecture for Power-Saving Communications in a Wireless Mobile Ad Hoc Network  

E-Print Network [OSTI]

of energy-conserving communications. In comparison, existing protocols only exploit location information of mobile hosts to achieve the goal of energy conservation. The architecture addresses the power- saving. In comparison, existing protocols only exploit location information in limited layers. Similar to cellular

Tseng, Yu-Chee

379

Designing delay constrained hybrid ad hoc network infrastructure for post-disaster communication  

Science Journals Connector (OSTI)

Abstract Following a disaster-strike, rapid and reliable communication between relief/rescue workers in the affected regions, and the control stations located at a distance, is essential. This is to facilitate seamless information exchange about the status of victims, requirement of relief personnel/commodities, supply chain of goods and services, and so on, thus rendering relief operations more timely and effective. However, the availability of Internet in a post-disaster scenario is ruled out more often than not; wireless communication and mobile phones may not be usable either except in only selected areas. Besides, geographical obstructions such as broken bridges or closed roads add to the worries of personnel trying to develop a temporary network infrastructure for effective communication. Furthermore, availability of resources both technological and financial may prove to be a bottleneck in case of disasters in under-developed regions. Under such circumstances, a post-disaster communication network need to be developed to meet the following: (i) close to 100% information packet delivery, (ii) minimum latency for information exchange, and (iii) compliance to the resource constraints. In this paper, we propose a latency-aware four-tier planned hybrid architecture to tackle the aforementioned challenges and focus on extensive modeling and analysis of the planned network architecture. For detailed evaluation with the help of case study scenarios, we make use of the ONE Simulator, customized to suit our requirements. Additionally, we measure the improvement in network resources utilization and performance achieved with modeling of the architecture over that without modeling.

Sujoy Saha; Subrata Nandi; Partha Sarathi Paul; Vijay K. Shah; Akash Roy; Sajal K. Das

2014-01-01T23:59:59.000Z

380

DEBUT: Delay Bounded Service Discovery in Urban Vehicular Ad-hoc Networks  

E-Print Network [OSTI]

vehicle-to-vehicle communications. Second, the cost of updating the index information of resources should cost to equip the indexing vehicles must be reduced. Last, queries for certain resources are generally, Jia-Liang Lu, Min-You Wu Department of Computer Science and Engineering Shanghai Jiao Tong University

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Broadcasting and topology control in wireless ad hoc networks Xiang-Yang Li  

E-Print Network [OSTI]

that can approximate the minimum energy broadcast tree for non-adjustable power case. For adjustable power case, no localized methods can approximate the minimum energy broadcast tree within a constant factor networks. We discuss two energy models that could be used for broadcast: one is non-adjustable power

Stojmenovic, Ivan

382

Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits  

E-Print Network [OSTI]

in order to conserve energy [1]­[4]. Such a node appears to collaborate in packet forwarding, but only audits. Our approach provides significant energy savings compared to previously pro- posed methods, acknowledgment-based systems require a large amount of ACK messages to be transmitted, thus incurring a high

Lazos, Loukas

383

Multi-path Admission Control for Mobile Ad hoc Networks Anders Lindgren  

E-Print Network [OSTI]

Science and Electrical Engineering Lule°a University of Technology Elizabeth M. Belding-Royer Department

Belding-Royer, Elizabeth M.

384

10th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks  

E-Print Network [OSTI]

Karl TPC chairs Afef Feki John S. Baras Jianwei Huang Publication chair Hannes Frey Publicity chairs

Huang, Jianwei

385

Online Lifetime-Centric Multicast Routing: for AdU Hoc Networks with Directional Antennas  

E-Print Network [OSTI]

energy required to maintain a tree (broadcastlmulticast) [Z], [4], [5],[6], 1141, [24], E251.Thomas: Hou*. Yi Shi*, Hanif U. Sheralit, Jeffrey E. Wieselthied *The Bradley Department of Electrical-beam directional antenna and k provisioned with limited energy. We are interested in an online muIticast routing

Hou, Y. Thomas

386

Feasibility of an Aeronautical Mobile Ad Hoc Network Over the North Atlantic Corridor  

E-Print Network [OSTI]

Aerospace Center (DLR), Munich, Germany Email: {Daniel attractive scenario, the North Atlantic Corridor, and use realistic flight data to extract statistics about. INTRODUCTION Today's civil aviation airliners are typically equipped with a set of data communications

Schindelhauer, Christian

387

On Performance Optimization for Multi-Carrier MIMO Ad Hoc Networks  

E-Print Network [OSTI]

and algorithms for power control/allocation become key problems to harness their potential. However, due to non Hanif D. Sherali Department of Electrical and Computer Engineering Department of Industrial the capacity is affected by potential mutual interference on subcarriers, scheduling for subcarriers

Hou, Y. Thomas

388

IEEE Communications Magazine January 2001118 Toward Self-Organized Mobile Ad Hoc  

E-Print Network [OSTI]

be a replacement nor an alternative to current and future infrastructure-based networks. Instead application fields have been identified, such as relief operations in natural or manmade disas- ters, car of them. In addition, the nodes rely on batteries for their energy; therefore, energy savings are an impor

Vetterli, Martin

389

Does Cognition Come at a Net Energy Cost in Ad Hoc Wireless LANs?  

E-Print Network [OSTI]

the presence of primary users. The benefits in terms of reduced energy consumption in secondary users, however on energy consumption is particularly important when considering portable communication devices is analyzed and their impact on energy consumption is studied. Index Terms Cognitive Radios, Energy

Namboodiri, Vinod

390

An Energy Efficient Select Optimal Neighbor Protocol for Wireless Ad Hoc Networks  

E-Print Network [OSTI]

. This is especially important in wireless sensor networks where energy consumption is the primary concern. A number node compared to CSMA/CA based MAC protocols such as IEEE 802.11. When electronic energy consumption is a considerable part of energy consumption, SON has a better energy performance than traditional optimal pruning

New South Wales, University of

391

E-Print Network 3.0 - ad hoc cognitive Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Sciences 85 Marian, 1 of 22 CURRICULUM VITAE Summary: multilingualism. Broad: Psycholinguistics (spoken and written language, language and cognition), on-line...

392

Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network  

E-Print Network [OSTI]

in a single­hop fashion. Otherwise, a route con­ sisting of several relaying hosts is needed to forward in a MANET, a mobile host has to work as a router and cooperate with other hosts to find routes and relay­H­FA07­1­4 (Learning Technology) and the National Science Coun­ cil, ROC, under grants NSC89­2218­E

Tseng, Yu-Chee

393

A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

presents and uses a realistic reception model by taking bit error rate (BER), derived from Intersil HFA3861 [2] and MAC-layer packet relaying [3], [40], [41]. For example, in Coop- MAC [40] and rDCF [41], cooperating relay nodes are determined in a proactive manner and are used to forward frames at higher bit

Yu, Chansu

394

The Power of Location Awareness in Wireless Mobile Ad Hoc Networks  

E-Print Network [OSTI]

of attention #3; This research is supported in part by the Ministry of Education, ROC, under grant 89-H-FA07 occurs, where a packet may need to be relayed by several hosts before reaching its #12;nal destination

Tseng, Yu-Chee

395

Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network Yu-Chee Tseng  

E-Print Network [OSTI]

for Promoting Aca- demic Excellence of Universities under grant numbers A-91-H-FA07-1-4 and 89-E-FA04-1-4. 1 of relaying packets for other nodes. A MANET has the merit that it is quickly deployable. Applications

Jiang, Jehn-Ruey

396

GeoGRID: A Geocasting Protocol for Mobile Ad Hoc Networks Based on GRID  

E-Print Network [OSTI]

, under grant 89-H-FA07-1-4 (Learning Technology), and the National Science Council, ROC, under grant NSC are relayed by several intermediate hosts before reaching the destination host. Applications of MANETs occur

Tseng, Yu-Chee

397

A Cooperative Diversity-based Robust MAC Protocol in Wireless Ad Hoc Networks  

E-Print Network [OSTI]

presents and uses a realistic reception model by taking bit error rate (BER), derived from Intersil HFA3861 algorithms such as path-centric medium access [2] and MAC-layer packet relaying [3], [40], [41]. For example, in Coop- MAC [40] and rDCF [41], cooperating relay nodes are determined in a proactive manner and are used

Yu, Chansu

398

Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network  

E-Print Network [OSTI]

of Education, Taiwan (contract numbers 89-E- FA04-4, 89-E-FA04-1-4, and 89-H-FA07-1-4). Part of this work communicate directly in a single-hop fashion. Otherwise, a route consisting of several relaying hosts and relay messages. Routing has been studied inten- sively under a MANET environment (e.g., unicast [2, 3, 6

Tseng, Yu-Chee

399

Energy-Efficient Geographic Routing in Ad-hoc Wireless Networks  

E-Print Network [OSTI]

derive the optimal node transmission range, and then we propose the Optimal Range Forward (ORF) algorithm based on the optimal transmission range, which minimizes the total energy consumption of the transmission (summation of energy consumption of all hops). Furthermore, based on ORF, we propose the Optimal

Haddadi, Hamed

400

The slow start power controlled MAC protocol for mobile ad hoc networks and its performance analysis  

E-Print Network [OSTI]

is achieved by allowing more transmissions to take place simultaneously. The slow start principle used energy consumption and increase network throughput and lifetime. In our scheme the transmission power used for the RTS frames is not constant, but follows a slow start principle. The CTS frames, which

Varvarigo, Emmanouel "Manos"

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

A Framework for Throughput and Energy Efficiency in Mobile ad Hoc Networks  

E-Print Network [OSTI]

throughput and energy consumption - while maintaining connectivity. As an application, we evaluate two well on exhaustible power sources, such as batteries, and hence have strict requirements on the energy consumption networks which allows us to compare the average energy and time cost of different networks but exhibiting

Paris-Sud XI, Université de

402

A Transparent Collaborative Integration Approach for Ad Hoc Product Data Jingzhi Guo  

E-Print Network [OSTI]

> energyConsumption>228 kw/h/yearenergyConsumption> and SME2 (seller) encodes-commerce interoperable business systems. Core to this issue is how to maintain semantic consistency between heterogeneous. Introduction Product data integration [3] is an essential issue for many e-commerce interoperable systems. Core

Guo, Jingzhi

403

Cross-Layer Designs Architecture for LEO Satellite Ad Hoc Network  

E-Print Network [OSTI]

, the Netherlands Telephone:. +31 15 278 6177 {zhijiangchang,georgi}@ce.et.tudelft.nl Abstract. Future Low Earth

Kuzmanov, Georgi

404

Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks the Static Case  

E-Print Network [OSTI]

.8 - Mobile and Wireless Communications, Venice, Italy, Sep 23-25, 2003. c Lecture Notes of Computer Science based on different energy classes. In this paper, we study the problem of cooperation for the most basic

Bencsáth, Boldizsár

405

On the Optimal Number of Hops in Linear Wireless Ad Hoc Networks with Hybrid ARQ  

E-Print Network [OSTI]

Processing New Jersey Institute of Technology, Newark, New Jersey 07102-1982, USA e-mail: {iss2, osvaldo.simeone, yeheskel.barness}@njit.edu 2Next Generation System Research Team, Telecommunication R&D Center Samsung) protocols in a quasi-static fading envi- ronment. Data transmission is assumed to be delay-tolerant up

Yener, Aylin

406

Asplund et al. Wireless Ad Hoc Dissemination for Search and Rescue Proceedings of the 7th  

E-Print Network [OSTI]

is now fully decentralized and relies on text communication to achieve energy efficiency. Keywords FOSS, an issue for discussion, a case study, best practice or other matters of interest and has been reviewed

407

Performance Comparison of Two Location Based Routing Protocols for Ad Hoc Networks  

E-Print Network [OSTI]

Boleng, Brad Williams, Lucas Wilcox, William Navidi Department of Math. and Computer Sciences Colorado that floods all data packets). We used NS-2 to simulate 50 nodes moving according to the random waypoint model a flooding protocol. Second, promis- cuous mode operation improves the performance of DSR significantly

Wilcox, Lucas C.

408

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property  

E-Print Network [OSTI]

be tested in polynomial time and is monotone [1], to minimize the maximum assigned power. We also give, they communicate through multi-hop wireless links by using intermediate nodes to relay the message. Larger distance uv . In other words, wuv > wxy if uv > xy and wuv = wxy if uv = xy . For example

Li, Xiang-Yang

409

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property  

E-Print Network [OSTI]

be tested in polynomial time, to minimize the maximum assigned power. We also give polynomial time through multi-hop wireless links by using intermediate nodes to relay the message. Generally, nodes nodes u and v is a monotone increasing function of the Euclidean #12;distance uv . In other words, wuv

Li, Xiang-Yang

410

Efficient Broadcasting using Packet History in Mobile Ad-Hoc Spiros Agathos1  

E-Print Network [OSTI]

this problem. Among them, the class of algorithms that construct on-demand a connected dominating set, known, protocols used in wired networks cannot be ported in wireless networks due to mobility and the nature [3] and made clear that the limited bandwidth and energy resources necessitate the design

Papapetrou, Evaggelos

411

A novel architecture for multihops routing ad hoc underwater acoustic sensor networking  

Science Journals Connector (OSTI)

Underwater acoustic communication networks are an innovative issue which faces difficult medium problems such as long propagation time and dynamic network topology. In addition due to high error probabilities typical for this channel it is preferred to use anti collision network mechanism. Because of the long propagation time methods such as CTS/RTS requiring transmissions of pre?messages achieve relatively low network efficiency. Moreover TDMA methods do not utilize the network resources allowing reuse in the code domain (using CDMA) and in the spatial domain in case of nonhomogenic network topology which includes obstructions in the acoustic line of sight. In this paper we introduce a network concept based on the CDMA method confronting the acoustic underwater network challenges such as the near?far problem fast time varying topology multihops routing and message distribution protection. Using this concept a sea trial including broadcast multicast and unicast transmissions of SMS and navigation control messages was carried out in various scenarios including multihops near the shores of Israel. We present results from this sea trial demonstrating the efficacy of the proposed networking scheme.

Roee Diamant; Azriel Sinai

2008-01-01T23:59:59.000Z

412

Proceedings of the AD HOC Workshop on Ceramics for Li/FeS{sub 2} batteries  

SciTech Connect (OSTI)

Representatives from industry, the U.S. Advanced Battery Consortium (USABC), DOE, national laboratories, and other govt agencies met to develop recommendations and actions for accelerating the development of ceramic components critical to the successful introduction of the Li/FeS{sub 2} bipolar battery for electric vehicles. Most of the workshop is devoted to electrode materials, bipolar designs, separators, and bipolar plates. The bulk of this document is viewographs and is divided into: ceramics, USABC overview, SAFT`s Li/FeS{sub 2} USABC program, bipolar Li/FeS{sub 2} component development, design requirements for bipolar plates, separator design requirements, compatibility of ceramic insulators with lithium, characterization of MgO for use in separators, resistivity measurements of separators, sintered AlN separators for LiMS batteries, etc.

Not Available

1993-12-31T23:59:59.000Z

413

Protocols for multi-antenna ad-hoc wireless networking in interference environments  

E-Print Network [OSTI]

A fundamental question for the design of future wireless networks concerns the nature of spectrum management and the protocols that govern use of the spectrum. In the oligopoly model, spectrum is owned and centrally managed, ...

Hinton, Danielle A. (Danielle Ayodele), 1978-

2010-01-01T23:59:59.000Z

414

Ad Lucem Workshop Welcome  

Broader source: Energy.gov [DOE]

This presentation summarizes the information given by DOE during the DOE Ad Lucem workshop, Feb. 17, 2012.

415

Flowing from $AdS_5$ to $AdS_3$ with $T^{1,1}$  

E-Print Network [OSTI]

We construct supersymmetric domain wall solutions of type IIB supergravity that interpolate between $AdS_5\\times T^{1,1}$ in the UV and $AdS_3\\times\\mathbb{R}^2\\times S^2\\times S^3$ solutions in the IR. The $\\mathbb{R}^2$ factor can be replaced with a two-torus and then the solution describes a supersymmetric flow across dimensions, similar to wrapped brane solutions. While the domain wall solutions preserve $(0,2)$ supersymmetry, the $AdS_3$ solutions in the IR have an enhanced $(4,2)$ superconformal supersymmetry and are related by two T-dualities to the $AdS_3\\times S^3\\times S^3\\times S^1$ type IIB solutions which preserve a large $(4,4)$ superconformal supersymmetry. The domain wall solutions exist within the $N=4$ $D=5$ gauged supergravity theory that is obtained from a consistent Kaluza-Klein truncation of type IIB supergravity on $T^{1,1}$; a feature driving the flows is that two $D=5$ axion like fields, residing in the $N=4$ Betti multiplet, depend linearly on the two legs of the $\\mathbb{R}^2$ factor.

Aristomenis Donos; Jerome P. Gauntlett

2014-04-28T23:59:59.000Z

416

Hadronization at the AdS wall  

E-Print Network [OSTI]

We describe hadronization events, using the AdS/CFT Correspondence, which display many of the qualitative features expected in QCD. In particular we study the motion of strings with separating end points in a back-reacted hard wall geometry. The solutions show the development of a linear QCD-like string. The end points oscillate in the absence of string breaking. We introduce string breaking by hand and evolve the new state forward in time to observe the separation of two string segments. A kink associated with this breaking evolves to the end points of the string inducing rho meson production. We explicitly compute the rho meson production at the end point.

Nick Evans; James French; Kristan Jensen; Ed Threlfall

2009-08-04T23:59:59.000Z

417

Conserved Charges in Asymptotically (Locally) AdS Spacetimes  

E-Print Network [OSTI]

We review issues related to conservation laws for gravity with a negative cosmological constant subject to asymptotically (locally) anti-de Sitter boundary conditions. Beginning with the empty AdS spacetime, we introduce asymptotically (locally) AdS (AlAdS) boundary conditions, important properties of the boundary metric, the notion of conformal frames, and the Fefferman-Graham expansion. These tools are used to construct variational principles for AlAdS gravity, to more properly define the notion of asymptotic symmetry, and to construct the associated boundary stress tensor. The resulting conserved charges are shown to agree (up to possible choices of zero-point) with those built using Hamiltonian methods. Brief comments are included on AdS positive energy theorems and the appearance of a central extension of the AdS$_3$ asymptotic symmetry algebra. We also describe the algebra of boundary observables and introduce the anti-de Sitter/Conformal Field Theory (AdS/CFT) correspondence using only tools from gravitational physics (and without other input from string theory). Our review focuses on motivations, current status, and open issues as opposed to calculational details. We emphasize the relativist (as opposed to particle physics) perspective and assume as background a standard graduate course in general relativity.

Sebastian Fischetti; William Kelly; Donald Marolf

2014-04-24T23:59:59.000Z

418

Wilson lines for AdS_5 black strings  

E-Print Network [OSTI]

We describe a simple method of extending AdS_5 black string solutions of 5d gauged supergravity in a supersymmetric way by adding Wilson lines along the string direction. Due to the specific form of 5d supergravity that features Chern-Simons terms, the existence of magnetic charges automatically generates conserved electric charges upon the addition of such Wilson lines in a 5d analogue of the Witten effect. Therefore we find a rather generic, model-independent way of adding electric charges to already existing solutions with no backreaction from the geometry or breaking of any symmetry. We use this method to explicitly write down a more general version of the Benini-Bobev black strings and comment on the implications for the dual field theory and the similarities with generalizations of the Cacciatori-Klemm black holes in AdS_4.

Kiril Hristov; Stefanos Katmadas

2014-11-10T23:59:59.000Z

419

Load Aware Broadcast in Mobile Ad Hoc Networks Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, and Ashikur Rahman  

E-Print Network [OSTI]

, and Ashikur Rahman Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-1000, Bangladesh Email: tanviralamin@gmail.com, {sukarna barua, sudipcse03}@yahoo number of packet forwards low. Detailed simulation using ns-2 shows fair scheduling of resources

Rahman, A.K.M. Ashikur

420

A Spatial Analysis of Mobility Models: Application to Wireless Ad Hoc Network D. Charles Engelhart1,2  

E-Print Network [OSTI]

in various US cities. Portland MPO is, in fact, already using TRANSIMS for its day to day traffic planning these enhanced models with the TRANSIMS data as well as the random walk and standard random way-point models and the spatial distributions of nodes over the space were analyzed and compared to the TRANSIMS data in order

Sivasubramaniam, Anand

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

The Mini-Grid Framework: Application Programming Support for Ad-Hoc, Peer-to-Peer Volunteer Grids  

Science Journals Connector (OSTI)

Biological scientists work with bioinformatics algorithms that are either computational or data intensive in nature. Distributed platforms such as Grids and Peer-to-Peer (P2P) networks can be used for such algori...

Jakob E. Bardram; Neelanarayanan Venkataraman

2010-01-01T23:59:59.000Z

422

SmartNode: Achieving 802.11 MAC Interoperability in Power-efficient Ad Hoc Networks with Dynamic Range Adjustments  

E-Print Network [OSTI]

, energy conservation may be achieved by dynamically adjusting transmission ranges on the fly at each node Range Adjustments Edmond Poon, Baochun Li£ Abstract The standard CSMA/CA based IEEE 802.11 protocol as conservation and higher system throughput through better spatial reuse of spectrum. In this work, we propose

Li, Baochun

423

A Bandwidth-Based Power-Aware Routing Protocol with Low Route Discovery Overhead in Mobile Ad hoc Networks  

Science Journals Connector (OSTI)

......protocol, where the power consumed by listening to the transmission of a packet is represented...equipped with the IEEE 802.11b wireless device. Measuring the distance-to-bandwidth...equipped with the IEEE 802.11b wireless device. However, if a specific distance is......

Chuan-Chi Weng; Ching-Wen Chen; Chang-Jung Ku; Shiow-Fen Hwang

2010-09-01T23:59:59.000Z

424

Geocasting in Mobile Ad Hoc Networks: Location-Based Multicast Algorithms Young-Bae Ko and Nitin H. Vaidya  

E-Print Network [OSTI]

two different al- gorithms for delivering packets to such a group, and present simulation results. 1 flooding or multicast tree- based approach. Existing multicast protocols [5, 10, 11, 21], mainly based is nontrivial, sometimes, multicast flooding may be considered as an alternative ap- proach for multicasting

Vaidya, Nitin

425

1906 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 11, NOVEMBER 2005 Minimum-Energy Multicast in Mobile Ad Hoc  

E-Print Network [OSTI]

in polynomial time, in sharp con- trast with the NP-hardness of constructing the minimum-energy multicast tree with a single tree is presented. The minimum energy-per-bit for multicasting with routing is found by an integer in the Steiner tree literature, can now be interpreted as the optimization for minimum energy multicasting

Chen, Yuanzhu Peter

426

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY 2007 1333 Multicast Communications in Ad Hoc  

E-Print Network [OSTI]

energy required to maintain a tree (broadcast/multicast) [2], [4], [5], [13], [24], [25], and the other- sioned with limited energy. We are interested in an online routing algorithm for successive multicast energy. The theoretical results and routing algorithm in this paper offer some important insights

Hou, Y. Thomas

427

Multi-Cluster Protocol for Ad Hoc Mobile Underwater Acoustic Networks Francisco Salv-Garau and Milica Stojanovic  

E-Print Network [OSTI]

of connectivity, successful transmission rate, average delay and energy consumption. Simulation analysis is used of network design is on a scalable multiple access technique which is applicable to varying coverage areas Underwater Vehicles. I. INTRODUCTION Autonomous operations future naval capability (AOFNC) calls

Stojanovic, Milica

428

Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, Nos. 1/2, 2005 47 Copyright 2005 Inderscience Enterprises Ltd.  

E-Print Network [OSTI]

. In such networks, the data must be stored in the network. Thus, in addition to battery power, storage is a primary samples. We explore the use of collaborative storage techniques to efficiently manage data in storage Enterprises Ltd. Collaborative storage management in sensor networks Sameer Tilak* and Nael B. Abu

Heinzelman, Wendi

429

Abstract--Securing multicast communications in Mobile Ad Hoc Networks (MANET) is considered among the most challenging  

E-Print Network [OSTI]

with the requirement to design secure KM schemes that achieve better performance than existing ones (either for wire-line difficulties in establishing a secure framework suitable for such services. The design of efficient key no nodes with special capabilities exist, b) produce considerably lower overhead for the network nodes

Baras, John S.

430

Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network Yu-Chee Tseng1  

E-Print Network [OSTI]

of relaying packets for other nodes. A MANET has the merit that it is quickly deployable. Applications for Promoting Aca- demic Excellence of Universities under grant numbers A-91-H-FA07-1-4 and 89-E-FA04

Tseng, Yu-Chee

431

A TwoTier Heterogeneous Mobile Ad Hoc Network Architecture and Its LoadBalance Routing Problem  

E-Print Network [OSTI]

­sponsored by the MOE Program for Promoting Academic Excellence of Universities under grant numbers A­91­H­FA07 Relaying Systems (iCAR) is proposed to dyna

Tseng, Yu-Chee

432

A Layer-2 Framework for Interconnecting Ad Hoc Networks to Fixed Internet: Test-bed Implementation and Experimental Evaluation  

Science Journals Connector (OSTI)

......main problem to solve and support the Intranet connectivity is to guarantee that each...be considered as a special case of the Intranet connectivity explained above. The only...this timer expiration, node MN4 has to rebuild its routing table, and this may require......

E. Ancillotti; R. Bruno; M. Conti; E. Gregori; A. Pinizzotto

2007-07-01T23:59:59.000Z

433

An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution in Mobile Ad Hoc Networks1  

E-Print Network [OSTI]

An Energy-Aware Simulation Model and Transaction Protocol for Dynamic Workload Distribution California {tari, prong, pedram}@usc.edu Abstract This paper introduces a network simulation model

Pedram, Massoud

434

Spiky Strings on AdS(4) X CP**3  

E-Print Network [OSTI]

We study a giant magnon and a spike solution for the string rotating on AdS(4) X CP**3 geometry. We consider rigid rotating fundamental string in the SU(2) X SU(2) sector inside the CP**3 and find out the general form of all the conserved charges. We find out the dispersion relation corresponding to both the known giant magnon and the new spike solutions. We further study the finite size correction in both cases.

Bum-Hoon Lee; Kamal L. Panigrahi; Chanyong Park

2008-07-16T23:59:59.000Z

435

C-AD Contact List  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

C-AD Organization Chart C-AD Organization Chart IFM North Organization Chart Information Contact Personnel C-AD Committees Meeting Room Reservation Technical Notes Status Information Operating Schedules Scheduling Physicist RHIC-AGS Machine Status RHIC Broadcast Accelerator Performances Department Contact Personnel Chair: Thomas Roser Associate Chair for Accelerators: Wolfram Fischer Associate Chair for Experiment Support & Facilities: Philip Pile Associate Chair for Accelerator R&D: Ilan Ben-Zvi Associate Chair for ESSHQ: Edward Lessard Assistant Chair for Administration: Stephanie LaMontagne Associate Chair for Accelerator Applications & Education: Derek I. Lowenstein Chief Electrical Engineer: Jon Sandberg Chief Mechanical Engineer: Joseph Tuozzolo Administrative Assistant: Lynanne DiFilippo

436

Kaolin AD | Open Energy Information  

Open Energy Info (EERE)

Kaolin AD Kaolin AD Jump to: navigation, search Name Kaolin AD Place Senovo, Bulgaria Zip 7038 Sector Solar Product Kaolin is Europe's fourth largest producer of silica sands and owns a Bulgarian solar power producer Solaria. Coordinates 43.650002°, 26.366699° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":43.650002,"lon":26.366699,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

437

Ad Building demolition, recycling completed  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ad Building demolition, recycling completed Ad Building demolition, recycling completed Ad Building demolition, recycling completed Demolition of the Administration Building helps Los Alamos meet an NNSA directive to reduce its structural footprint, modernize its infrastructure, and provide workers with safe, energy-efficient facilities. October 11, 2011 Demolition of the administration building Demolition of the Administration Building Contact Steve Sandoval Communications Office (505) 665-9206 Email Project finished under budget, ahead of schedule LOS ALAMOS, New Mexico, October 11, 2011-Los Alamos National Laboratory has completed demolition of its former Administration Building. Demolition of the 316,500-square-foot building that was home to seven Laboratory directors was completed five months ahead of the original schedule and

438

On rotating and oscillating four-spin strings in AdS 5 S 5  

Science Journals Connector (OSTI)

We study rigidly rotating strings in AdS 5 S 5 background with one spin along AdS 5 and three angular momenta along S 5.... We find dispersion rel...

Kamal L. Panigrahi; Pabitra M. Pradhan

2012-11-01T23:59:59.000Z

439

Ad Lucem: Modeling Market Transformation Pathways Workshop |...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Pathways Workshop Ad Lucem: Modeling Market Transformation Pathways Workshop This white paper summarizes the information discussed during the Ad Lucem: Modeling Market...

440

Stability of AdS in Einstein Gauss Bonnet Gravity  

E-Print Network [OSTI]

Recently it has been argued that in Einstein gravity Anti-de Sitter spacetime is unstable against the formation of black holes for a large class of arbitrarily small perturbations. We examine the effects of including a Gauss-Bonnet term. In five dimensions, spherically symmetric Einstein-Gauss-Bonnet gravity has two key features: Choptuik scaling exhibits a radius gap, and the mass function goes to a finite value as the horizon radius vanishes. These suggest that black holes will not form dynamically if the total mass/energy content of the space-time is too small, thereby restoring the stability of AdS spacetime. We support this claim with numerical simulations and uncover a rich structure in horizon radii and formation times as a function of perturbation amplitude.

Deppe, Nils; Frey, Andrew; Kunstatter, Gabor

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

The Mixed Phase of Charged AdS Black holes  

E-Print Network [OSTI]

We study the mixed phase of charged AdS black hole and radiation when the total energy is fixed below the threshold to produce a stable charged black hole branch. The phase diagram of the mixed phase is demonstrated for both fixed potential and charge ensemble. In the dual gauge picture, they correspond to the mixed phase of quark-gluon plasma~(QGP) and hadron gas in the fixed chemical potential and density ensemble respectively. In the nuclei and heavy ion collisions at intermediate energies, the mixed phase of exotic QGP and hadron gas could be produced. The mixed phase will condensate and evaporate into the hadron gas as the fireball expands.

Piyabut Burikham; Chatchai Promsiri

2014-08-12T23:59:59.000Z

442

Extended supersymmetry in AdS_3 higher spin theories  

E-Print Network [OSTI]

We determine the asymptotic symmetry algebra (for fields of low spin) of the $M\\times M$ matrix extended Vasiliev theories on AdS$_3$ and find that it agrees with the $\\mathcal{W}$-algebra of their proposed coset duals. Previously it was noticed that for $M=2$ the supersymmetry increases from $\\mathcal{N}=2$ to $\\mathcal{N}=4$. We study more systematically this type of supersymmetry enhancements and find that, although the higher spin algebra has extended supersymmetry for all $M\\geq 2$, the corresponding asymptotic symmetry algebra fails to be superconformal except for $M=2$, when it has large $\\mathcal{N}=4$ superconformal symmetry. Moreover, we find that the Vasiliev theories based on $shs^E\\! \\left( \\mathcal{N} \\vert 2, \\mathbb{R} \\right)$ are special cases of the matrix extended higher spin theories, and hence have the same supersymmetry properties.

Constantin Candu; Cheng Peng; Carl Vollenweider

2014-08-21T23:59:59.000Z

443

Extended supersymmetry in AdS_3 higher spin theories  

E-Print Network [OSTI]

We determine the asymptotic symmetry algebra (for fields of low spin) of the $M\\times M$ matrix extended Vasiliev theories on AdS$_3$ and find that it agrees with the $\\mathcal{W}$-algebra of their proposed coset duals. Previously it was noticed that for $M=2$ the supersymmetry increases from $\\mathcal{N}=2$ to $\\mathcal{N}=4$. We study more systematically this type of supersymmetry enhancements and find that, although the higher spin algebra has extended supersymmetry for all $M\\geq 2$, the corresponding asymptotic symmetry algebra fails to be superconformal except for $M=2$, when it has large $\\mathcal{N}=4$ superconformal symmetry. Moreover, we find that the Vasiliev theories based on $shs^E\\! \\left( \\mathcal{N} \\vert 2, \\mathbb{R} \\right)$ are special cases of the matrix extended higher spin theories, and hence have the same supersymmetry properties.

Candu, Constantin; Vollenweider, Carl

2014-01-01T23:59:59.000Z

444

The missing top of AdS resonance structure  

E-Print Network [OSTI]

We study a massless scalar field in AdS_{d+1} with a nonlinear coupling \\phi^N and not limited to spherical symmetry. The free-field-eigenstate spectrum is strongly resonant, and it is commonly believed that the nonlinear coupling leads to energy transfer between eigenstates. We prove that when $Nd$ is even, the most efficient resonant channels to transfer energy are always absent. In particular, for N=3 this means no energy transfer at all. For N=4, this effectively kills half of the channels, leading to the same set of extra conservation laws recently derived for gravitational interactions within spherical symmetry.

Yang, I-Sheng

2015-01-01T23:59:59.000Z

445

On Rotating and Oscillating Four-Spin Strings in AdS5 X S5  

E-Print Network [OSTI]

We study rigidly rotating strings in AdS5 X S5 background with one spin along AdS5 and three angular momenta along S5. We find dispersion relations among various charges and interpret them as giant magnon and spiky string solutions in various limits. Further we present an example of oscillating string which oscillates in the radial direction of the AdS5 and at the same time rotates in S5.

Kamal L. Panigrahi; Pabitra M. Pradhan

2012-06-21T23:59:59.000Z

446

On Rotating and Oscillating Four-Spin Strings in AdS5 X S5  

E-Print Network [OSTI]

We study rigidly rotating strings in AdS5 X S5 background with one spin along AdS5 and three angular momenta along S5. We find dispersion relations among various charges and interpret them as giant magnon and spiky string solutions in various limits. Further we present an example of oscillating string which oscillates in the radial direction of the AdS5 and at the same time rotates in S5.

Panigrahi, Kamal L

2012-01-01T23:59:59.000Z

447

ARM - Value-Added Product Status Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Status Reports Status Reports Publications Journal Articles Conference Documents Program Documents Technical Reports Publications Database Public Information Materials Image Library Videos Publication Resources Submit a Publication Publishing Procedures ARM Style Guide (PDF, 448KB) Acronyms Glossary Logos Contacts RSS for Publications Value-Added Product Status Reports ARM Climate Research Facility Quarterly Value-Added Product Report July 1-September 30, 2013 (PDF, 1MB) ARM Climate Research Facility Quarterly Value-Added Product Report April 1-June 30, 2013 (PDF, 1MB) ARM Climate Research Facility Quarterly Value-Added Product Report January 1-March 31, 2013 (PDF, 268KB) ARM Climate Research Facility Quarterly Value-Added Product Report October 1-December 31, 2012 (PDF, 271KB) ARM Climate Research Facility Quarterly Value-Added Product Report

448

Ad Lucem Workshop: Modeling Breakout Session  

Broader source: Energy.gov [DOE]

This presentation summarizes the information discussed during the modeling breakout session of the DOE Ad Lucem Workshop on Feb. 17, 2012.

449

AdS (In)stability: Lessons From The Scalar Field  

E-Print Network [OSTI]

We argued in arXiv:1408.0624 that the quartic scalar field in AdS has features that could be instructive for answering the gravitational stability question of AdS. Indeed, the conserved charges identified there have recently been observed in the full gravity theory as well. In this paper, we continue our investigation of the scalar field in AdS and provide evidence that in the Two-Time Formalism (TTF), even for initial conditions that are far from quasi-periodicity, the energy in the higher modes at late times is exponentially suppressed in the mode number. Based on this and some related observations, we argue that there is no thermalization in the scalar TTF model within time-scales that go as $\\sim 1/\\epsilon^2$, where $\\epsilon$ measures the initial amplitude (with only low-lying modes excited). It is tempting to speculate that the result holds also for AdS collapse.

Basu, Pallab; Subramanian, P N Bala

2015-01-01T23:59:59.000Z

450

Near Flat Space limit of strings on AdS_4 x CP^3  

E-Print Network [OSTI]

The non-linear nature of string theory on non-trivial backgrounds related to the AdS/CFT correspondence suggests to look for simplifications. Two such simplifications proved to be useful in studying string theory. These are the pp-wave limit which describes point-like strings and the so called "near flat space" limit which connects two different sectors of string theory -- pp-waves and "giant magnons". Recently another example of AdS/CFT duality emerged - $AdS_4/CFT_3$, which suggests duality between $\\mathcal N=6$ CS theory and superstring theory on $AdS_4\\times \\cp$. In this paper we study the "near flat space" limit of strings on the $AdS_4\\times \\cp$ background and discuss possible applications of the reduced theory.

M. Kreuzer; R. C. Rashkov; M. Schimpf

2008-10-11T23:59:59.000Z

451

On the rotating and oscillating strings in (AdS 3 S 3) ?  

Science Journals Connector (OSTI)

We study rigidly rotating strings in the ?-deformed AdS 3 S 3...background. We find out two classes of solutions corresponding to the giant magnon and single spike solutions of t...

Aritra Banerjee; Kamal L. Panigrahi

2014-09-01T23:59:59.000Z

452

This full text paper was peer reviewed and appeared in the Proc. of the IEEE ICC 2011 proceedings Robust Clustering of Ad-hoc Cognitive Radio  

E-Print Network [OSTI]

technology to solve the spectrum scarcity problem [1]. In CR systems, primary users access their allocated to be coordinated within a set of CR users to enable clean results. This typically requires all CR users1 within Network Performance Group, UMIC Research Center, RWTH Aachen University, Germany, {li

Gross, James

453

1590 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 8, OCTOBER 2007 Location-Aware Services over Vehicular Ad-Hoc  

E-Print Network [OSTI]

the vehicle itself can be used as a source of electric power. Last, but not least, an important challenge Florides, Tamer Nadeem, and Liviu Iftode Abstract-- Recent advances in wireless inter-vehicle commu opportunities for the deployment of a wide variety of applications and services to vehicles. In this work, we

Pallis, George

454

Abstract--In an incident scene ad hoc network, mobility of on-scene first responders induces dynamic topology for their  

E-Print Network [OSTI]

of factors, such as transportation, environmental, and operational factors. Our second goal is to determine. The set of parameters we suggest includes both personnel and event characteristics. We also show in simulation or to train synthetic models. Despite its authenticity, directly using traces has the following

Nahrstedt, Klara

455

The Critical Grid Size and Transmission Radius for Local-Minimum-Free Grid Routing in Wireless Ad Hoc and Sensor Networks  

Science Journals Connector (OSTI)

......and let l denote the grid size and r the transmission...wireless sensor networks; grid routing; local minima...pre-established network infrastructure. The devices form a...Several two-level hybrid geographical routing...frequently. As to the grid routing, Ye et al......

Chih-Wei Yi; Peng-Jun Wan; Chao-Min Su; Chen-Wei Huang

2010-12-01T23:59:59.000Z

456

Abstract--Emerging ad-hoc wireless sensor nodes and other micro-scale applications demand long operational lives, small form  

E-Print Network [OSTI]

fuel cells (FCs) excel. Although various control strategies for energy flow between batteries and FCs and control energy flow between batteries and macro-scale FCs with constant, time-independent fuel flow, fuel with conventional battery technologies. Efficient, power-moded, fully integrated systems inherently demand high peak

Rincon-Mora, Gabriel A.

457

Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots  

Science Journals Connector (OSTI)

With the advancement in communication technology, the robotic researchers started to think in the direction of developing the co-operative mobile robot. These robots can co-operate with each other in ... in infra...

Rajesh P. Barnwal; Arnab Thakur

2012-01-01T23:59:59.000Z

458

Brick Walls and AdS/CFT  

E-Print Network [OSTI]

We discuss the relationship between the bulk-boundary correspondence in Rehren's algebraic holography (and in other 'fixed-background' approaches to holography) and in mainstream 'Maldacena AdS/CFT'. Especially, we contrast the understanding of black-hole entropy from the viewpoint of QFT in curved spacetime -- in the framework of 't Hooft's 'brick wall' model -- with the understanding based on Maldacena AdS/CFT. We show that the brick-wall modification of a Klein Gordon field in the Hartle-Hawking-Israel state on 1+2-Schwarzschild AdS (BTZ) has a well-defined boundary limit with the same temperature and entropy as the brick-wall-modified bulk theory. One of our main purposes is to point out a close connection, for general AdS/CFT situations, between the puzzle raised by Arnsdorf and Smolin regarding the relationship between Rehren's algebraic holography and mainstream AdS/CFT and the puzzle embodied in the 'correspondence principle' proposed by Mukohyama and Israel in their work on the brick-wall approach to black hole entropy. Working on the assumption that similar results will hold for bulk QFT other than the Klein Gordon field and for Schwarzschild AdS in other dimensions, and recalling the first author's proposed resolution to the Mukohyama-Israel puzzle based on his 'matter-gravity entanglement hypothesis', we argue that, in Maldacena AdS/CFT, the algebra of the boundary CFT is isomorphic only to a proper subalgebra of the bulk algebra, albeit (at non-zero temperature) the (GNS) Hilbert spaces of bulk and boundary theories are still the 'same' -- the total bulk state being pure, while the boundary state is mixed (thermal). We also argue from the finiteness of its boundary (and hence, on our assumptions, also bulk) entropy at finite temperature, that the Rehren dual of the Maldacena boundary CFT cannot itself be a QFT and must, instead, presumably be something like a string theory.

Bernard S. Kay; L. Ortiz

2014-05-22T23:59:59.000Z

459

Adding New Words into A Chinese Thesaurus  

Science Journals Connector (OSTI)

In this paper, we study the problem of adding a large number of new words into a Chinese thesaurus according to their definitions in a Chinese ... of defining formats for each class in the thesaurus, which tries ...

Ji Donghong; Gong Junping; Huang Changning

460

Adding more value to natural gas  

Science Journals Connector (OSTI)

Adding more value to natural gas ... Calif, has developed a catalyst that could convert natural gas. ... Natural gas is abundant in many countries but not used widely as a feedstock because transporting it is very expensive. ...

MAUREEN ROUBI

1998-04-27T23:59:59.000Z

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

QCD Condensates and Holographic Wilson Loops for Asymptotically AdS Spaces  

SciTech Connect (OSTI)

The minimization of the Nambu-Goto (NG) action for a surface whose contour defines a circular Wilson loop of radius a placed at a finite value of the coordinate orthogonal to the border is considered. This is done for asymptotically AdS spaces. The condensates of dimension n = 2, 4, 6, 8, and 10 are calculated in terms of the coefficients in the expansion in powers of the radius a of the on-shell subtracted NG action for small a->0. The subtraction employed is such that it presents no conflict with conformal invariance in the AdS case and need not introduce an additional infrared scale for the case of confining geometries. It is shown that the UV value of the gluon condensates is universal in the sense that it only depends on the first coefficients of the difference with the AdS case.

Quevedo, R. Carcasses [Instituto Balseiro, Centro Atomico Bariloche, 8400 San Carlos de Bariloche (Argentina); CONICET, Rivadavia 1917, 1033 Buenos Aires (Argentina); Goity, Jose L. [Hampton University, Hampton, VA 23668 (United States); Thomas Jefferson National Accelerator Facility, Newport News, VA (United States); Trinchero, Roberto C. [Instituto Balseiro, Centro Atomico Bariloche, 8400 San Carlos de Bariloche (Argentina); CONICET, Rivadavia 1917, 1033 Buenos Aires (Argentina)

2014-02-01T23:59:59.000Z

462

PP-waves in AdS Gauged Supergravities and Supernumerary Supersymmetry  

E-Print Network [OSTI]

Purely gravitational pp-waves in AdS backgrounds are described by the generalised Kaigorodov metrics, and they generically preserve 1/4 of the maximum supersymmetry allowed by the AdS spacetimes. We obtain 1/2 supersymmetric purely gravitational pp-wave solutions, in which the Kaigorodov component is set to zero. We construct pp-waves in AdS gauged supergravities supported by a vector field. We find that the solutions in D=4 and D=5 can then preserve 1/2 of the supersymmetry. Like those in ungauged supergravities, the supernumerary supersymmetry imposes additional constraints on the harmonic function associated with the pp-waves. These new backgrounds provide interesting novel features of the supersymmetry enhancement for the dual conformal field theory in the infinite-momentum frame.

J. Kerimo; H. Lu

2005-03-23T23:59:59.000Z

463

Ad-Venta | Open Energy Information  

Open Energy Info (EERE)

Ad-Venta Ad-Venta Jump to: navigation, search Logo: Ad-Venta Name Ad-Venta Address 190 allée de Bourgogne Place Bourg de Péage Zip 26300 Country France Sector Hydrogen Product Hydrogen storage (on board) Year founded 2006 Company Type For Profit Company Ownership Private Small Business Yes Affiliated Companies HyCan Website http://www.ad-venta.com Coordinates 45.040419°, 5.0509480000001° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":45.040419,"lon":5.0509480000001,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

464

Addendum Added to Innovative Demonstration of Geothermal Energy...  

Broader source: Energy.gov (indexed) [DOE]

Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA Addendum Added to Innovative Demonstration of Geothermal Energy Production FOA July 2, 2010 - 2:13pm...

465

A landscape of non-supersymmetric AdS vacua on coset manifolds  

E-Print Network [OSTI]

We construct new families of non-supersymmetric sourceless type IIA AdS4 vacua on those coset manifolds that also admit supersymmetric solutions. We investigate the spectrum of left-invariant modes and find that most, but not all, of the vacua are stable under these fluctuations. Generically, there are also no massless moduli.

Paul Koerber; Simon Kors

2010-05-10T23:59:59.000Z

466

Holographic Thermalization, stability of AdS, and the Fermi-Pasta-Ulam-Tsingou paradox  

E-Print Network [OSTI]

For a real massless scalar field in general relativity with a negative cosmological constant, we uncover a large class of spherically symmetric initial conditions that are close to AdS, but whose numerical evolution does not result in black hole formation. According to the AdS/CFT dictionary, these bulk solutions are dual to states of a strongly interacting boundary CFT that fail to thermalize at late times. Furthermore, as these states are not stationary, they define dynamical CFT configurations that do not equilibrate. We develop a two-timescale perturbative formalism that captures both direct and inverse cascades of energy and agrees with our fully nonlinear evolutions in the appropriate regime. We also show that this formalism admits a large class of quasi-periodic solutions. Finally, we demonstrate a striking parallel between the dynamics of AdS and the classic Fermi-Pasta-Ulam-Tsingou problem.

Venkat Balasubramanian; Alex Buchel; Stephen R. Green; Luis Lehner; Steven L. Liebling

2014-03-25T23:59:59.000Z

467

Recurrence Relations for Finite-Temperature Correlators via AdS2/CFT1  

E-Print Network [OSTI]

This note is aimed at presenting a new algebraic approach to momentum-space correlators in conformal field theory. As an illustration we present a new Lie-algebraic method to compute frequency-space two-point functions for charged scalar operators of CFT1 dual to AdS2 black hole with constant background electric field. Our method is based on the real-time prescription of AdS/CFT correspondence, Euclideanization of AdS2 black hole and projective unitary representations of the Lie algebra sl(2,R) \\oplus sl(2,R). We derive novel recurrence relations for Euclidean CFT1 two-point functions, which are exactly solvable and completely determine the frequency- and charge-dependences of two-point functions. Wick-rotating back to Lorentzian signature, we obtain retarded and advanced CFT1 two-point functions that are consistent with the known results.

Ohya, Satoshi

2013-01-01T23:59:59.000Z

468

Recurrence Relations for Finite-Temperature Correlators via AdS$_{2}$/CFT$_{1}$  

E-Print Network [OSTI]

This note is aimed at presenting a new algebraic approach to momentum-space correlators in conformal field theory. As an illustration we present a new Lie-algebraic method to compute frequency-space two-point functions for charged scalar operators of CFT$_{1}$ dual to AdS$_{2}$ black hole with constant background electric field. Our method is based on the real-time prescription of AdS/CFT correspondence, Euclideanization of AdS$_{2}$ black hole and projective unitary representations of the Lie algebra $\\mathfrak{sl}(2,\\mathbb{R}) \\oplus \\mathfrak{sl}(2,\\mathbb{R})$. We derive novel recurrence relations for Euclidean CFT$_{1}$ two-point functions, which are exactly solvable and completely determine the frequency- and charge-dependences of two-point functions. Wick-rotating back to Lorentzian signature, we obtain retarded and advanced CFT$_{1}$ two-point functions that are consistent with the known results.

Satoshi Ohya

2013-09-11T23:59:59.000Z

469

Absorption cross section in warped AdS_3 black hole revisited  

E-Print Network [OSTI]

We investigate the absorption cross section for minimal-coupled scalars in the warped AdS_3 black hole. According to our calculation, the cross section reduces to the horizon area in the low energy limit as usually expected in contrast to what was previously found. We also calculate the greybody factor and find that the effective temperatures for the two chiral CFT's are consistent with that derived from the quasinormal modes. Observing the conjectured warped AdS/CFT correspondence, we suspect that a specific sector of the CFT operators with the desired conformal dimension could be responsible for the peculiar thermal behaviour of the warped AdS_3 black hole.

Hsien-Chung Kao; Wen-Yu Wen

2009-07-31T23:59:59.000Z

470

Vectorial AdS_5/CFT_4 duality for spin-one boundary theory  

E-Print Network [OSTI]

We consider an example of vectorial AdS_5/CFT_4 duality when the boundary theory is described by N free complex or real Maxwell fields. It is dual to a particular ("type C") higher spin theory in AdS_5 containing fields in special mixed-symmetry representations. We extend the study of this theory in arXiv:1410.3273 by deriving the expression for the large N limit of the corresponding singlet-sector partition function on S^1 x S^3. We find that in both complex U(N) and real O(N) invariant cases the form of the one-particle partition function is as required by the AdS/CFT duality. We also demonstrate the matching of the Casimir energy on S^3 by assuming an integer shift in the bulk theory coupling.

Beccaria, M

2014-01-01T23:59:59.000Z

471

AD May 10 14 OSH Programmes Map  

E-Print Network [OSTI]

AD May 10 14 OSH Programmes Map Introduction to all aspects of safety and health at work Certificate in Safety and Health at Work Higher Diploma in Safety, Health and Welfare at Work Question and create knowledge Focus career MSc in Safety, Health and Welfare at Work (Research) or PhD MSc

472

Kode Dansk English AD Andorra ANDORRA  

E-Print Network [OSTI]

Mikronesien MICRONESIA, FEDERATED STATES OF FO Færøerne FAROE ISLANDS FR Frankrig FRANCE GA Gabon GABON GBKode Dansk English AD Andorra ANDORRA AE Forenede Arabiske Emirater UNITED ARAB EMIRATES AF BERMUDA BN Brunei Darussalam BRUNEI DARUSSALAM BO Bolivia BOLIVIA, PLURINATIONAL STATE OF BQ Bonaire, Sint

473

The free energy of N=2 supersymmetric AdS_4 solutions of M-theory  

E-Print Network [OSTI]

We show that general N=2 supersymmetric AdS_4 solutions of M-theory with non-zero M2-brane charge admit a canonical contact structure. The free energy of the dual superconformal field theory on S^3 and the scaling dimensions of operators dual to supersymmetric wrapped M5-branes are expressed via AdS/CFT in terms of contact volumes. In particular, this leads to topological and localization formulae for the coefficient of N^{3/2} in the free energy of such solutions.

Maxime Gabella; Dario Martelli; Achilleas Passias; James Sparks

2011-07-25T23:59:59.000Z

474

Isometry Group Orbit Quantization of Spinning Strings in AdS_3 x S^3  

E-Print Network [OSTI]

Describing the bosonic AdS_3 x S^3 particle and string in SU(1,1) x SU(2) group variables, we provide a Hamiltonian treatment of the isometry group orbits of solutions via analysis of the pre-symplectic form. For the particle we obtain a one-parameter family of orbits parameterized by creation-annihilation variables, which leads to the Holstein-Primakoff realization of the isometry group generators. The scheme is then applied to spinning string solutions characterized by one winding number in AdS_3 and two winding numbers in S^3. We find a two-parameter family of orbits, where quantization again provides the Holstein-Primakoff realization of the symmetry generators with an oscillator type energy spectrum. Analyzing the minimal energy at strong coupling we verify the spectrum of short strings at special values of winding numbers.

Heinze, Martin; Megrelidze, Luka

2014-01-01T23:59:59.000Z

475

Isotropic AdS/CFT fireball  

SciTech Connect (OSTI)

We study the AdS/CFT thermodynamics of the spatially isotropic counterpart of the Bjorken similarity flow in d-dimensional Minkowski space with d{>=}3, and of its generalization to linearly expanding d-dimensional Friedmann-Robertson-Walker cosmologies with arbitrary values of the spatial curvature parameter k. The bulk solution is a nonstatic foliation of the generalized Schwarzschild-AdS black hole with a horizon of constant curvature k. The boundary matter is an expanding perfect fluid that satisfies the first law of thermodynamics for all values of the temperature and the spatial curvature, but it admits a description as a scale-invariant fluid in local thermal equilibrium only when the inverse Hawking temperature is negligible compared with the spatial curvature length scale. A Casimir-type term in the holographic energy-momentum tensor is identified from the threshold of black hole formation and is shown to take different forms for k{>=}0 and k<0.

Kajantie, K. [Helsinki Institute of Physics, P.O. Box 64, FI-00014 University of Helsinki (Finland); Department of Physics, P.O. Box 64, FI-00014 University of Helsinki (Finland); Louko, Jorma [School of Mathematical Sciences, University of Nottingham, Nottingham NG7 2RD (United Kingdom); Tahkokallio, T. [Helsinki Institute of Physics, P.O. Box 64, FI-00014 University of Helsinki (Finland); Department of Physics, P.O. Box 64, FI-00014 University of Helsinki (Finland); Department of Physics and Astronomy, University of Victoria, Victoria, British Columbia, V8W 3P6 (Canada)

2008-12-15T23:59:59.000Z

476

ARM KAZR-ARSCL Value Added Product  

SciTech Connect (OSTI)

The Ka-band ARM Zenith Radars (KAZRs) have replaced the long-serving Millimeter Cloud Radars, or MMCRs. Accordingly, the primary MMCR Value Added Product (VAP), the Active Remote Sensing of CLouds (ARSCL) product, is being replaced by a KAZR-based version, the KAZR-ARSCL VAP. KAZR-ARSCL provides cloud boundaries and best-estimate time-height fields of radar moments.

Michael Jensen

2012-09-28T23:59:59.000Z

477

Adding coal dust to coal batch  

SciTech Connect (OSTI)

The granulometric composition of coke dust from the dry-slaking machine is determined. The influence of additions of 3-7% coke dust on the quality of industrial coking batch and the coke obtained by box coking is estimated. Adding 1% coke dust to coking batch does not markedly change the coke quality. Industrial equipment for the supply of dry-slaking dust to the batch is described.

V.S. Shved; A.V.Berezin [OAO Koks, Kemerovo (Russian Federation)

2009-05-15T23:59:59.000Z

478

Free boundary conditions and the AdS$_3$/CFT$_2$ correspondence  

E-Print Network [OSTI]

We show that the recently proposed free boundary conditions for AdS$_3$ are dual to two-dimensional quantum gravity in certain fixed gauges. In particular, we note that an appropriate identification of the generator of Virasoro transformations leads to a vanishing total central charge in agreement with the theory at the boundary. We argue that this identification is necessary to match the bulk and boundary generators of Virasoro transformations and for consistency with the constraint equations.

Luis Apolo; Massimo Porrati

2014-04-01T23:59:59.000Z

479

On the Rotating and Oscillating strings in $(AdS_3\\times S^3)_{\\varkappa}$  

E-Print Network [OSTI]

We study rigidly rotating strings in the $\\varkappa$-deformed $AdS_3 \\times S^3$ background. We find out two classes of solutions corresponding to the giant magnon and single spike solutions of the string rotating is two $S^2_{\\varkappa}$ subspace of rotations reduced along two different isometries. We verify that the dispersion relations reduce to the well known relation in the $\\varkappa\\rightarrow 0$ limit. We further study some oscillating string solutions in the $S^3_{\\varkappa}$ subspace.

Banerjee, Aritra

2014-01-01T23:59:59.000Z

480

On the Rotating and Oscillating strings in $(AdS_3\\times S^3)_{\\varkappa}$  

E-Print Network [OSTI]

We study rigidly rotating strings in the $\\varkappa$-deformed $AdS_3 \\times S^3$ background. We find out two classes of solutions corresponding to the giant magnon and single spike solutions of the string rotating in two $S^2_{\\varkappa}$ subspace of rotations reduced along two different isometries. We verify that the dispersion relations reduce to the well known relation in the $\\varkappa\\rightarrow 0$ limit. We further study some oscillating string solutions in the $S^3_{\\varkappa}$ subspace.

Aritra Banerjee; Kamal L. Panigrahi

2014-06-13T23:59:59.000Z

Note: This page contains sample records for the topic "thadani ad hoc" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Entropy of near-extremal black holes in AdS5  

SciTech Connect (OSTI)

We construct the microstates of near-extremal black holes in AdS_5 x S5 as gases of defects distributed in heavy BPS operators in the dual SU(N) Yang-Mills theory. These defects describe open strings on spherical D3-branes in the S5, and we show that they dominate the entropy by directly enumerating them and comparing the results with a partition sum calculation. We display new decoupling limits in which the field theory of the lightest open strings on the D-branes becomes dual to a near-horizon region of the black hole geometry. In the single-charge black hole we find evidence for an infrared duality between SU(N) Yang-Mills theories that exchanges the rank of the gauge group with an R-charge. In the two-charge case (where pairs of branes intersect on a line), the decoupled geometry includes an AdS_3 factor with a two-dimensional CFT dual. The degeneracy in this CFT accounts for the black hole entropy. In the three-charge case (where triples of branes intersect at a point), the decoupled geometry contains an AdS_2 factor. Below a certain critical mass, the two-charge system displays solutions with naked timelike singularities even though they do not violate a BPS bound. We suggest a string theoretic resolution of these singularities.

Simon, Joan; Balasubramanian, Vijay; de Boer, Jan; Jejjala, Vishnu; Simon, Joan

2007-07-24T23:59:59.000Z

482

Caf Systems Central Security Access Form  

E-Print Network [OSTI]

and Procurement Tracking Reports (Encumbrances, Delivery, Change Order History) SCH_SUPPLY_CHAIN Ad Hoc Query Runner Ability to run reports created by Ad Hoc Query Authors CAFE_NU_COGNOS_AD_HOC_VIEWERS Ad Hoc Query Author (Training Required) Access to Query Studio to create, build, and save reports CAFE_NU_COGNOS_AD_HOC

Shull, Kenneth R.

483

Rigid Holography and Six-Dimensional N=(2,0) Theories on AdS_5 times S^1  

E-Print Network [OSTI]

Field theories on anti-de Sitter (AdS) space can be studied by realizing them as low-energy limits of AdS vacua of string/M theory. In an appropriate limit, the field theories decouple from the rest of string/M theory. Since these vacua are dual to conformal field theories (CFTs), this relates some of the observables of these field theories on AdS to a subsector of the dual CFTs. We exemplify this `rigid holography' by studying in detail the 6d N=(2,0) A_{K-1} superconformal field theory (SCFT) on AdS_5xS^1, with equal radii for AdS_5 and for S^1. We choose specific boundary conditions preserving sixteen supercharges that arise when this theory is embedded into Type IIB string theory on AdS_5xS^5/Z_K. On R^{4,1}xS^1, this 6d theory has a 5(K-1)-dimensional moduli space, with unbroken 5d SU(K) gauge symmetry at (and only at) the origin. On AdS_5xS^1, the theory has a 2(K-1)-dimensional `moduli space' of supersymmetric configurations. We argue that in this case the SU(K) gauge symmetry is unbroken everywhere in...

Aharony, Ofer; Rey, Soo-Jong

2015-01-01T23:59:59.000Z

484

Adding Insulation to an Existing Home | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Adding Insulation to an Existing Home Adding Insulation to an Existing Home Adding Insulation to an Existing Home May 23, 2013 - 1:44pm Addthis Adding insulation in an existing home saves money and improves comfort. | Photo courtesy of Dennis Schroeder, NREL. Adding insulation in an existing home saves money and improves comfort. | Photo courtesy of Dennis Schroeder, NREL. What does this mean for me? Adding insulation to your home saves money and improves comfort. Adding insulation to your home is a sound investment that is likely pay for itself quickly in reduced utility bills. Insulation inhibits heat flow through the building envelope of your home, saving money and improving comfort. Unless your home was specially constructed for energy efficiency, you can probably reduce your energy bills by adding more insulation. Many older

485

Ad Council Campaign Educates Consumers on Home Energy Efficiency |  

Broader source: Energy.gov (indexed) [DOE]

Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency August 24, 2012 - 12:28pm Addthis This series of PSAs was created as part of the Ad Council campaign on home energy efficiency. It urges consumers to save energy in order to have more money to spend on things like vacations, movie night, date night, and spa day. This series of PSAs was created as part of the Ad Council campaign on home energy efficiency. It urges consumers to save energy in order to have more money to spend on things like vacations, movie night, date night, and spa day. Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency

486

Ad Council Campaign Educates Consumers on Home Energy Efficiency |  

Broader source: Energy.gov (indexed) [DOE]

Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency August 24, 2012 - 12:28pm Addthis This series of PSAs was created as part of the Ad Council campaign on home energy efficiency. It urges consumers to save energy in order to have more money to spend on things like vacations, movie night, date night, and spa day. This series of PSAs was created as part of the Ad Council campaign on home energy efficiency. It urges consumers to save energy in order to have more money to spend on things like vacations, movie night, date night, and spa day. Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency Ad Council Campaign Educates Consumers on Home Energy Efficiency

487

A D2-brane in the Penrose limits of AdS(4)x CP(3)  

E-Print Network [OSTI]

We consider a D2-brane in the pp-wave backgrounds obtained from AdS$_4\\times$CP$^3$ when electric and magnetic fields have been turned on. Upon fixing the light-cone gauge, light-cone Hamiltonian and BPS configurations are obtained. In particular we study BPS configurations with electric dipole on the two sphere giant and a giant graviton rotating in transverse directions. Moreover we show that the gauge field living on the D2-brane is replaced by a scalar field in the light-cone Hamiltonian. We also present a matrix model by regularizing (quantizing) 2-brane theory.

M. Ali-Akbari

2010-05-02T23:59:59.000Z

488

Critical scalar field collapse in AdS_3: an analytic approach  

E-Print Network [OSTI]

We present an analytical solution of a massless scalar field collapsing in a three dimensional space-time with a negative cosmological constant, i.e. asymptotically AdS_3. The Einstein and scalar field equations are formulated using double null Poincare coordinates. Trapping horizons form when a critical parameter is p > 1. There are indications that the horizon radius r_AH scales like r_AH ~ (p-1)^(1/4) and the black hole mass as M ~ r_AH^2 ~ (p-1)^(1/2), i.e. with a critical mass exponent of 1/2.

Baier, Rudolf; Taanila, Olli

2013-01-01T23:59:59.000Z

489

Ad Lucem: Modeling of Market Transformation Pathways Workshop Agenda  

Broader source: Energy.gov [DOE]

This document details the agenda for the DOE Ad Lucem: Modeling of Market Transformation Pathways Workshop on Feb. 17, 2012.

490

Wilson Loops in 3d QFT from D-branes in AdS(4) x CP**3  

E-Print Network [OSTI]

We study the Wilson loops and defects in the three dimensional QFT from the D-branes in the AdS(4) x CP**3 geometry. We find out explicit D-brane configurations in the bulk which correspond to both straight and circular Wilson lines extended to the boundary of AdS(4). We analyze critically the role of boundary contributions to the D2-branes with various topology and to the fundamental string actions.

J. Kluson; Kamal L. Panigrahi

2008-09-19T23:59:59.000Z

491

Revised: 10.08.2012 Bb 9(SP13): Adding a Document p. 1 of 4 Adding a Syllabus  

E-Print Network [OSTI]

Revised: 10.08.2012 Bb 9(SP13): Adding a Document p. 1 of 4 Adding a Syllabus Posting course(SP13): Adding a Document p. 2 of 4 3. Click Build Content and a drop down menu will appear. Under.08.2012 Bb 9(SP13): Adding a Document p. 3 of 4 2. The Link Title is an option and allows you rename the link

Qiu, Weigang

492

Shear Viscosity from AdS Born-Infeld Black Holes  

E-Print Network [OSTI]

We calculate the shear viscosity in the frame of AdS/CFT correspondence for the field theory with a gravity dual of Einstein-Born-Infeld gravity. We find that the ratio of $\\eta/s$ is still the conjectured universal value $1/4\\pi$ at least up to the first order of the Born-Infeld parameter $1/b^2$.

Rong-Gen Cai; Ya-Wen Sun

2008-07-15T23:59:59.000Z

493

Energy-momentum/Cotton tensor duality for AdS4 black holes  

E-Print Network [OSTI]

We consider the theory of gravitational quasi-normal modes for general linear perturbations of AdS4 black holes. Special emphasis is placed on the effective Schrodinger problems for axial and polar perturbations that realize supersymmetric partner potential barriers on the half-line. Using the holographic renormalization method, we compute the energy-momentum tensor for perturbations satisfying arbitrary boundary conditions at spatial infinity and discuss some aspects of the problem in the hydrodynamic representation. It is also observed in this general framework that the energy-momentum tensor of black hole perturbations and the energy momentum tensor of the gravitational Chern-Simons action (known as Cotton tensor) exhibit an axial-polar duality with respect to appropriately chosen supersymmetric partner boundary conditions on the effective Schrodinger wave-functions. This correspondence applies to perturbations of very large AdS4 black holes with shear viscosity to entropy density ratio equal to 1/4\\pi, thus providing a dual graviton description of their hydrodynamic modes. We also entertain the idea that the purely dissipative modes of black hole hydrodynamics may admit Ricci flow description in the non-linear regime.

Ioannis Bakas

2008-12-11T23:59:59.000Z

494

Aerosol Best Estimate Value-Added Product  

SciTech Connect (OSTI)

The objective of the Aerosol Best Estimate (AEROSOLBE) value-added product (VAP) is to provide vertical profiles of aerosol extinction, single scatter albedo, asymmetry parameter, and Angstroem exponents for the atmospheric column above the Central Facility at the ARM Southern Great Plains (SGP) site. We expect that AEROSOLBE will provide nearly continuous estimates of aerosol optical properties under a range of conditions (clear, broken clouds, overcast clouds, etc.). The primary requirement of this VAP was to provide an aerosol data set as continuous as possible in both time and height for the Broadband Heating Rate Profile (BBHRP) VAP in order to provide a structure for the comprehensive assessment of our ability to model atmospheric radiative transfer for all conditions. Even though BBHRP has been completed, AEROSOLBE results are very valuable for environmental, atmospheric, and climate research.

Flynn, C; Turner, D; Koontz, A; Chand, D; Sivaraman, C

2012-07-19T23:59:59.000Z

495

Efficient Oncolysis by a Replicating Adenovirus (Ad) in Vivo Is Critically Dependent on Tumor Expression of Primary Ad Receptors  

Science Journals Connector (OSTI)

...redirect Ads to achieve CAR-independent infection...utility of replication-defective Ad vectors for cancer...to achieve efficient, CAR-independent gene transfer...findings with replication-defective Ad vectors, we hypothesized that a low level of CAR expression on tumor cells...

Joanne T. Douglas; Myunghee Kim; Lucretia A. Sumerel; Delicia E. Carey; and David T. Curiel

2001-02-02T23:59:59.000Z

496

AdS/CFT correspondence beyond its supergravity approximation  

E-Print Network [OSTI]

We will study the AdS/CFT correspondence beyond its supergravity approximation by deforming an effective field theory on AdS by string length scale effects. We will explicitly show that the conformal dimensions of both the relevant and the irrelevant operators receive correction from these string theory effects going beyond its supergravity approximation. However, as is expected from the full string theory on AdS (not just its supergravity approximation) being dual to the $\\mathcal{N}=4$ super-Yang-Mills theory, the conformal dimension of marginal operators do not receive any such corrections.

Mir Faizal; Ahmed Farag Ali; Ali Nassar

2014-05-18T23:59:59.000Z

497

Towards a chiral gauge theory by deconstruction in AdS5  

E-Print Network [OSTI]

We describe an implementation of a deconstructed gauge theory with charged fermions defined on an interval in five dimensional AdS space. The four dimensional slices are Minkowski, and the end slices support four dimensional chiral zero modes. In such a theory, the energy scales warp down as we move along the fifth dimension. If we augment this theory with localized neutral 4-dimensional Majorana fermions on the low energy end, and implement a Higgs mechanism there, we can arrange the theory such that the lightest gauge boson mode and the chiral mode on the wall at the high energy end are parametrically lighter than all the other states in the theory. If this semiclassical construction does not run into problems at the quantum level, this may provide an explicit construction of a chiral gauge theory. Instanton effects are expected to make the gauge boson heavy only if the resulting effective theory is anomalous.

Tanmoy Bhattacharya; Rajan Gupta; Matthew R. Martin; Yuri Shirman; Csaba Csaki; John Terning

2005-10-12T23:59:59.000Z

498

Thermodynamic Volumes for AdS-Taub-NUT and AdS-Taub-Bolt  

E-Print Network [OSTI]

In theories of semi-classical quantum gravity where the cosmological constant is considered a thermodynamic variable, the gravitational mass of a black hole has been shown to correspond to the enthalpy of the thermodynamic system, rather than the energy. We propose that this should be extended to all spacetime solutions, and consider the meaning of this extension of gravitational thermodynamics for the Taub-NUT and Taub-Bolt geometries in four dimensional locally anti-de Sitter spacetime. We present formulae for their thermodynamic volumes. Surprisingly, Taub-NUT has negative volume, for which there is a natural dynamical explanation in terms of the process of formation of the spacetime. A special case corresponds to pure AdS_4 with an S^3 slicing. The same dynamical setting can explain the negative entropy known to exist for these solutions for a range of parameters.

Clifford V. Johnson

2014-08-27T23:59:59.000Z

499

Conformal Transformations and Strings for an Accelerating Quark-Antiquark Pair in AdS3  

E-Print Network [OSTI]

From a simple moving open string solution dual to a moving heavy quark with constant velocity in the Poincare AdS_3 spacetime, we construct an accerlerating open string solution dual to a heavy quark-antiquark pair accelerated in opposite directions by performing the three mappings such as the SL(2,R)_L x SL(2,R)_R isometry transformation, the special conformal transformation and the conformal SO(2,2) transformation. Using the string sigma model action we construct two open string solutions staying in two different regions whose dividing line is associated with the event horizon appeared on the string worldsheet and obtain the accelerating open string solution by gluing two such solutions.

Shijong Ryang

2014-12-08T23:59:59.000Z

500

The Self-dual String Soliton in AdS_4\\times S^7 spacetime  

E-Print Network [OSTI]

We construct self-dual string soliton solutions in $AdS_4\\times S^7$ spacetime, starting from the covariant equations of motion of M5-brane. We study the properties of the solutions and find that their action are linearized, indicating the BPS nature of the solutions, and they have the same electric and magnetic charge. The straight string soliton solution represents the configuration of the membranes ending on M5-brane with a straight string intersection, and it behaves like the spiky solution in flat spacetime. The spherical string soliton solution, which could be related to the straight one by a conformal transformation, represents the membranes ending on M5-brane with a spherical intersection.

Bin Chen

2007-10-13T23:59:59.000Z