945 resultados para Réseau Ad-hoc
Resumo:
In this paper, we present a first approach to evolve a cooperative behavior in ad hoc networks. Since wireless nodes are energy constrained, it may not be in the best interest of a node to always accept relay requests. On the other hand, if all nodes decide not to expend energy in relaying, then network throughput will drop dramatically. Both these extreme scenarios are unfavorable to the interests of a user. In this paper we deal with the issue of user cooperation in ad hoc networks by developing the algorithm called Generous Tit-For-Tat. We assume that nodes are rational, i.e., their actions are strictly determined by self-interest, and that each node is associated with a minimum lifetime constraint. Given these lifetime constraints and the assumption of rational behavior, we study the added behavior of the network.
Resumo:
En aquest projecte s'ha dissenyat i implementat un nou Discovery Middleware per a la plataforma d'agents mòbils JADE. Aquest DM col·laborarà amb el Directory Facilitator per tal d'oferir als agents un servei transparent que els permetrà descobrir serveis en plataformes remotes que siguin accessibles mitjançant xarxes ad-hoc basades en la tecnologia Bluetooth.
Resumo:
Estudi sobre la cooperació entre els nodes que formen una xarxa mòbil ad hoc, analitzant la distància entre aquests per conèixer la capacitat de transmissió d’informació entre el node origen i el node destí.
Resumo:
A summary of the goals and activities of the ad hoc group on Non Tsetse Transmitted Animal Trypanosomosis belonging to the Office International des Epizooties is presented.
Resumo:
Desde una perspectiva narrativa, este artículo explora cómo la práctica y la formación en interpretación de conferenciasse han percibido en la disciplina, en la profesión y en diferentescolectivos de traductores e interpretes comprometid@s como ECOSy Babels. Sostiene que estas distintas maneras de percibir la interpretación no son meramente opuestas sino que su potencial confluencia es clave para hacer posible una interpretación de conferencias más comprometida políticamente y más socio-crítica en un mundo de desigualdades cada vez más acentuadas y de mercantilización creciente de todos los aspectos de la vida. El artículo lleva a cabo un estudio de caso sobre la formación ad hoc de intérpretes en el Foro Social, en particular el Foro Social Europeo de Londres, y analiza cómo el trabajo colectivo entre instituciones educativas y sociedad civil tanto local como global ha dado luz a prácticas transformadoras hacia una metodología de formación mássocio-critica y con mayor consciencia ética.
Resumo:
OBJECTIVES: To preliminarily evaluate prospectively the accuracy and reliability of a specific ad hoc reduction-compression forceps in intraoral open reduction of transverse and displaced mandibular angle fractures. STUDY DESIGN: We analyzed the clinical and radiologic data of 7 patients with 7 single transverse and displaced angle fractures. An intraoral approach was performed in all of the patients without using perioperative intermaxillary fixation. A single Arbeitsgemeinschaft Osteosynthese (AO) unilock reconstruction plate was fixed to each stable fragment with 3 locking screws (2.0 mm in 5 patients and 2.4 mm in 2 patients) at the basilar border of the mandible, according to AO/American Society of Internal Fixation (ASIF) principles. Follow-up was at 1, 3, 6, and 12 months, and we noted the status of healing and complications, if any. RESULTS: All of the patients had satisfactory fracture reduction as well as a successful treatment outcome without complications. CONCLUSION: This preliminary study demonstrated that the intraoral reduction of transverse and displaced angle fractures using a specific ad hoc reduction-forceps results in a high rate of success.
Resumo:
Abstract This PhD thesis addresses the issue of alleviating the burden of developing ad hoc applications. Such applications have the particularity of running on mobile devices, communicating in a peer-to-peer manner and implement some proximity-based semantics. A typical example of such application can be a radar application where users see their avatar as well as the avatars of their friends on a map on their mobile phone. Such application become increasingly popular with the advent of the latest generation of mobile smart phones with their impressive computational power, their peer-to-peer communication capabilities and their location detection technology. Unfortunately, the existing programming support for such applications is limited, hence the need to address this issue in order to alleviate their development burden. This thesis specifically tackles this problem by providing several tools for application development support. First, it provides the location-based publish/subscribe service (LPSS), a communication abstraction, which elegantly captures recurrent communication issues and thus allows to dramatically reduce the code complexity. LPSS is implemented in a modular manner in order to be able to target two different network architectures. One pragmatic implementation is aimed at mainstream infrastructure-based mobile networks, where mobile devices can communicate through fixed antennas. The other fully decentralized implementation targets emerging mobile ad hoc networks (MANETs), where no fixed infrastructure is available and communication can only occur in a peer-to-peer fashion. For each of these architectures, various implementation strategies tailored for different application scenarios that can be parametrized at deployment time. Second, this thesis provides two location-based message diffusion protocols, namely 6Shot broadcast and 6Shot multicast, specifically aimed at MANETs and fine tuned to be used as building blocks for LPSS. Finally this thesis proposes Phomo, a phone motion testing tool that allows to test proximity semantics of ad hoc applications without having to move around with mobile devices. These different developing support tools have been packaged in a coherent middleware framework called Pervaho.
Resumo:
Multihop ad-hoc networks have a dynamic topology. Retrieving a route towards a remote peer requires the execution of a recipient lookup, which can publicly reveal sensitive information about him. Within this context, we propose an efficient, practical and scalable solution to guaranteethe anonymity of recipients' nodes in ad-hoc networks.
Resumo:
Las redes móviles ad hoc son redes formadas por lainterconexión de terminales inalámbricos que de manera autónoma,sin ninguna administración central, establecen enlaces decomunicación entre ellos. La infraestructura de red la componenlos propios terminales de usuarios que actúan de gestores yencaminadores de paquetes. Así, un usuario cualquiera puedeconectarse con un terminal remoto a través de una conexiónmultisalto entre diferentes usuarios. En este tipo de redes tanabiertas, uno de los retos prioritarios es proteger el anonimatode los sujetos y sus localizaciones. En este artículo hacemos unrepaso de las técnicas existentes a través de los protocolos que sehan propuesto en la literatura, y exponemos los problemas queaun quedan abiertos.
Resumo:
El despliegue de un esquema de confianza es fundamental para poder desarrollar servicios de seguridad que permitan administrar y operar una red. Sin embargo, las soluciones empleadas en las redes tradicionales no se adaptan a un entorno ad hoc debido a la naturaleza dinámica y sin infraestructura de estas redes. En el presente trabajo se propone un esquema de confianza práctico y eficiente basado en una infraestructura de clave pública distribuida, umbral y jerárquica, que no requiere sincronización temporal entre todos los nodos de la red. La autorización de usuarios en el sistema se hace a través de certificados de corta duración que eliminan la necesidad de mantener la publicación y diseminación de unas listas de revocación. Por otro lado, una entidad externa de confianza permite alargar la reputación de un usuario de la red más allá de la existencia de la propia red.
Resumo:
Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.
Resumo:
Peer-reviewed
Resumo:
An efficient approach for organizing large ad hoc networks is to divide the nodesinto multiple clusters and designate, for each cluster, a clusterhead which is responsible forholding intercluster control information. The role of a clusterhead entails rights and duties.On the one hand, it has a dominant position in front of the others because it manages theconnectivity and has access to other node¿s sensitive information. But on the other hand, theclusterhead role also has some associated costs. Hence, in order to prevent malicious nodesfrom taking control of the group in a fraudulent way and avoid selfish attacks from suitablenodes, the clusterhead needs to be elected in a secure way. In this paper we present a novelsolution that guarantees the clusterhead is elected in a cheat-proof manner.