Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments
Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other sensors, combined with wireless networking, a pervasive game can respond to player'...
| Main Authors: | Wietrzyk, Bartosz, Radenkovic, Milena |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/33938/ |
Similar Items
Increasing communication reliability in manufacturing environments
by: Radenkovic, Milena, et al.
Published: (2015)
by: Radenkovic, Milena, et al.
Published: (2015)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
Performance evaluation of manet in presence of black hole nodes
by: Dhahir, Saif Mahmood
Published: (2017)
by: Dhahir, Saif Mahmood
Published: (2017)
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)
by: Wietrzyk, Bartosz
Published: (2008)
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
by: Barjini, Hassan
Published: (2012)
by: Barjini, Hassan
Published: (2012)
Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
by: Abdulwahhab, Mohanad Mazin
Published: (2019)
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
by: Ejmaa, Ali Mohamed E.
Published: (2017)
by: Ejmaa, Ali Mohamed E.
Published: (2017)
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
by: Zarafshan, Faraneh
Published: (2015)
by: Zarafshan, Faraneh
Published: (2015)
Towards low cost prototyping of mobile opportunistic disconnection tolerant networks and systems
by: Radenkovic, Milena, et al.
Published: (2016)
by: Radenkovic, Milena, et al.
Published: (2016)
An adaptive energy efficient protocol in media access control
by: Abduljaleel, Uday, et al.
Published: (2009)
by: Abduljaleel, Uday, et al.
Published: (2009)
A Social Network-Based Peer-To-Peer Model For Resource Discovery
by: Modarresi, Amir
Published: (2009)
by: Modarresi, Amir
Published: (2009)
Agent-Based Resource Discovery In Peer-To-Peer Networks
by: Sedaghat, Mina
Published: (2010)
by: Sedaghat, Mina
Published: (2010)
A community-based peer-to-peer model based on social networks
by: Modarresi, Amir, et al.
Published: (2008)
by: Modarresi, Amir, et al.
Published: (2008)
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
by: Sinnanaidu, Subba Rao
Published: (2004)
by: Sinnanaidu, Subba Rao
Published: (2004)
Efficient location privacy-aware forwarding in opportunistic mobile networks
by: Zakhary, Sameh, et al.
Published: (2014)
by: Zakhary, Sameh, et al.
Published: (2014)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
by: Abdulkader, Zaid A.
Published: (2018)
by: Abdulkader, Zaid A.
Published: (2018)
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
by: Waheed, Bassam M.S.
Published: (2014)
by: Waheed, Bassam M.S.
Published: (2014)
Performance analysis of OSPF and EIGRP protocols in a very dynamic network
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
by: Ahmed Mohammed, Abdul Nasser, et al.
Published: (2009)
The role of wireless sensor networks (WSNs) in industrial oil and gas condition monitoring
by: Akhondi, Mohammad Reza, et al.
Published: (2010)
by: Akhondi, Mohammad Reza, et al.
Published: (2010)
Channel congestion control mechanisms for IEEE 802.11P/1609.4 in vehicular ad-hoc networks
by: Al-Zaghir, Akram Abdullah
Published: (2019)
by: Al-Zaghir, Akram Abdullah
Published: (2019)
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
by: Jahan, Mohammad Saukat
Published: (2015)
by: Jahan, Mohammad Saukat
Published: (2015)
Hexagonal grid-based dynamic routing adjustment for optimising network lifetime in wireless sensor network
by: Jarallah, Zaid Fawaz
Published: (2017)
by: Jarallah, Zaid Fawaz
Published: (2017)
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
by: Sjaugi, Muhammad Farhan
Published: (2008)
by: Sjaugi, Muhammad Farhan
Published: (2008)
Cheating in networked computer games: a review
by: Webb, Steven, et al.
Published: (2007)
by: Webb, Steven, et al.
Published: (2007)
A survey on network game cheats and P2P solutions
by: Webb, Steven, et al.
Published: (2008)
by: Webb, Steven, et al.
Published: (2008)
Increasing TCP friendliness by implementing simple adaptive congestion control framework in wireless network
by: Elangkovan, Sri Ganesh
Published: (2018)
by: Elangkovan, Sri Ganesh
Published: (2018)
Performance of Transmission Control Protocol (TCP) Congestion Control Over Wireless Links Using Modified Snoop Protocol
by: Moojid, Furat Asmat
Published: (2003)
by: Moojid, Furat Asmat
Published: (2003)
Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
by: Sabah Talib, Al-Zubaidi Ammar
Published: (2017)
Improved tree routing protocol in zigbee networks
by: Al-Harbawi, Mostafa Kamil Abdulhusain
Published: (2010)
by: Al-Harbawi, Mostafa Kamil Abdulhusain
Published: (2010)
Locating bluetooth devices through an android application by creating an ad hoc network
by: Pamboukas, Savvas
Published: (2014)
by: Pamboukas, Savvas
Published: (2014)
Architecture and performance of multi-hop wireless ad-hoc routing protocol (MultiWARP)
by: Van Der Werf, Steven Martijn
Published: (2010)
by: Van Der Werf, Steven Martijn
Published: (2010)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)
by: Hossen, Md.Jakir
Published: (2003)
by: Hossen, Md.Jakir
Published: (2003)
Handover enhancement in IP mobility for 6LoWPAN scenario
by: Abdulrahman, Ahmed Faris
Published: (2016)
by: Abdulrahman, Ahmed Faris
Published: (2016)
An investigation and simulation of novel dynamic routing methods
by: Saleh, Mohammad
Published: (2001)
by: Saleh, Mohammad
Published: (2001)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
by: Jasem, Hayder Natiq, et al.
Published: (2010)
by: Jasem, Hayder Natiq, et al.
Published: (2010)
Weighted Window for TCP Fair Bandwidth Allocation in Wireless Lans
by: Seyedzadegan, Mojtaba
Published: (2008)
by: Seyedzadegan, Mojtaba
Published: (2008)
Wireless controller area networking using token frame scheme
by: Ng, Wei Lun
Published: (2012)
by: Ng, Wei Lun
Published: (2012)
Similar Items
-
Increasing communication reliability in manufacturing environments
by: Radenkovic, Milena, et al.
Published: (2015) -
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018) -
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015) -
Performance evaluation of manet in presence of black hole nodes
by: Dhahir, Saif Mahmood
Published: (2017) -
Practical mobile ad hoc networks for large scale cattle monitoring
by: Wietrzyk, Bartosz
Published: (2008)