ABV-Indian Institute of Information Technology and Management Gwalior

Displaying 1-4 of 4 results

  • White Papers // Mar 2011

    Integrated Routing Protocol for Opportunistic Networks

    In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior

  • White Papers // Dec 2010

    Joint Stream Allocation and Scheduling for Single-User MIMO Communication in WMNs

    Multiple-Input Multiple-Output (MIMO) technology has great potential for improving the throughput of Wireless Mesh Networks (WMNs). In this paper, the authors investigate the joint stream allocation and scheduling problem for single-user MIMO communication in WMNs with the objective of maximizing the demand satisfaction for a set of flows. The notion...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior

  • White Papers // Oct 2010

    Query Based Approach Towards Spam Attacks Using Artificial Neural Network

    Currently, spam and scams are passive attack over the inbox which can initiated to steal some confidential information, to spread Worms, Viruses, Trojans, cookies and Sometimes they are used for phishing attacks. Spam mails are the major issue over mail boxes as well as over the internet. Spam mails can...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior

  • White Papers // Dec 2009

    An Efficient Location Aided Routing Protocol in Mobile Ad-Hoc Network

    In the last few years, Mobile Ad-hoc NETworks (MANET) have gained increasing attention from both the researchers and the actual users. As MANET nodes are generally battery-powered devices, the challenging task is how to reduce the energy consumption of nodes and hence conserve energy of the whole system, which extend...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior

  • White Papers // Oct 2010

    Query Based Approach Towards Spam Attacks Using Artificial Neural Network

    Currently, spam and scams are passive attack over the inbox which can initiated to steal some confidential information, to spread Worms, Viruses, Trojans, cookies and Sometimes they are used for phishing attacks. Spam mails are the major issue over mail boxes as well as over the internet. Spam mails can...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior

  • White Papers // Dec 2009

    An Efficient Location Aided Routing Protocol in Mobile Ad-Hoc Network

    In the last few years, Mobile Ad-hoc NETworks (MANET) have gained increasing attention from both the researchers and the actual users. As MANET nodes are generally battery-powered devices, the challenging task is how to reduce the energy consumption of nodes and hence conserve energy of the whole system, which extend...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior

  • White Papers // Dec 2010

    Joint Stream Allocation and Scheduling for Single-User MIMO Communication in WMNs

    Multiple-Input Multiple-Output (MIMO) technology has great potential for improving the throughput of Wireless Mesh Networks (WMNs). In this paper, the authors investigate the joint stream allocation and scheduling problem for single-user MIMO communication in WMNs with the objective of maximizing the demand satisfaction for a set of flows. The notion...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior

  • White Papers // Mar 2011

    Integrated Routing Protocol for Opportunistic Networks

    In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information...

    Provided By ABV-Indian Institute of Information Technology and Management Gwalior