標(biāo)題: Titlebook: Wireless Algorithms, Systems, and Applications; 8th International Co Kui Ren,Xue Liu,Kai Xing Conference proceedings 2013 Springer-Verlag B [打印本頁] 作者: 果園 時(shí)間: 2025-3-21 18:11
書目名稱Wireless Algorithms, Systems, and Applications影響因子(影響力)
書目名稱Wireless Algorithms, Systems, and Applications影響因子(影響力)學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications網(wǎng)絡(luò)公開度
書目名稱Wireless Algorithms, Systems, and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications被引頻次
書目名稱Wireless Algorithms, Systems, and Applications被引頻次學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications年度引用
書目名稱Wireless Algorithms, Systems, and Applications年度引用學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications讀者反饋
書目名稱Wireless Algorithms, Systems, and Applications讀者反饋學(xué)科排名
作者: chlorosis 時(shí)間: 2025-3-21 21:14 作者: 發(fā)起 時(shí)間: 2025-3-22 03:02 作者: SEEK 時(shí)間: 2025-3-22 08:29 作者: Aura231 時(shí)間: 2025-3-22 11:59
Chenglin Miao,Liusheng Huang,Weijie Guo,Hongli Xug countries, and providing an in-depth examination of Latin?America, Africa and the Middle East)...?..It is aimed as a resource for a global scholarly audience looking for a detailed presentation of major accounts of corporate social responsibility on an international scale..978-3-030-22438-7作者: 使成核 時(shí)間: 2025-3-22 15:23 作者: DEMN 時(shí)間: 2025-3-22 17:57
Fasheng Wang,Xucheng Li,Mingyu Luesses - e.g., imagination, counterfactual thinking, wonder, play, inspiration, and many others - that define our engagement with new possibilities in domains as diverse as the arts, architecture, design, education and business..Advisory Board:.Alessandro Antonietti, Catholic University of the Sacred作者: 帶來 時(shí)間: 2025-3-22 22:30 作者: 共同時(shí)代 時(shí)間: 2025-3-23 04:00 作者: needle 時(shí)間: 2025-3-23 08:16
Yang Zhang,Dusit Niyato,Ping Wangably along the Belt and Road. Exploring how key Chinese concepts were coined at the beginning of the 20th century through interaction with European languages and how they have evolved, it also includes topics on the search for a universal language in the Chinese language context. Addressing core iss作者: Mitigate 時(shí)間: 2025-3-23 10:29 作者: 類似思想 時(shí)間: 2025-3-23 13:51 作者: modish 時(shí)間: 2025-3-23 19:30 作者: 剛開始 時(shí)間: 2025-3-23 23:57
Ziwei Liu,Chuanbo Wei,Yang Ma,Hui Li,Xiaoguang Niu,Lina Wang作者: 協(xié)奏曲 時(shí)間: 2025-3-24 04:54
Haining Mo,Lina Pu,Yibo Zhu,Zheng Peng,Zaihan Jiang,Jun-Hong Cui作者: AGOG 時(shí)間: 2025-3-24 07:49
Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks, used for an image, the proposed algorithm is fairly efficient and thus can perform fast encryption on large volume of JPEG 2000 images in WMSN. Experimental results and their analysis show that the algorithm is secure and energy saving, meanwhile, it does not impair the compression performance of JPEG 2000 coding obviously.作者: Dawdle 時(shí)間: 2025-3-24 14:21 作者: indubitable 時(shí)間: 2025-3-24 17:04
Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems,re. In this paper, we propose to design better proposal distribution using a new version of unscented Kalman filter- the iterated unscented Kalman filter (IUKF). The IUKF makes use of both statistical and analytical linearization techniques in different steps of the filtering process, which makes it作者: MAUVE 時(shí)間: 2025-3-24 20:42
Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD,rea is investigated. A simple mathematical model mapping from control channel performance to data channel throughput is employed to estimate system performance when considering the impact of the adjacent channel interference (ACI) on the control channels. The simulation results indicate that the ACI作者: 血統(tǒng) 時(shí)間: 2025-3-25 02:52 作者: disciplined 時(shí)間: 2025-3-25 03:29
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices,m the decisional Diffie-Hellman assumption and the difficulty of a new problem – modular inversion hidden number problem with error (MIHNPwE). The latter can be seen as a generalization of the modular inversion hidden number problem. We give an analysis on the hardness of MIHNPwE by lattice techniqu作者: 相同 時(shí)間: 2025-3-25 08:50 作者: reserve 時(shí)間: 2025-3-25 12:39 作者: BOOR 時(shí)間: 2025-3-25 17:02 作者: GEN 時(shí)間: 2025-3-25 22:30
A Novel Delay-Resilient Remote Memory Attestation for Smart Grid,versary could launch code injection attacks to compromise these measurement devices and gain benefits by these compromised devices. To deal with this issue, a number of attestation schemes have been designed to defense the malicious attacks in the past. However, because the detection methods of thes作者: 吝嗇性 時(shí)間: 2025-3-26 02:59
A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Uhich two sources intend to exchange information with help of one relay. The joint source-relay selection with power allocation is proposed to minimize the total transmit power subject to constraints on the received signal-to-noise-ratio (SNR) of each source node. We show that this problem has a clos作者: Shuttle 時(shí)間: 2025-3-26 06:33
Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks,ave studied the NP-hard broadcast problem in multi-hop networks. However, most of them assume a single-channel and single-radio wireless network model. We investigate broadcast in multi-channel multi-radio wireless mesh networks. In multi-channel multi-radio wireless mesh networks, the wireless inte作者: 衰老 時(shí)間: 2025-3-26 08:47
SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation,reless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better spectrum usage. In this paper, we model the problem of 作者: 絕緣 時(shí)間: 2025-3-26 12:52
A Context-Aware MAC Protocol for VANETs,in vehicular ad-hoc networks (VANETs). However, with the increase of the vehicle node density, the channel contention collision of IEEE 802.11p known as the media access control (MAC) protocol standard for VANETs increases as well. Aiming at this problem, we propose a context-aware MAC protocol for 作者: Pepsin 時(shí)間: 2025-3-26 19:34 作者: 急急忙忙 時(shí)間: 2025-3-26 23:19 作者: 逢迎白雪 時(shí)間: 2025-3-27 04:42 作者: 招待 時(shí)間: 2025-3-27 05:18
A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Aconistic network coding supported quadri-stage contention protocol (NC-QSCP), has been proposed. The QSCP employs a concentrated contention procedure to form a transmission schedule, according to which nodes can perform collision free channel access in the following dedicated transmission stage. A con作者: 煤渣 時(shí)間: 2025-3-27 11:39
Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks,The algorithm selectively encrypts the lookup table of probability model in MQ coding. As the size of lookup table is fixed and only such one table is used for an image, the proposed algorithm is fairly efficient and thus can perform fast encryption on large volume of JPEG 2000 images in WMSN. Exper作者: 話 時(shí)間: 2025-3-27 15:35 作者: 曲解 時(shí)間: 2025-3-27 20:26
ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radion the signal propagation path. Activities in the proximity of a receiver can thus induce a characteristic pattern on amplitude-based features. We investigate the use of the radio frequency channel to detect activities. ActiviTune, our passive device-free recognition system, implements a multi-stage 作者: Delectable 時(shí)間: 2025-3-27 22:01 作者: EVICT 時(shí)間: 2025-3-28 02:17 作者: laparoscopy 時(shí)間: 2025-3-28 08:59 作者: prosthesis 時(shí)間: 2025-3-28 14:00 作者: 致敬 時(shí)間: 2025-3-28 15:01 作者: libertine 時(shí)間: 2025-3-28 21:21 作者: Blemish 時(shí)間: 2025-3-28 23:38 作者: 富足女人 時(shí)間: 2025-3-29 04:01 作者: 彎腰 時(shí)間: 2025-3-29 07:37
ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio the monitored entities with any active component of the system. We experimentally demonstrate the distinction of two dynamic activities, ’walking’, ’crawling’, and three static activities, ’empty room’, ’standing’, ’lying’ with an average true positive rate of over 80%.作者: 神圣將軍 時(shí)間: 2025-3-29 14:58 作者: 講個(gè)故事逗他 時(shí)間: 2025-3-29 15:40 作者: 節(jié)省 時(shí)間: 2025-3-29 21:42
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices,es. In our construction, we generate each user’s partial private key in the form of an MIHNPwE instance. The hardness of MIHNPwE provides our scheme with resistance against key-collusion attacks from any number of traitors.作者: DEMUR 時(shí)間: 2025-3-30 00:24
UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs,Routing (UCOR) protocol to reduce redundant network traffic. The protocol can further increase packets delivery ratio, decrease network delay and achieve more balanced and lower energy consumption. Experiment results show that UCOR protocol prolongs network longevity by about 20% to support for larger scale network, compared with HEED, EEUC, etc.作者: JOT 時(shí)間: 2025-3-30 06:28 作者: Microgram 時(shí)間: 2025-3-30 12:04 作者: profligate 時(shí)間: 2025-3-30 15:51 作者: Constrain 時(shí)間: 2025-3-30 17:47 作者: 機(jī)械 時(shí)間: 2025-3-30 22:02
978-3-642-39700-4Springer-Verlag Berlin Heidelberg 2013作者: 相符 時(shí)間: 2025-3-31 02:38 作者: 野蠻 時(shí)間: 2025-3-31 05:46 作者: kidney 時(shí)間: 2025-3-31 10:07 作者: negotiable 時(shí)間: 2025-3-31 15:23 作者: 同位素 時(shí)間: 2025-3-31 20:55 作者: triptans 時(shí)間: 2025-3-31 22:10 作者: 慷慨不好 時(shí)間: 2025-4-1 05:55