12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2015, Dallas, TX, USA, October 19-22, 2015

نویسندگان

  • Ravi Prakash
  • Dajin Wang
چکیده

The 12th IEEE International Conference on Mobile Ad hoc and Sensor Systems (IEEE MASS 2015) will be held in Dallas, Texas, USA, October 19 – 22, 2015. Wireless ad hoc communication, Internet of Things, and mobile computing have applications in a variety of environments, such as smart homes, hospitals, battlefields, and disaster-recovery operations. Wireless sensor and actuator networks are being deployed for enhancing industrial control processes and supply-chains, and for various forms of environmental monitoring. IEEE MASS 2015

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Braving the broadcast storm: infrastructural support for ad hoc routing

Several routing algorithms for mobile ad hoc networks have been proposed in the recent past [Broch et al., The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks, Internet Draft draft-ietf-manet-dsr-03.txt, October 1999; Perkins et al., Ad Hoc On Demand Distance Vector (AODV) Routing, Internet Draft draft-ietf-manet-aodv04.txt, October 1999; Haas and Pearlman, The Zone Routing Protocol ...

متن کامل

Performance Analysis of DSR and OLSR Routing Protocols for Fixed Wireless Sensor Networks (WSN)

Wireless Sensor Network (WSN) has been regarded as a distinguished Ad Hoc Network that can be used to fulfil multiple tasks and applications. Since a WSN consists hundreds of small size, low cost and battery powered sensor nodes. These nodes have the event sensing capabilities, data processing capabilities. Number of routing protocols has been implemented to perform routing in these networks. I...

متن کامل

Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation

=1884356 [last accessed 6 April 2016].19. Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin ofScience, Technology & Society 2008; 28(1):20–36.20. Madden M, Lenhart A, Cortesi S, Gasser U, Duggan M, Smith A, Beaton M. Teens, social media, and privacy. Available at: http://www.pewinternet.org/2013/05/21/teens-social-media-and-pr...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015