標(biāo)題: Titlebook: Wired/Wireless Internet Communications; 7th International Co Hans Berg,Geert Heijenk,Dirk Staehle Conference proceedings 2009 Springer-Verl [打印本頁] 作者: Waterproof 時間: 2025-3-21 17:56
書目名稱Wired/Wireless Internet Communications影響因子(影響力)
書目名稱Wired/Wireless Internet Communications影響因子(影響力)學(xué)科排名
書目名稱Wired/Wireless Internet Communications網(wǎng)絡(luò)公開度
書目名稱Wired/Wireless Internet Communications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Wired/Wireless Internet Communications被引頻次
書目名稱Wired/Wireless Internet Communications被引頻次學(xué)科排名
書目名稱Wired/Wireless Internet Communications年度引用
書目名稱Wired/Wireless Internet Communications年度引用學(xué)科排名
書目名稱Wired/Wireless Internet Communications讀者反饋
書目名稱Wired/Wireless Internet Communications讀者反饋學(xué)科排名
作者: Jingoism 時間: 2025-3-21 21:18
https://doi.org/10.1007/978-3-642-02118-3IEEE 80; IEEE 802; 21; Internet; Quality of Service; Quality of Service (QoS); Routing; TCP/IP networks; WLA作者: 預(yù)知 時間: 2025-3-22 02:09 作者: TATE 時間: 2025-3-22 07:34
Wired/Wireless Internet Communications978-3-642-02118-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: aquatic 時間: 2025-3-22 10:00
Conference proceedings 2009hede, The Netherlands in May 2008...The 13 revised full papers were carefully reviewed and selected from 39 submissions. The papers are organized in topical sessions on energy efficient WSN design, routing & transport protocols for WSNs, security and protocol design and mobility & handover management...?.作者: Brittle 時間: 2025-3-22 15:06
0302-9743 ld in Enschede, The Netherlands in May 2008...The 13 revised full papers were carefully reviewed and selected from 39 submissions. The papers are organized in topical sessions on energy efficient WSN design, routing & transport protocols for WSNs, security and protocol design and mobility & handover作者: 收集 時間: 2025-3-22 17:44
On Prolonging Sensornode Gateway Lifetime by Adapting Its Duty Cycleoves its lifetime. Depending on the radio modules used the lifetime can be increased from seven hours up to 3 months using only 3 AA batteries. Our results also proove that prolonging the sleep intervals beyond a certain limit (about 10 seconds for a typical WLAN PC card) does not longer improve the lifetime but only worsens the delay.作者: 粗語 時間: 2025-3-23 00:16
RDTN: An Agile DTN Research Platform and Bundle Protocol Agent client applications, an interactive environment for tests and a simulation mode for running multiple instances of the RDTN code in a simulated network environment. This paper describes the design of RDTN and its application to agile DTN protocol development.作者: ATOPY 時間: 2025-3-23 01:32 作者: excursion 時間: 2025-3-23 06:35 作者: 要素 時間: 2025-3-23 11:55 作者: 暫時別動 時間: 2025-3-23 15:36
A Novel MAC Protocol for Event-Based Wireless Sensor Networks: Improving the Collective QoStion messages are sent simultaneously to the sink, resulting in sporadic increases of the network load. Additionally, these messages sometimes require a lower latency and higher reliability as they can be associated to emergency situations. Current MAC protocols for WSNs are not able to react rapidl作者: Interferons 時間: 2025-3-23 21:37
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systemsovide various low power sleep modes. Utilizing them can lead to great energy savings. In this paper we present an approach for power management in embedded systems, based on the event-driven operating system .. The implicit power management is mostly hardware independent, lightweight and efficiently作者: LAST 時間: 2025-3-24 01:00 作者: CHOP 時間: 2025-3-24 04:31
Routing and Aggregation Strategies for Contour Map Applications in Sensor Networksmes in which data from a sensor are routed to the node that can perform the most effective data aggregation. We then seek alternative forms of aggregation where, in principle, it is possible to aggregate readings from many sensors into a single one. To this end, we select contour maps as the most co作者: 極小 時間: 2025-3-24 08:43 作者: agenda 時間: 2025-3-24 12:03 作者: brassy 時間: 2025-3-24 18:52
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensorso characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in p作者: RACE 時間: 2025-3-24 20:19
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networksforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over ”synthesized” mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols作者: 單獨 時間: 2025-3-24 23:40 作者: AROMA 時間: 2025-3-25 06:01 作者: vasculitis 時間: 2025-3-25 09:00
Seamless Mobility of Senders Transmitting Multi-user Sessions over Heterogeneous Networksication systems capable of supporting a seamless mobility experience to end-users. Moreover, the arising of multi-user real-time services has emphasized the importance of the multicast communication to deliver content to multiple simultaneous receivers. The simultaneous increase in the production an作者: 表被動 時間: 2025-3-25 14:56
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environmentsstrates that Wireless LAN (WLAN) mobility causes continuously increased Round Trip Times (RTT) resulting from 802.11 MAC retransmissions, regardless of the service specified by upper layers. We present scenarios where the current understanding of SCTP switchover aggressiveness is invalid; spurious f作者: Afflict 時間: 2025-3-25 16:57
Handover Incentives for WLANs with Overlapping Coverageormance of the high-rate users. Our objective is to investigate the implications of the above performance degradation on the incentives for handover between 802.11 wireless local area networks with overlapping coverage. Our focus is on the incentives for supporting handovers, due solely to the impro作者: 藐視 時間: 2025-3-25 20:30 作者: JIBE 時間: 2025-3-26 00:51 作者: Feigned 時間: 2025-3-26 06:42
Routing and Aggregation Strategies for Contour Map Applications in Sensor Networks values, as well as intra–cluster and inter–cluster routing and aggregation heuristics. Simulation results demonstrate the capabilities and limitations of the various varieties of aggregation/routing strategies.作者: Rodent 時間: 2025-3-26 09:43 作者: 連詞 時間: 2025-3-26 15:53 作者: compose 時間: 2025-3-26 17:10 作者: Fortify 時間: 2025-3-26 21:04
Handover Incentives for WLANs with Overlapping Coverageexpected to be beneficial, and can be used in a handover acceptance policy. Simulation of the proposed procedure suggests that the model is accurate and that there are significant throughput gains for both wireless networks.作者: byline 時間: 2025-3-27 02:34 作者: 翻動 時間: 2025-3-27 08:58 作者: 仔細(xì)閱讀 時間: 2025-3-27 11:17 作者: flaggy 時間: 2025-3-27 17:10
Shoudong Zou,Ioanis Nikolaidis,Janelle Harmsapour, droplets or liquid in vegetation. Any insect seeks a suitable microclimate and selects out of the range available to it. Social insects respond in this way when foraging unless they make shelters for bugs or rest stations. These and the true nests are the special features by which social inse作者: 數(shù)量 時間: 2025-3-27 20:24
Gerald Wagenknecht,Markus Anwander,Torsten BraunHowever, the precise age and the developmental sequence of acquiring skills and knowledge are seldom described. Considerable debate also exists as to the importance of particular modes (e.g., vertical, horizontal, and oblique) and processes (e.g., role of teaching) of cultural transmission. This cha作者: RODE 時間: 2025-3-27 23:18 作者: Flatus 時間: 2025-3-28 06:03
Mauro Conti,Roberto Di Pietro,Andrea Gabrielli,Luigi Vincenzo Mancini,Alessandro Meit is found, how it is aggregated, and how it produces value .This book shows you how to use social media analytics to optimize your business performance. The tools discussed will prepare you to create and implement an effective digital marketing strategy. From understanding the data and its sources 作者: 可用 時間: 2025-3-28 09:44 作者: ureter 時間: 2025-3-28 12:46 作者: Generator 時間: 2025-3-28 15:54
Seamless Mobility of Senders Transmitting Multi-user Sessions over Heterogeneous Networkss during the handover of multicast senders, and consequently, to avoid the service degradation perceived by receivers is presented in this paper. Simulation results confirm the ability of the proposed mechanism to reduce or completely avoid packet losses, increasing the perceived quality of the rece作者: 策略 時間: 2025-3-28 19:51 作者: 失望未來 時間: 2025-3-29 00:55 作者: SYN 時間: 2025-3-29 07:06 作者: 罵人有污點 時間: 2025-3-29 07:45
Cristina Cano,Boris Bellalta,Jaume Barceló,Anna Sfairopoulouand social networks.Advanced-level students in electrical engineering and computer science will also find this material useful for their related courses.978-3-319-12321-9978-3-319-12322-6Series ISSN 2191-8112 Series E-ISSN 2191-8120 作者: sundowning 時間: 2025-3-29 13:16
Marcin Brzozowski,Peter Langendoerferesents new forms of social business models that can be used to target low-income markets. Finally, the book presents key success factors related to the social product innovation process and corresponding communication.978-3-642-32149-8978-3-642-32150-4Series ISSN 2191-5482 Series E-ISSN 2191-5490 作者: 在前面 時間: 2025-3-29 19:39
Christian M. Mueller,Harald Eckhardt,Rolf Sigleose contacts to leverage the resources needed for their enterprises, revealing new insights on the process of business creation and economic development in the networked age.978-3-319-02489-9978-3-319-02490-5Series ISSN 2191-5482 Series E-ISSN 2191-5490 作者: gregarious 時間: 2025-3-29 23:13 作者: anesthesia 時間: 2025-3-30 02:30
André Sieber,Karsten Walther,Stefan Nürnberger,J?rg Nolteists of people who do not necessarily know each other, interact, engage in reciprocity, have the same beliefs and values or have a common identity, whereas the people belonging to a group necessarily possess these attributes. Thus while many social categories may also have the attributes of social g作者: 非實體 時間: 2025-3-30 04:53