Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,614,134 papers from all fields of science
Search
Sign In
Create Free Account
Verlet list
Known as:
Neighbor list
, Verlet
A Verlet list (named after Loup Verlet) is a data structure in molecular dynamics simulations to efficiently maintain a list of all particles within…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Cell lists
Fast multipole method
Large-scale Atomic/Molecular Massively Parallel Simulator
Molecular dynamics
Expand
Broader (1)
Computational chemistry
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Enhanced trust based encroachment discovery system for Mobile Ad-hoc networks
S. Sargunavathi
,
•. J. Martin
,
Leo Manickam
Cluster Computing
2018
Corpus ID: 4314820
The ultimate goal of this paper is to avoid inclusion of intruder node in the route and to ensure reliability. The trust metrics…
Expand
2017
2017
An improved GPSR protocol based on stratification of traffic density
Mengkun Li
,
Huan Li
,
+5 authors
Jie Liu
International Conference on Informatics and…
2017
Corpus ID: 34598376
An improved GPSR protocol based on stratification of traffic density is designed to get lower possibility to encounter local…
Expand
2015
2015
Capacitated Vehicle Routing Problem with Time Windows: A Case Study on Pickup of Dietary Products in Nonprofit Organization
Xiaoyan Li
2015
Corpus ID: 2796260
2013
2013
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks
Gunhee Lee
,
Wonil Kim
,
Kangseok Kim
,
Sangyoon Oh
,
Dong-Kyoo Kim
Peer-to-Peer Networking and Applications
2013
Corpus ID: 14454084
The routing misbehavior is one of the most serious threats to wireless ad hoc networks where nodes are not forwarding messages…
Expand
2012
2012
Base station association schemes to reduce unnecessary handovers using location awareness in femtocell networks
N. Sung
,
Ngoc-Thai Pham
,
H. Yoon
,
Sookjin Lee
,
Won-Joo Hwang
Wireless networks
2012
Corpus ID: 255142284
In this paper, we propose a predictive scheme to generate reduced neighbor lists. In addition, we formulate a predictive…
Expand
2011
2011
B-7-65 Effective Flooding based on neighbor list exchange over Ad Hoc Networks
Turganzhan Kassymov
,
K. Utsu
,
H. Sano
,
N. Morita
,
H. Ishii
2011
Corpus ID: 60002898
2009
2009
Improving the IEEE 802.11 MAC Layer Handoff Latency to Support Multimedia Traffic
Yogesh Ashok Powar
,
Varsha Apte
IEEE Wireless Communications and Networking…
2009
Corpus ID: 1896864
Multimedia applications can be offered to mobile users on the IEEE 802.11 WLAN, if their bandwidth, delay and jitter requirements…
Expand
2008
2008
A new recovery method for greedy routing protocols in high mobile vehicular communications
Sukdea Yu
,
Hoon-gyu Choi
,
Gihwan Cho
IEEE International Conference on Vehicular…
2008
Corpus ID: 10254834
Greedy perimeter stateless routing (GPSR) protocol is an appropriate and the most well-known routing protocol for high mobile…
Expand
2006
2006
Automatic Construction of the neighbor list in a mobile system
ヤリ ヴィキベルイ
,
トマス ナイランダー
2006
Corpus ID: 115257116
無線アクセスネットワーク(24)において、フェムト無線基地局(28 f…
Expand
2003
2003
Inter-cluster service lookup based on Jini
W. Tseng
,
Hsing Mei
17th International Conference on Advanced…
2003
Corpus ID: 26792293
Jinis discovery protocols allow people to access requested services spontaneously in their own federations. However, to access…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE