標(biāo)題: Titlebook: Wireless Algorithms, Systems, and Applications; 11th International C Qing Yang,Wei Yu,Yacine Challal Conference proceedings 2016 Springer I [打印本頁] 作者: peak-flow-meter 時(shí)間: 2025-3-21 19:38
書目名稱Wireless Algorithms, Systems, and Applications影響因子(影響力)
書目名稱Wireless Algorithms, Systems, and Applications影響因子(影響力)學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications網(wǎng)絡(luò)公開度
書目名稱Wireless Algorithms, Systems, and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications被引頻次
書目名稱Wireless Algorithms, Systems, and Applications被引頻次學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications年度引用
書目名稱Wireless Algorithms, Systems, and Applications年度引用學(xué)科排名
書目名稱Wireless Algorithms, Systems, and Applications讀者反饋
書目名稱Wireless Algorithms, Systems, and Applications讀者反饋學(xué)科排名
作者: 進(jìn)入 時(shí)間: 2025-3-21 23:12 作者: Antimicrobial 時(shí)間: 2025-3-22 03:40 作者: Hyperplasia 時(shí)間: 2025-3-22 04:49
iBeaconing: A Low-Cost, Wireless Student Protection System,r, which is retrieved by the smartphone application, prompting a system-wide alert to be triggered. The benefits of implementing such a system include cost-effectiveness and a decrease in the latent period between alert detection and action.作者: Occipital-Lobe 時(shí)間: 2025-3-22 10:11 作者: 量被毀壞 時(shí)間: 2025-3-22 14:12
Wenlin Han,Yang Xiaocal widmen. über Pascal gibt es ganze Bibliotheken, über den Briefwechsel zwischen Pascal und Fermat einiges, doch nichts über die Wechselwirkung zwischen Pascal und Méré auf die Wahrscheinlichkeitstheorie. Nebenbei wird mit abfallen, wie sich Mérés berühmte Fragen aus seiner geistigen Haltung ergab作者: 600 時(shí)間: 2025-3-22 19:31 作者: Lipoprotein(A) 時(shí)間: 2025-3-22 22:50
0302-9743 ment and implementations, experimental study and testbedvalidation, and new application exploration in wireless networks..978-3-319-42835-2978-3-319-42836-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 糾纏,纏繞 時(shí)間: 2025-3-23 05:08
Hansong Guo,He Huang,Jianxin Wang,Shaojie Tang,Zhenhua Zhao,Zehao Sun,Yu-E Sun,Liusheng Huang,Hengch作者: 罐里有戒指 時(shí)間: 2025-3-23 08:17 作者: negligence 時(shí)間: 2025-3-23 10:20
Liguo Zhang,Jianguo Sun,Weimiao Feng,Junyu Lin,Qing Yang作者: 胰臟 時(shí)間: 2025-3-23 14:39
Kai Fan,Panfei Song,Zhao Du,Haojin Zhu,Hui Li,Yintang Yang,Xinghua Li,Chao Yang作者: BLUSH 時(shí)間: 2025-3-23 18:13
Jinbao Li,Li Zhang,Longjiang Guo,Qianqian Ren,Yahong Guo作者: 友好 時(shí)間: 2025-3-24 00:22 作者: 凹槽 時(shí)間: 2025-3-24 03:26
Ke Lin,Siyao Cheng,Yingshu Li,Jianzhong Li,Hong Gao,Hongzhi Wang作者: 連系 時(shí)間: 2025-3-24 09:26
Zhenhua Zhao,Zehao Sun,Liusheng Huang,Hansong Guo,Jianxin Wang,Hongli Xu作者: ostracize 時(shí)間: 2025-3-24 12:36 作者: 使堅(jiān)硬 時(shí)間: 2025-3-24 18:12
,: Design Fault-Tolerant Relay Node Deployment Strategy for Throwbox-Based DTNs,N, called ., where each mobile node can communicate with at least two relay nodes within its activity scope. Simulation results based on Tuscaloosa bus transit system have shown its effectiveness and high efficiency when compared to two types of popular relay node deployment strategies in the literature.作者: 雪上輕舟飛過 時(shí)間: 2025-3-24 20:18
SUO: Social Reciprocity Based Cooperative Mobile Data Traffic Communication,optimization model, namely ., for the problem formulation. Furthermore, we then propose a distributed update algorithm for users to reach the optimal decisions. We evaluate the performance of our proposed algorithm by numerical studies using real data, and thereby draw useful engineering insights for the operation of wireless providers.作者: MINT 時(shí)間: 2025-3-24 23:44 作者: 構(gòu)想 時(shí)間: 2025-3-25 05:19
Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks,tion occurs, and the protocol can keep the data transmission rate unchangeable, and the proposed routing protocol can choose other path to transmit data in order to reduce the number of data missing. Simulation results indicate that the proposed protocol can deal with congestion and improves the network throughput effectively.作者: dry-eye 時(shí)間: 2025-3-25 07:56 作者: 強(qiáng)制性 時(shí)間: 2025-3-25 11:45 作者: ALT 時(shí)間: 2025-3-25 16:01
,Tensor Filter: Collaborative Path Inference from?GPS Snippets of Vehicles,ing a large scale real world dataset, which has one-month location data from more than eight thousand taxis in Beijing. The evaluation results show that our method outperforms state-of-the-art techniques.作者: Neuropeptides 時(shí)間: 2025-3-25 22:04
SHMDRS: A Smartphone-Based Human Motion Detection and Response System,the methods for detecting the human motion and responding accordingly are also given. Comparing with the traditional systems, the newly-proposed motion detection system is server-free and does not require any special devices. Moreover, the location-aware problem is also considered while designing the response module in the system.作者: curettage 時(shí)間: 2025-3-26 02:00
Conference proceedings 2016o, effective and efficientstate-of-the-art algorithm design and analysis, reliable and securesystem development and implementations, experimental study and testbedvalidation, and new application exploration in wireless networks..作者: Endometrium 時(shí)間: 2025-3-26 05:41
Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles,er constructed from a series of refined features. We conduct extensive experiments, and evaluation results demonstrate that Tefnut can detect the rain with 96.0?% true positive rate, when deciding with a one-second-long in-vehicle audio segment only.作者: 使隔離 時(shí)間: 2025-3-26 08:30 作者: 過于平凡 時(shí)間: 2025-3-26 14:22
Distributed Constrained Optimization Over Cloud-Based Multi-agent Networks,layer. They exchange their intermediate variables so as to collaboratively obtain a network-wide optimal solution. Numerical experiments demonstrate the effectiveness of the proposed distributed constrained optimization algorithm.作者: nullify 時(shí)間: 2025-3-26 18:25 作者: 緊張過度 時(shí)間: 2025-3-26 22:02 作者: 恭維 時(shí)間: 2025-3-27 04:46 作者: FID 時(shí)間: 2025-3-27 08:12
Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems, tags. However, the degree of tags’ privacy will decrease should some tags in the system be compromised by correlating tampered group keys. Improving the degree of tags’ privacy in keeping with fast authentication speed is equivalent to reducing the correlation probability of group keys. To this end作者: 摸索 時(shí)間: 2025-3-27 11:11 作者: GRE 時(shí)間: 2025-3-27 17:09
A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications, for . in wireless networks are resorted to the ellipsoid method for linear programming exclusively. However, the ellipsoid method can require an inordinate amount of running time and memory even for a moderate sized input, and consequently is often unusable in practice. This paper presents a comple作者: 最低點(diǎn) 時(shí)間: 2025-3-27 20:12 作者: BROOK 時(shí)間: 2025-3-28 00:36
CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid,s where there is only one independent adversary, a colluded non-technical loss fraud happens when a smart meter is tampered by one or more co-existing or collaborating adversaries. The behavior of one adversary may be covered by others and cannot be detected easily by the traditional detection metho作者: 預(yù)知 時(shí)間: 2025-3-28 05:19 作者: 原諒 時(shí)間: 2025-3-28 08:18 作者: sultry 時(shí)間: 2025-3-28 14:18 作者: 極微小 時(shí)間: 2025-3-28 14:52 作者: amplitude 時(shí)間: 2025-3-28 21:56
,Tensor Filter: Collaborative Path Inference from?GPS Snippets of Vehicles,noisy and incomplete data captured by GPS devices mounted on vehicles. We propose a collaborative filter model to incorporate both static and dynamic context information to achieve highly accurate path inference. A tensor decomposition technique is adopted to extract context-aware spatial and tempor作者: BIBLE 時(shí)間: 2025-3-29 02:47
NFC Secure Payment and Verification Scheme for Mobile Payment,unication technology well suited for electronic tickets, micro-payment and access control function, which is widely used in the financial industry, traffic transport, road ban control and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such作者: Adherent 時(shí)間: 2025-3-29 03:27
Multi-path Reliable Routing with Pipeline Schedule in Wireless Sensor Networks,outing protocol. This protocol combines the technique of pipeline with multi-path reliable routing, and uses Markov chain?to predict the period of using pipeline in order to schedule pipeline dynamically. Therefore, the combined techniques improve the network throughput. In the case that data conges作者: Expiration 時(shí)間: 2025-3-29 10:13
A QoE-Aware Adaptive Spectrum Allocation Framework for Secondary Mobile Networks,g to wireless services and over 40?% of US citizens carry smartphones. This trend is expected to continue in the future at much faster growth rates, and spectrum scarcity becomes a problem. Dynamic spectrum allocation has been proposed as a solution to improve spectrum efficiency and increase the sp作者: conifer 時(shí)間: 2025-3-29 11:34 作者: Armory 時(shí)間: 2025-3-29 16:42 作者: Omnipotent 時(shí)間: 2025-3-29 21:22 作者: VOK 時(shí)間: 2025-3-30 00:49 作者: 使閉塞 時(shí)間: 2025-3-30 06:29
iBeaconing: A Low-Cost, Wireless Student Protection System,chools, teachers have the two-pronged task of instructing and monitoring these children. In order to simplify this task, we propose integrating new iBeacon technology with the capability of Raspberry Pi computers to construct an entry/exit scanning system. The students will be wearing iBeacon equipp作者: FACET 時(shí)間: 2025-3-30 12:15
The Power Control Strategy for Mine Locomotive Wireless Network Based on Successive Interference Cahe underground working environment is not safe and thus it is important to maintain high quality communication links. We consider throughput maximization for a mine locomotive wireless network with successive interference cancellation (SIC) and power control. We define time segments such that within作者: vector 時(shí)間: 2025-3-30 16:14
Conference proceedings 2016, MT, USA, in August 2016.The 50 full papers and 9 invited papers presented werde carefully reviewed and selected from 148 submissions.?.WASA is designed to be a forum for theoreticians, system and applicationdesigners, protocol developers and practitioners to discuss and expresstheir views on the c作者: 不能妥協(xié) 時(shí)間: 2025-3-30 18:13
978-3-319-42835-2Springer International Publishing Switzerland 2016作者: fibula 時(shí)間: 2025-3-30 22:12 作者: Parameter 時(shí)間: 2025-3-31 02:39
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/w/image/1028937.jpg作者: 統(tǒng)治人類 時(shí)間: 2025-3-31 05:40 作者: 災(zāi)禍 時(shí)間: 2025-3-31 09:27
Qing Yang,Wei Yu,Yacine ChallalIncludes supplementary material: 作者: 使堅(jiān)硬 時(shí)間: 2025-3-31 16:32
Wenlin Han,Yang Xiaoen Zündfunken zur Entstehung einer neuen Wissenschaft gegeben habe. Nur noch hier und in Fu?noten von Aufgabensammlungen hat sich sein Name erhalten, ansonsten ist er selbst in Frankreich weitgehend vergessen. Im Petit Larousse wird er nur knapp erw?hnt:.Ein Schiedsrichter des guten Geschmacks und e作者: colostrum 時(shí)間: 2025-3-31 17:57
Bing Feng,Chi Zhang,Lingbo Wei,Yuguang Fangtens. Die exakte Beschreibung verlangt Kenntnis der Punktabst?nde und der genauen Lagebeziehungen der Punkte zueinander. Sie ist durchführbar, wenn, bezogen auf einen bestimmten Punkt als Nullpunkt und bestimmte Richtungen als Koordinatenachsen, die Koordinaten der einzelnen Punkte angegeben werden.作者: VERT 時(shí)間: 2025-3-31 22:38
Estimating the Thickness of Sediment Removed at an Unconformity Using Vitrinite Reflectance Data,PRA) and in one well from the Rharb basin of Morocco. The predicted magnitudes of the erosional events determined from vitrinite reflectance match the regional geology, suggesting that the system may be useful in areas where well and vitrinite reflectance data exist but regional geologic control is poor.作者: FRONT 時(shí)間: 2025-4-1 04:25
Machine Learning and Knowledge Discovery in Databases. Applied Data Science TrackEuropean Conference,作者: SLAG 時(shí)間: 2025-4-1 08:13 作者: 比目魚 時(shí)間: 2025-4-1 12:19