Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,926,258 papers from all fields of science
Search
Sign In
Create Free Account
Hoc (programming language)
Known as:
Hoc
hoc, an acronym for High Order Calculator, is an interpreted programming language that was used in the 1984 book The Unix Programming Environment to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Bc (programming language)
Interpreter (computing)
Neuron
Programming language
Expand
Broader (1)
Plan 9 from Bell Labs
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks
M. Rajesh
,
J. Gnanasekar
Wireless personal communications
2017
Corpus ID: 6143834
Wireless ad hoc networks are going to be an emerged multi-hop communication exploit among mobiles to deliver data packets. The…
Expand
Highly Cited
2008
Highly Cited
2008
A Power Control MAC Protocol for Ad hoc Networks
Ji-zhong Zhang
,
Hao Yang
,
Xiaoping Zhou
,
Xiao-juan Zhou
International Conference on Mobile Multimedia…
2008
Corpus ID: 26698107
The mobile Nodes in wireless Ad hoc networks are fed by batteries,so the energy limitation has become a performance bottleneck…
Expand
Highly Cited
2007
Highly Cited
2007
Shortcut Tree Routing in ZigBee Networks
Taehong Kim
,
Daeyoung Kim
,
Noseong Park
,
Seong-eun Yoo
,
T. López
International Symposium on Wireless Pervasive…
2007
Corpus ID: 9595553
ZigBee is the emerging industrial standard for ad hoc networks based on IEEE 802.15.4. Due to characteristics such as low data…
Expand
Highly Cited
2007
Highly Cited
2007
A mechanism for detection of gray hole attack in mobile Ad Hoc networks
Jaydip Sen
,
M. Chandra
,
G. HariharaS.
,
H. Reddy
,
P. Balamuralidhar
International Conference on Information…
2007
Corpus ID: 1712584
Protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks…
Expand
Highly Cited
2006
Highly Cited
2006
POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS
T. Leinmüller
,
E. Schoch
,
F. Kargl
IEEE wireless communications
2006
Corpus ID: 3080455
Intervehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs…
Expand
Highly Cited
2005
Highly Cited
2005
A cooperative MAC protocol for wireless local area networks
Pei Liu
,
Zhifeng Tao
,
S. Panwar
IEEE International Conference on Communications…
2005
Corpus ID: 887530
In this paper, a novel idea of user cooperation in wireless networks has been exploited to improve the performance of the IEEE…
Expand
Highly Cited
2004
Highly Cited
2004
An ad hoc mobility model founded on social network theory
Mirco Musolesi
,
S. Hailes
,
C. Mascolo
International Conference on Modeling, Analysis…
2004
Corpus ID: 1535080
Almost all work on mobile ad hoc networks relies on simulations, which, in turn, rely on realistic movement models for their…
Expand
Highly Cited
2003
Highly Cited
2003
Lifetime prediction routing in mobile ad hoc networks
M. Maleki
,
Karthik Dantu
,
Massoud Pedram
IEEE Wireless Communications and Networking…
2003
Corpus ID: 15325888
One of the main design constraints in mobile ad hoc networks (MANETs) is that they are power constrained. Hence, every effort is…
Expand
Highly Cited
2002
Highly Cited
2002
A TDMA-based bandwidth reservation protocol for QoS routing in a wireless mobile ad hoc network
Wen-Hwa Liao
,
Y. Tseng
,
K. Shih
IEEE International Conference on Communications…
2002
Corpus ID: 13064960
This paper considers the bandwidth reservation problem in a mobile ad hoc network (MANET) to support QoS (quality-of-service…
Expand
Highly Cited
2001
Highly Cited
2001
Comparison-based system-level fault diagnosis in ad hoc networks
S. Chessa
,
P. Santi
Proceedings 20th IEEE Symposium on Reliable…
2001
Corpus ID: 5879175
The problem of identifying faulty mobiles in ad-hoc networks is considered. Current diagnostic models were designed for wired…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE