派博傳思國(guó)際中心

標(biāo)題: Titlebook: Wireless Algorithms, Systems, and Applications; 8th International Co Kui Ren,Xue Liu,Kai Xing Conference proceedings 2013 Springer-Verlag B [打印本頁]

作者: 果園    時(shí)間: 2025-3-21 18:11
書目名稱Wireless Algorithms, Systems, and Applications影響因子(影響力)




書目名稱Wireless Algorithms, Systems, and Applications影響因子(影響力)學(xué)科排名




書目名稱Wireless Algorithms, Systems, and Applications網(wǎng)絡(luò)公開度




書目名稱Wireless Algorithms, Systems, and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Wireless Algorithms, Systems, and Applications被引頻次




書目名稱Wireless Algorithms, Systems, and Applications被引頻次學(xué)科排名




書目名稱Wireless Algorithms, Systems, and Applications年度引用




書目名稱Wireless Algorithms, Systems, and Applications年度引用學(xué)科排名




書目名稱Wireless Algorithms, Systems, and Applications讀者反饋




書目名稱Wireless Algorithms, Systems, and Applications讀者反饋學(xué)科排名





作者: chlorosis    時(shí)間: 2025-3-21 21:14

作者: 發(fā)起    時(shí)間: 2025-3-22 03:02

作者: SEEK    時(shí)間: 2025-3-22 08:29

作者: Aura231    時(shí)間: 2025-3-22 11:59
Chenglin Miao,Liusheng Huang,Weijie Guo,Hongli Xug countries, and providing an in-depth examination of Latin?America, Africa and the Middle East)...?..It is aimed as a resource for a global scholarly audience looking for a detailed presentation of major accounts of corporate social responsibility on an international scale..978-3-030-22438-7
作者: 使成核    時(shí)間: 2025-3-22 15:23

作者: DEMN    時(shí)間: 2025-3-22 17:57
Fasheng Wang,Xucheng Li,Mingyu Luesses - e.g., imagination, counterfactual thinking, wonder, play, inspiration, and many others - that define our engagement with new possibilities in domains as diverse as the arts, architecture, design, education and business..Advisory Board:.Alessandro Antonietti, Catholic University of the Sacred
作者: 帶來    時(shí)間: 2025-3-22 22:30

作者: 共同時(shí)代    時(shí)間: 2025-3-23 04:00

作者: needle    時(shí)間: 2025-3-23 08:16
Yang Zhang,Dusit Niyato,Ping Wangably along the Belt and Road. Exploring how key Chinese concepts were coined at the beginning of the 20th century through interaction with European languages and how they have evolved, it also includes topics on the search for a universal language in the Chinese language context. Addressing core iss
作者: Mitigate    時(shí)間: 2025-3-23 10:29

作者: 類似思想    時(shí)間: 2025-3-23 13:51

作者: modish    時(shí)間: 2025-3-23 19:30

作者: 剛開始    時(shí)間: 2025-3-23 23:57
Ziwei Liu,Chuanbo Wei,Yang Ma,Hui Li,Xiaoguang Niu,Lina Wang
作者: 協(xié)奏曲    時(shí)間: 2025-3-24 04:54
Haining Mo,Lina Pu,Yibo Zhu,Zheng Peng,Zaihan Jiang,Jun-Hong Cui
作者: AGOG    時(shí)間: 2025-3-24 07:49
Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks, used for an image, the proposed algorithm is fairly efficient and thus can perform fast encryption on large volume of JPEG 2000 images in WMSN. Experimental results and their analysis show that the algorithm is secure and energy saving, meanwhile, it does not impair the compression performance of JPEG 2000 coding obviously.
作者: Dawdle    時(shí)間: 2025-3-24 14:21

作者: indubitable    時(shí)間: 2025-3-24 17:04
Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems,re. In this paper, we propose to design better proposal distribution using a new version of unscented Kalman filter- the iterated unscented Kalman filter (IUKF). The IUKF makes use of both statistical and analytical linearization techniques in different steps of the filtering process, which makes it
作者: MAUVE    時(shí)間: 2025-3-24 20:42
Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD,rea is investigated. A simple mathematical model mapping from control channel performance to data channel throughput is employed to estimate system performance when considering the impact of the adjacent channel interference (ACI) on the control channels. The simulation results indicate that the ACI
作者: 血統(tǒng)    時(shí)間: 2025-3-25 02:52

作者: disciplined    時(shí)間: 2025-3-25 03:29
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices,m the decisional Diffie-Hellman assumption and the difficulty of a new problem – modular inversion hidden number problem with error (MIHNPwE). The latter can be seen as a generalization of the modular inversion hidden number problem. We give an analysis on the hardness of MIHNPwE by lattice techniqu
作者: 相同    時(shí)間: 2025-3-25 08:50

作者: reserve    時(shí)間: 2025-3-25 12:39

作者: BOOR    時(shí)間: 2025-3-25 17:02

作者: GEN    時(shí)間: 2025-3-25 22:30
A Novel Delay-Resilient Remote Memory Attestation for Smart Grid,versary could launch code injection attacks to compromise these measurement devices and gain benefits by these compromised devices. To deal with this issue, a number of attestation schemes have been designed to defense the malicious attacks in the past. However, because the detection methods of thes
作者: 吝嗇性    時(shí)間: 2025-3-26 02:59
A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Uhich two sources intend to exchange information with help of one relay. The joint source-relay selection with power allocation is proposed to minimize the total transmit power subject to constraints on the received signal-to-noise-ratio (SNR) of each source node. We show that this problem has a clos
作者: Shuttle    時(shí)間: 2025-3-26 06:33
Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks,ave studied the NP-hard broadcast problem in multi-hop networks. However, most of them assume a single-channel and single-radio wireless network model. We investigate broadcast in multi-channel multi-radio wireless mesh networks. In multi-channel multi-radio wireless mesh networks, the wireless inte
作者: 衰老    時(shí)間: 2025-3-26 08:47
SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation,reless applications cannot use idle spectrum even though it is left unused by the owner for a long period of time. The low utilization of already scarce spectrum resource requires us to dynamically reallocate the idle spectrum to achieve better spectrum usage. In this paper, we model the problem of
作者: 絕緣    時(shí)間: 2025-3-26 12:52
A Context-Aware MAC Protocol for VANETs,in vehicular ad-hoc networks (VANETs). However, with the increase of the vehicle node density, the channel contention collision of IEEE 802.11p known as the media access control (MAC) protocol standard for VANETs increases as well. Aiming at this problem, we propose a context-aware MAC protocol for
作者: Pepsin    時(shí)間: 2025-3-26 19:34

作者: 急急忙忙    時(shí)間: 2025-3-26 23:19

作者: 逢迎白雪    時(shí)間: 2025-3-27 04:42

作者: 招待    時(shí)間: 2025-3-27 05:18
A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Aconistic network coding supported quadri-stage contention protocol (NC-QSCP), has been proposed. The QSCP employs a concentrated contention procedure to form a transmission schedule, according to which nodes can perform collision free channel access in the following dedicated transmission stage. A con
作者: 煤渣    時(shí)間: 2025-3-27 11:39
Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks,The algorithm selectively encrypts the lookup table of probability model in MQ coding. As the size of lookup table is fixed and only such one table is used for an image, the proposed algorithm is fairly efficient and thus can perform fast encryption on large volume of JPEG 2000 images in WMSN. Exper
作者: 話    時(shí)間: 2025-3-27 15:35

作者: 曲解    時(shí)間: 2025-3-27 20:26
ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radion the signal propagation path. Activities in the proximity of a receiver can thus induce a characteristic pattern on amplitude-based features. We investigate the use of the radio frequency channel to detect activities. ActiviTune, our passive device-free recognition system, implements a multi-stage
作者: Delectable    時(shí)間: 2025-3-27 22:01

作者: EVICT    時(shí)間: 2025-3-28 02:17

作者: laparoscopy    時(shí)間: 2025-3-28 08:59

作者: prosthesis    時(shí)間: 2025-3-28 14:00

作者: 致敬    時(shí)間: 2025-3-28 15:01

作者: libertine    時(shí)間: 2025-3-28 21:21

作者: Blemish    時(shí)間: 2025-3-28 23:38

作者: 富足女人    時(shí)間: 2025-3-29 04:01

作者: 彎腰    時(shí)間: 2025-3-29 07:37
ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio the monitored entities with any active component of the system. We experimentally demonstrate the distinction of two dynamic activities, ’walking’, ’crawling’, and three static activities, ’empty room’, ’standing’, ’lying’ with an average true positive rate of over 80%.
作者: 神圣將軍    時(shí)間: 2025-3-29 14:58

作者: 講個(gè)故事逗他    時(shí)間: 2025-3-29 15:40

作者: 節(jié)省    時(shí)間: 2025-3-29 21:42
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices,es. In our construction, we generate each user’s partial private key in the form of an MIHNPwE instance. The hardness of MIHNPwE provides our scheme with resistance against key-collusion attacks from any number of traitors.
作者: DEMUR    時(shí)間: 2025-3-30 00:24
UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs,Routing (UCOR) protocol to reduce redundant network traffic. The protocol can further increase packets delivery ratio, decrease network delay and achieve more balanced and lower energy consumption. Experiment results show that UCOR protocol prolongs network longevity by about 20% to support for larger scale network, compared with HEED, EEUC, etc.
作者: JOT    時(shí)間: 2025-3-30 06:28

作者: Microgram    時(shí)間: 2025-3-30 12:04

作者: profligate    時(shí)間: 2025-3-30 15:51

作者: Constrain    時(shí)間: 2025-3-30 17:47

作者: 機(jī)械    時(shí)間: 2025-3-30 22:02
978-3-642-39700-4Springer-Verlag Berlin Heidelberg 2013
作者: 相符    時(shí)間: 2025-3-31 02:38

作者: 野蠻    時(shí)間: 2025-3-31 05:46

作者: kidney    時(shí)間: 2025-3-31 10:07

作者: negotiable    時(shí)間: 2025-3-31 15:23

作者: 同位素    時(shí)間: 2025-3-31 20:55

作者: triptans    時(shí)間: 2025-3-31 22:10

作者: 慷慨不好    時(shí)間: 2025-4-1 05:55





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
吉隆县| 沿河| 九江县| 乌鲁木齐市| 赞皇县| 凤翔县| 庆元县| 旅游| 武威市| 鄂托克旗| 仙桃市| 东阿县| 布拖县| 海原县| 双峰县| 靖远县| 彰化市| 城步| 黑龙江省| 嵊州市| 肇庆市| 桂林市| 静安区| 石家庄市| 沅江市| 建湖县| 盐池县| 西乌珠穆沁旗| 孙吴县| 江川县| 固阳县| 汽车| 甘泉县| 光山县| 娄烦县| 淮南市| 新化县| 宣汉县| 定日县| 曲靖市| 高雄县|