派博傳思國際中心

標(biāo)題: Titlebook: Wired/Wireless Internet Communications; 7th International Co Hans Berg,Geert Heijenk,Dirk Staehle Conference proceedings 2009 Springer-Verl [打印本頁]

作者: Waterproof    時間: 2025-3-21 17:56
書目名稱Wired/Wireless Internet Communications影響因子(影響力)




書目名稱Wired/Wireless Internet Communications影響因子(影響力)學(xué)科排名




書目名稱Wired/Wireless Internet Communications網(wǎng)絡(luò)公開度




書目名稱Wired/Wireless Internet Communications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Wired/Wireless Internet Communications被引頻次




書目名稱Wired/Wireless Internet Communications被引頻次學(xué)科排名




書目名稱Wired/Wireless Internet Communications年度引用




書目名稱Wired/Wireless Internet Communications年度引用學(xué)科排名




書目名稱Wired/Wireless Internet Communications讀者反饋




書目名稱Wired/Wireless Internet Communications讀者反饋學(xué)科排名





作者: Jingoism    時間: 2025-3-21 21:18
https://doi.org/10.1007/978-3-642-02118-3IEEE 80; IEEE 802; 21; Internet; Quality of Service; Quality of Service (QoS); Routing; TCP/IP networks; WLA
作者: 預(yù)知    時間: 2025-3-22 02:09

作者: TATE    時間: 2025-3-22 07:34
Wired/Wireless Internet Communications978-3-642-02118-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: aquatic    時間: 2025-3-22 10:00
Conference proceedings 2009hede, The Netherlands in May 2008...The 13 revised full papers were carefully reviewed and selected from 39 submissions. The papers are organized in topical sessions on energy efficient WSN design, routing & transport protocols for WSNs, security and protocol design and mobility & handover management...?.
作者: Brittle    時間: 2025-3-22 15:06
0302-9743 ld in Enschede, The Netherlands in May 2008...The 13 revised full papers were carefully reviewed and selected from 39 submissions. The papers are organized in topical sessions on energy efficient WSN design, routing & transport protocols for WSNs, security and protocol design and mobility & handover
作者: 收集    時間: 2025-3-22 17:44
On Prolonging Sensornode Gateway Lifetime by Adapting Its Duty Cycleoves its lifetime. Depending on the radio modules used the lifetime can be increased from seven hours up to 3 months using only 3 AA batteries. Our results also proove that prolonging the sleep intervals beyond a certain limit (about 10 seconds for a typical WLAN PC card) does not longer improve the lifetime but only worsens the delay.
作者: 粗語    時間: 2025-3-23 00:16
RDTN: An Agile DTN Research Platform and Bundle Protocol Agent client applications, an interactive environment for tests and a simulation mode for running multiple instances of the RDTN code in a simulated network environment. This paper describes the design of RDTN and its application to agile DTN protocol development.
作者: ATOPY    時間: 2025-3-23 01:32

作者: excursion    時間: 2025-3-23 06:35

作者: 要素    時間: 2025-3-23 11:55

作者: 暫時別動    時間: 2025-3-23 15:36
A Novel MAC Protocol for Event-Based Wireless Sensor Networks: Improving the Collective QoStion messages are sent simultaneously to the sink, resulting in sporadic increases of the network load. Additionally, these messages sometimes require a lower latency and higher reliability as they can be associated to emergency situations. Current MAC protocols for WSNs are not able to react rapidl
作者: Interferons    時間: 2025-3-23 21:37
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systemsovide various low power sleep modes. Utilizing them can lead to great energy savings. In this paper we present an approach for power management in embedded systems, based on the event-driven operating system .. The implicit power management is mostly hardware independent, lightweight and efficiently
作者: LAST    時間: 2025-3-24 01:00

作者: CHOP    時間: 2025-3-24 04:31
Routing and Aggregation Strategies for Contour Map Applications in Sensor Networksmes in which data from a sensor are routed to the node that can perform the most effective data aggregation. We then seek alternative forms of aggregation where, in principle, it is possible to aggregate readings from many sensors into a single one. To this end, we select contour maps as the most co
作者: 極小    時間: 2025-3-24 08:43

作者: agenda    時間: 2025-3-24 12:03

作者: brassy    時間: 2025-3-24 18:52
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensorso characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in p
作者: RACE    時間: 2025-3-24 20:19
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networksforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over ”synthesized” mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols
作者: 單獨    時間: 2025-3-24 23:40

作者: AROMA    時間: 2025-3-25 06:01

作者: vasculitis    時間: 2025-3-25 09:00
Seamless Mobility of Senders Transmitting Multi-user Sessions over Heterogeneous Networksication systems capable of supporting a seamless mobility experience to end-users. Moreover, the arising of multi-user real-time services has emphasized the importance of the multicast communication to deliver content to multiple simultaneous receivers. The simultaneous increase in the production an
作者: 表被動    時間: 2025-3-25 14:56
An Adaptive Optimized RTO Algorithm for Multi-homed Wireless Environmentsstrates that Wireless LAN (WLAN) mobility causes continuously increased Round Trip Times (RTT) resulting from 802.11 MAC retransmissions, regardless of the service specified by upper layers. We present scenarios where the current understanding of SCTP switchover aggressiveness is invalid; spurious f
作者: Afflict    時間: 2025-3-25 16:57
Handover Incentives for WLANs with Overlapping Coverageormance of the high-rate users. Our objective is to investigate the implications of the above performance degradation on the incentives for handover between 802.11 wireless local area networks with overlapping coverage. Our focus is on the incentives for supporting handovers, due solely to the impro
作者: 藐視    時間: 2025-3-25 20:30

作者: JIBE    時間: 2025-3-26 00:51

作者: Feigned    時間: 2025-3-26 06:42
Routing and Aggregation Strategies for Contour Map Applications in Sensor Networks values, as well as intra–cluster and inter–cluster routing and aggregation heuristics. Simulation results demonstrate the capabilities and limitations of the various varieties of aggregation/routing strategies.
作者: Rodent    時間: 2025-3-26 09:43

作者: 連詞    時間: 2025-3-26 15:53

作者: compose    時間: 2025-3-26 17:10

作者: Fortify    時間: 2025-3-26 21:04
Handover Incentives for WLANs with Overlapping Coverageexpected to be beneficial, and can be used in a handover acceptance policy. Simulation of the proposed procedure suggests that the model is accurate and that there are significant throughput gains for both wireless networks.
作者: byline    時間: 2025-3-27 02:34

作者: 翻動    時間: 2025-3-27 08:58

作者: 仔細(xì)閱讀    時間: 2025-3-27 11:17

作者: flaggy    時間: 2025-3-27 17:10
Shoudong Zou,Ioanis Nikolaidis,Janelle Harmsapour, droplets or liquid in vegetation. Any insect seeks a suitable microclimate and selects out of the range available to it. Social insects respond in this way when foraging unless they make shelters for bugs or rest stations. These and the true nests are the special features by which social inse
作者: 數(shù)量    時間: 2025-3-27 20:24
Gerald Wagenknecht,Markus Anwander,Torsten BraunHowever, the precise age and the developmental sequence of acquiring skills and knowledge are seldom described. Considerable debate also exists as to the importance of particular modes (e.g., vertical, horizontal, and oblique) and processes (e.g., role of teaching) of cultural transmission. This cha
作者: RODE    時間: 2025-3-27 23:18

作者: Flatus    時間: 2025-3-28 06:03
Mauro Conti,Roberto Di Pietro,Andrea Gabrielli,Luigi Vincenzo Mancini,Alessandro Meit is found, how it is aggregated, and how it produces value .This book shows you how to use social media analytics to optimize your business performance. The tools discussed will prepare you to create and implement an effective digital marketing strategy. From understanding the data and its sources
作者: 可用    時間: 2025-3-28 09:44

作者: ureter    時間: 2025-3-28 12:46

作者: Generator    時間: 2025-3-28 15:54
Seamless Mobility of Senders Transmitting Multi-user Sessions over Heterogeneous Networkss during the handover of multicast senders, and consequently, to avoid the service degradation perceived by receivers is presented in this paper. Simulation results confirm the ability of the proposed mechanism to reduce or completely avoid packet losses, increasing the perceived quality of the rece
作者: 策略    時間: 2025-3-28 19:51

作者: 失望未來    時間: 2025-3-29 00:55

作者: SYN    時間: 2025-3-29 07:06

作者: 罵人有污點    時間: 2025-3-29 07:45
Cristina Cano,Boris Bellalta,Jaume Barceló,Anna Sfairopoulouand social networks.Advanced-level students in electrical engineering and computer science will also find this material useful for their related courses.978-3-319-12321-9978-3-319-12322-6Series ISSN 2191-8112 Series E-ISSN 2191-8120
作者: sundowning    時間: 2025-3-29 13:16
Marcin Brzozowski,Peter Langendoerferesents new forms of social business models that can be used to target low-income markets. Finally, the book presents key success factors related to the social product innovation process and corresponding communication.978-3-642-32149-8978-3-642-32150-4Series ISSN 2191-5482 Series E-ISSN 2191-5490
作者: 在前面    時間: 2025-3-29 19:39
Christian M. Mueller,Harald Eckhardt,Rolf Sigleose contacts to leverage the resources needed for their enterprises, revealing new insights on the process of business creation and economic development in the networked age.978-3-319-02489-9978-3-319-02490-5Series ISSN 2191-5482 Series E-ISSN 2191-5490
作者: gregarious    時間: 2025-3-29 23:13

作者: anesthesia    時間: 2025-3-30 02:30
André Sieber,Karsten Walther,Stefan Nürnberger,J?rg Nolteists of people who do not necessarily know each other, interact, engage in reciprocity, have the same beliefs and values or have a common identity, whereas the people belonging to a group necessarily possess these attributes. Thus while many social categories may also have the attributes of social g
作者: 非實體    時間: 2025-3-30 04:53





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
九龙坡区| 壤塘县| 赣州市| 辽源市| 景泰县| 玉林市| 临江市| 克拉玛依市| 峨山| 罗甸县| 莱西市| 克东县| 合作市| 沁阳市| 龙井市| 丘北县| 宜昌市| 青州市| 什邡市| 兰西县| 南漳县| 旬邑县| 天长市| 正定县| 沂水县| 肃南| 建昌县| 菏泽市| 青海省| 汉中市| 涞水县| 大同市| 乌兰察布市| 灵寿县| 教育| 泽普县| 那曲县| 江城| 合山市| 岳阳市| 宁化县|