Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Maksym Komar"'
Publikováno v:
IEEE Access, Vol 6, Pp 1525-1541 (2018)
With respect to other routing paradigms, source routing has received comparatively less attention in the underwater acoustic networking domain. The most likely causes of this lack of momentum are the high overhead caused by route discovery and mainte
Externí odkaz:
https://doaj.org/article/0602513bedbe4e67bb6ed4adae296825
Publikováno v:
IEEE Access, Vol 6, Pp 1525-1541 (2018)
IMDEA Networks Institute Digital Repository
IMDEA Networks Institute
instname
IMDEA Networks Institute Digital Repository
IMDEA Networks Institute
instname
With respect to other routing paradigms, source routing has received comparatively less attention in the underwater acoustic networking domain. The most likely causes of this lack of momentum are the high overhead caused by route discovery and mainte
Autor:
Oleksiy Kebkal, Roman Sokolovskyi, Ievgenii Glushko, Maksym Komar, Konstantin Kebkal, Eugen Olenew, Leif Kniese, Rudolf Bannasch
Publikováno v:
2018 IEEE/OES Autonomous Underwater Vehicle Workshop (AUV).
The growing demand for underwater research and exploration requires new approaches to building underwater vehicles. The state-of-the-art technologies are expensive, provide limited operation time and/or manoeuvrability. New approaches based on bio-lo
Publikováno v:
OCEANS 2015 - Genova.
Delay-Tolerant Networking (DTN) technology enables the nodes of an underwater acoustic network to communicate under conditions of frequent link disruptions and in networks topologies, in which end-to-end connections may never be available. Our implem
In this paper we present a performance evaluation and feasibility test of SUN, a routing protocol for underwater networks inspired to Dynamic Source Routing (DSR), to which it adds several features that improve its behavior in underwater environments
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::74d0684debbf57ff3483b4f2ebe4467b
Publikováno v:
OCEANS 2015 Genova; 2015, p1-6, 6p
This book highlights research on secure communication of 5G and the Internet of Things (IoT) Networks, along with related areas to ensure secure and Internet-compatible IoT systems. The authors not only discuss 5G and IoT security and privacy challen