Zobrazeno 1 - 10
of 3 616
pro vyhledávání: '"Triangular routing"'
Autor:
Adam Freeman
Publikováno v:
Pro Angular ISBN: 9781484281758
Pro Angular 9 ISBN: 9781484259979
Pro Angular ISBN: 9781484223062
Pro Angular 6 ISBN: 9781484236482
Pro Angular 9 ISBN: 9781484259979
Pro Angular ISBN: 9781484223062
Pro Angular 6 ISBN: 9781484236482
In the previous chapter, I introduced the Angular URL routing system and explained how it can be used to control the components that are displayed to the user. The routing system has a lot of features, which I continue to describe in this chapter and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0172525c5e29cfb776cb940a31c07eee
https://doi.org/10.1007/978-1-4842-8176-5_25
https://doi.org/10.1007/978-1-4842-8176-5_25
Autor:
Oleg Berzin
Hierarchical Mobility Label Based Network (H-MLBN) is a new approach to the network layer mobility management problem that relies on MPLS-aware control plane and MPLS-based forwarding plane to provide IP mobility support for IPv4 and IPv6 mobile host
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::79abed2f462399b83b4d8a12ffa52624
http://arxiv.org/abs/2110.09607
http://arxiv.org/abs/2110.09607
Publikováno v:
Journal of Parallel and Distributed Computing. 118:46-56
As an important part of IoT, Flying ad hoc networks (FANETs) can provide communication services for different devices in IoT and cyber-enabled applications. However, mobility of unmanned aerial vehicle (UAV) in FANETs results in wireless link unpredi
Publikováno v:
IEEE Transactions on Mobile Computing. 17:1696-1709
Prior solutions for routing to multi-instantiated destinations simply adapt existing routing algorithms designed for single-instance destinations, or rely on flooding techniques. In this paper, a new approach for routing to multi-instantiated destina
Publikováno v:
UEMCON
Internet of Things (IoT) devices are becoming important and familiar products in our everyday lives. Yet, many of these IoT devices have a multitude of vulnerabilities that create a security risk, despite being products that bring a lot of convenienc
Publikováno v:
IEEE Transactions on Mobile Computing. 17:1339-1352
Geographic routing has been considered as an attractive approach for resource-constrained wireless sensor networks (WSNs) since it exploits local location information instead of global topology information to route data. However, this routing approac
Autor:
Anand Seetharam
Publikováno v:
IEEE Communications Magazine. 56:204-209
With the exponential growth of content in recent years, users are primarily interested in obtaining particular content and are not concerned with the host housing the content. By treating content as a first class citizen, information- centric network
Publikováno v:
International Journal of Computer Applications. 179:1-6
The more integrated networks are with the internet, the more our security concerns grow. Virtual Private Networks (VPNs) have been used to solve the problem of internet security. As more locations need to be securely connected, more configurations an
Publikováno v:
IEICE Transactions on Communications. :49-57
Publikováno v:
IEEE Transactions on Control of Network Systems. 4:793-804
We study the problem of routing in sensor networks where the goal is to maximize the network's lifetime. Previous work has considered this problem for fixed-topology networks. Here, we add mobility to the source node, which requires a new definition