標(biāo)題: Titlebook: Ad Hoc Networks; 6th International IC Natalie Mitton,Antoine Gallais,Symeon Papavassilio Conference proceedings 2014 Institute for Computer [打印本頁(yè)] 作者: 憑票入場(chǎng) 時(shí)間: 2025-3-21 18:41
書(shū)目名稱Ad Hoc Networks影響因子(影響力)
書(shū)目名稱Ad Hoc Networks影響因子(影響力)學(xué)科排名
書(shū)目名稱Ad Hoc Networks網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Ad Hoc Networks網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Ad Hoc Networks被引頻次
書(shū)目名稱Ad Hoc Networks被引頻次學(xué)科排名
書(shū)目名稱Ad Hoc Networks年度引用
書(shū)目名稱Ad Hoc Networks年度引用學(xué)科排名
書(shū)目名稱Ad Hoc Networks讀者反饋
書(shū)目名稱Ad Hoc Networks讀者反饋學(xué)科排名
作者: 壓迫 時(shí)間: 2025-3-21 20:23 作者: 網(wǎng)絡(luò)添麻煩 時(shí)間: 2025-3-22 03:18 作者: 切割 時(shí)間: 2025-3-22 05:44 作者: persistence 時(shí)間: 2025-3-22 12:39 作者: Encoding 時(shí)間: 2025-3-22 14:49
https://doi.org/10.1007/978-3-031-65430-5nd interests. These groups can be used to reduce the propagation of irrelevant and redundant information and can be used also for group-based applications such as caravaning. This paper investigates the groups formation behavior under the dynamic topology of vehicular networks through different trac作者: 大暴雨 時(shí)間: 2025-3-22 20:47 作者: CODA 時(shí)間: 2025-3-22 21:48 作者: Individual 時(shí)間: 2025-3-23 04:37 作者: 偽造者 時(shí)間: 2025-3-23 05:36
Advances in Italian Mechanism Scienceetwork at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this “sensory data image”. Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting 作者: 精確 時(shí)間: 2025-3-23 09:44 作者: Femish 時(shí)間: 2025-3-23 15:03 作者: 阻止 時(shí)間: 2025-3-23 18:17
Advances in Italian Mechanism Scienceved within a certain time interval. This time interval is referred to as . (RTO) and setting its value is critical to reduce the packet delay in Smart Grid Advanced Metering Infrastructure (AMI) networks. In this paper, we propose a novel mechanism to set the RTO of each smart meter (SM) to improve 作者: larder 時(shí)間: 2025-3-24 01:32
https://doi.org/10.1007/978-981-97-4324-7arch applications. The sensors usually use a routing protocol in order to deliver the sensing data to a Base Station (BS) which may be far away from the monitoring area. Many algorithms proposed in the literature compute the routing process by clustering the network and by designing new election mec作者: 初學(xué)者 時(shí)間: 2025-3-24 04:34
Harsh Vara,Mithilesh K. Dikshitnumber of mobile users. A node operating in a . behaves the same way a blind person moving in our universe by developing his own representation with his stick, a mechanism known in the literature as .. To reduce this blindness, several methods have been developed that are based on community behavior作者: 愛(ài)哭 時(shí)間: 2025-3-24 08:30 作者: 下邊深陷 時(shí)間: 2025-3-24 11:35
The Role of Digitization in Manufacturing,ata offloading techniques based on device-to-device communications to alleviate their infrastructure. In this paper, we consider a specific scenario in which the cellular channel has severe capacity limitations. Existing offloading techniques focus on the underlying communication mechanisms and fail作者: Tailor 時(shí)間: 2025-3-24 15:07 作者: 你不公正 時(shí)間: 2025-3-24 20:20 作者: 帶來(lái) 時(shí)間: 2025-3-24 23:15
Lin Liu,Guoxing Sun,Liang Xu,Zhangdong Sun Vehicular Networks (VNs). Due to these dynamic topological changes, maintaining full connectivity arises as a main communication challenge in VNs. Moreover, the high number of channel switching also effects the quality of network connectivity causing an another significant problem in VNs. In order 作者: indenture 時(shí)間: 2025-3-25 06:51
Zhuqin Wei,Haokun Li,Guannan Li,Ru Wangse of mantainance in these environments. Expecially in a event-based WSN, where is necessary a prompt response in terms of data processing and offloading, a set of mobile flying sinks could be a good option for the role of autonomous data collectors. For those reasons in this paper we propose a dist作者: 褲子 時(shí)間: 2025-3-25 08:09
Ad Hoc Networks978-3-319-13329-4Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: congenial 時(shí)間: 2025-3-25 15:10 作者: vanquish 時(shí)間: 2025-3-25 17:32 作者: 賠償 時(shí)間: 2025-3-25 20:27 作者: 威脅你 時(shí)間: 2025-3-26 04:13 作者: 夸張 時(shí)間: 2025-3-26 08:21
Anthropomorphic Neck for a Crash Dummy we have proposed effective security and privacy-preserving mechanism for aggregator based V2G network, which is built on ECC-based restrictive partially blind signature. We have provided security analysis and shown that the proposed mechanism is efficient than existing ones in terms of computational overheads.作者: MUMP 時(shí)間: 2025-3-26 11:03
Harsh Vara,Mithilesh K. Dikshitrception of groupings of individuals. We attache our proposal to tests in simulated environment which shows that indeed the stability of wireless network is more sustainable when the perception exists that in its absence.作者: 技術(shù) 時(shí)間: 2025-3-26 13:40 作者: GLUE 時(shí)間: 2025-3-26 17:40 作者: HEPA-filter 時(shí)間: 2025-3-26 23:57 作者: appall 時(shí)間: 2025-3-27 04:05
Zhuqin Wei,Haokun Li,Guannan Li,Ru Wangmplete coverage of the area where the nodes lie, it is possible to promptly notify a mobile sink about the presence of data to offload, drive it to the interested area and achieve interesting performances.作者: 生命層 時(shí)間: 2025-3-27 05:24
Conference proceedings 2014ece, in August 2014. The 16 regular and invited papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, such as mobile ad hoc networks, sensor networks, vehicular networks, intelligent transportation systems, wireless sensor networks se作者: insurgent 時(shí)間: 2025-3-27 11:46 作者: Innocence 時(shí)間: 2025-3-27 15:09 作者: BOON 時(shí)間: 2025-3-27 18:03 作者: CUB 時(shí)間: 2025-3-27 23:35 作者: 思想上升 時(shí)間: 2025-3-28 04:33
1867-8211 tworks, ADHOCNETS 2014, held in Rhodes, Greece, in August 2014. The 16 regular and invited papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, such as mobile ad hoc networks, sensor networks, vehicular networks, intelligent transpor作者: 祖?zhèn)?nbsp; 時(shí)間: 2025-3-28 08:20
Traffic-Aware Access-Points Deployment Strategies for VANETSnstleistungen untersuchen. Jene qualitativen Analysen der strukturellen Verflechtung innerhalb des Produktionssystems gewinnen jedoch gerade dann an Bedeutung, wenn quantitative Gesetzesaussagen über den Zusammenhang zwischen Input, Throughput un978-3-8349-3658-5978-3-8349-3659-2作者: eardrum 時(shí)間: 2025-3-28 11:17 作者: Brocas-Area 時(shí)間: 2025-3-28 16:17
Connectivity Provisioning Using Cognitive Channel Selection in Vehicular Networksrdisierung von Verfahren mit allen vorkommenden Varianten innerhalb einer Einheit wie der MRN oder der EU zu einer gesteigerten Komplexit?t der Verfahren z.B. für L?nder und Kommunen führen und somit h?here Kosten verursachen kann. Die gewonnenen Erkenntnisse sind auch über den ?ffentlichen Sektor hinaus von 978-3-8349-1137-7978-3-8349-9862-0作者: 名義上 時(shí)間: 2025-3-28 20:15 作者: glacial 時(shí)間: 2025-3-29 01:24
https://doi.org/10.1007/978-981-97-4324-7signal strength of the links between neighbouring nodes to elect the most stable route. Such route will be used as the primary choice to forward traffic. The other discovered routes will be maintained as backup in order to eventually replace the primary route, in case of disruption or degradation of作者: glomeruli 時(shí)間: 2025-3-29 07:02
Amin Abdollahzadeh,Behrouz Bagheri Vananiing is minimized. We formulate our optimization problem as an integer linear program and comparatively evaluate the energy cost of varying switching energy consumption with constant switching energy consumption. Our simulation results indicate that taking into account the different energy consumptio作者: output 時(shí)間: 2025-3-29 10:54 作者: Judicious 時(shí)間: 2025-3-29 12:59
A Social-Based Approach for Message Dissemination in Vehicular Ad Hoc Networks978-3-322-93008-8作者: 美學(xué) 時(shí)間: 2025-3-29 18:17
Intelligent Transportation Systems – Maybe, But Where Are My Agents?978-3-322-88041-3作者: 西瓜 時(shí)間: 2025-3-29 22:02
On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security978-3-663-12249-4作者: formula 時(shí)間: 2025-3-30 03:54 作者: FLAT 時(shí)間: 2025-3-30 04:13 作者: photophobia 時(shí)間: 2025-3-30 08:48 作者: 聰明 時(shí)間: 2025-3-30 13:50 作者: CON 時(shí)間: 2025-3-30 18:36
Improving Stability in QoS Routing for Ad-Hoc Networks978-3-663-10826-9作者: Grievance 時(shí)間: 2025-3-30 20:56 作者: Wordlist 時(shí)間: 2025-3-31 03:34 作者: Mendacious 時(shí)間: 2025-3-31 06:08
Channel Switching Cost-Aware Resource Allocation for Multi-hop Cognitive Radio Networks with a Singl978-3-642-61073-8作者: nurture 時(shí)間: 2025-3-31 11:56
Using Location Services to Autonomously Drive Flying Mobile Sinks in Wireless Sensor Networks978-3-642-67901-8