Dynamic analysis of role based workflows in wireless adhoc networks

Qurban A. Memon, Alaaeldin A. Aly

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Currently, the communication infrastructure of business organizations are being re-engineered to accommodate preferences set by various organizations for successful e-business. Additionally, the adhoc networks are getting importance because of a variety of applications. Thus, the analysis of the specific parameters within such environments becomes very critical. In this work, we target the organizational operations from this perspective. We analyze the typical wireless adhoc communication scenario of an organization or a group and propose a layer where routine and/or dynamic analysis of adopted roles by clients/users can be formulated. We present timely analysis of such parameters and show that framework for these parameters within the proposed layer leads to possible better management during time critical operations of wireless adhoc networks.

Original languageEnglish
Title of host publicationWMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings
Pages95-100
Number of pages6
Publication statusPublished - 2005
Event9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005 - Orlando, FL, United States
Duration: Jul 10 2005Jul 13 2005

Publication series

NameWMSCI 2005 - The 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings
Volume2

Other

Other9th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2005
Country/TerritoryUnited States
CityOrlando, FL
Period7/10/057/13/05

Keywords

  • Adhoc Networks
  • Dynamic Analysis
  • Neural Networks
  • Role based workflows
  • Wireless Networks

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Dynamic analysis of role based workflows in wireless adhoc networks'. Together they form a unique fingerprint.

Cite this