標(biāo)題: Titlebook: Ad Hoc Networks; First International Jun Zheng,Shiwen Mao,Hua Zhu Conference proceedings 2010 ICST Institute for Computer Science, Social [打印本頁(yè)] 作者: Buchanan 時(shí)間: 2025-3-21 16:19
書目名稱Ad Hoc Networks影響因子(影響力)
書目名稱Ad Hoc Networks影響因子(影響力)學(xué)科排名
書目名稱Ad Hoc Networks網(wǎng)絡(luò)公開度
書目名稱Ad Hoc Networks網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Ad Hoc Networks被引頻次
書目名稱Ad Hoc Networks被引頻次學(xué)科排名
書目名稱Ad Hoc Networks年度引用
書目名稱Ad Hoc Networks年度引用學(xué)科排名
書目名稱Ad Hoc Networks讀者反饋
書目名稱Ad Hoc Networks讀者反饋學(xué)科排名
作者: 音樂(lè)等 時(shí)間: 2025-3-21 22:06 作者: 貿(mào)易 時(shí)間: 2025-3-22 03:33
https://doi.org/10.1007/978-3-642-11723-7MAC; Personal Area Network; airborn networks; algorithms; body area networks; cross-layer design; home net作者: placebo 時(shí)間: 2025-3-22 07:04
978-3-642-11722-0ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010作者: 陳舊 時(shí)間: 2025-3-22 10:15 作者: IRATE 時(shí)間: 2025-3-22 13:54
Stefan Wiesner,Jannicke Baalsrud Hauge influence the lifetime of an energy-constrained network. In this paper, we propose the Energy-consumption-cycle based Cluster-heads Selection (ECHS) protocol. ECHS selects CHs via two phases. In the first phase, CH candidates are chosen based on an adaptable energy threshold and the status of neigh作者: Triglyceride 時(shí)間: 2025-3-22 20:21
Matthias Thürer,Ralph Riedel,David Romeroality through quantity. Hierarchical clustering is generally considered as an efficient and scalable way to facilitate the management and operation of such large-scale networks and minimize the total energy consumption for prolonged lifetime. Judicious selection of cluster heads for data integration作者: 蜈蚣 時(shí)間: 2025-3-22 21:35
Beducci Elena,Anna de Carolis,Marco Taischribing various clustering protocols. Unfortunately, for practitioners wishing to exploit clustering in deployments, there is little help when trying to identify a protocol that meets their needs. This paper takes a step back from specific protocols to consider the fundamental question: . in terms of作者: 內(nèi)部 時(shí)間: 2025-3-23 04:57 作者: JUST 時(shí)間: 2025-3-23 06:46 作者: 無(wú)效 時(shí)間: 2025-3-23 13:12
Material Intensity of Growing Wind Turbines band for transmission and reception. Each node can transmit to, or receive from, multiple nodes simultaneously. We formulate the scheduling of transmissions and control of transmit powers as a joint, mixed-integer, nonlinear optimization problem that yields maximum return at minimum power subject t作者: NIP 時(shí)間: 2025-3-23 17:17
Wenjie Wang,Jiayi Song,Yazhou Liufic. This idea has been implemented and analyzed as an extension of the real-time multi-hop protocol (RT-WMP), a novel protocol that supports hard real-time traffic in relatively small ad-hoc networks. The protocol allows merging the real-time traffic coming from cooperative multitask robot teams an作者: connoisseur 時(shí)間: 2025-3-23 20:27 作者: 一個(gè)姐姐 時(shí)間: 2025-3-23 23:24
Kristian Bang-Olsen,Ali Turkyilmazhe dominant strictly layered design style may how- ever not be able to accommodate many useful optimisations, and we conjecture that cross-layer design may offer a more promising approach. In support of this conjecture we demonstrate through simulation-based approach a cross-layer approach to routin作者: 不妥協(xié) 時(shí)間: 2025-3-24 04:22 作者: 合適 時(shí)間: 2025-3-24 06:34 作者: Decibel 時(shí)間: 2025-3-24 14:19 作者: Explicate 時(shí)間: 2025-3-24 16:48
Ward Peeters,Alexander Ito Maitlandble to different types of attacks. In this paper, we consider the . in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the作者: Chivalrous 時(shí)間: 2025-3-24 20:17 作者: impale 時(shí)間: 2025-3-24 23:21 作者: adj憂郁的 時(shí)間: 2025-3-25 05:37 作者: Flat-Feet 時(shí)間: 2025-3-25 08:22 作者: innate 時(shí)間: 2025-3-25 12:28 作者: 偏離 時(shí)間: 2025-3-25 18:33 作者: expire 時(shí)間: 2025-3-25 21:26 作者: 摘要記錄 時(shí)間: 2025-3-26 03:11 作者: 環(huán)形 時(shí)間: 2025-3-26 04:31 作者: probate 時(shí)間: 2025-3-26 11:58
Conference proceedings 2010, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, commercial, and military areas, which have led to significant new research problems and作者: AMOR 時(shí)間: 2025-3-26 13:33
Beducci Elena,Anna de Carolis,Marco Taisch the resulting communication generated to collect data. Our experimental analysis considers a wide range of parameters that characterize the WSN, and shows that in the most common cases, clusters in which all nodes can communicate in one hop to the cluster head are optimal.作者: 真實(shí)的人 時(shí)間: 2025-3-26 19:19
Kristian Bang-Olsen,Ali Turkyilmazg in wireless . networks that exhibits high degrees of self-configuration, self-optimisation and self-healing. Simulation studies show a substantial improvement in self-organisation properties of wireless networks over comparable layered designs.作者: averse 時(shí)間: 2025-3-26 21:08
Amalia Dache,Jonathon Sun,Dennis Espejogramming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.作者: BORE 時(shí)間: 2025-3-27 01:17 作者: annexation 時(shí)間: 2025-3-27 05:39 作者: 劇毒 時(shí)間: 2025-3-27 12:58 作者: Morphine 時(shí)間: 2025-3-27 17:36 作者: Fortify 時(shí)間: 2025-3-27 19:06
Hidefumi Kurakado,Tatsushi Nishi,Ziang Liuic protocols with different trade-offs between communication overload and memory cost. We extensively analyze their performance and security properties. Furthermore, their applications in different wireless sensor network scenarios are discussed in detail.作者: COMMA 時(shí)間: 2025-3-27 22:06
Ward Peeters,Alexander Ito Maitlandion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.作者: 盡管 時(shí)間: 2025-3-28 02:49
Jianxing Yu,Dongpin Hu,Ching-Hsing Wangcles when they move away from their initial locations. Finally, the proposed protocol is compared with other successful state-of-the-art routing protocols for VANETs and its effectiveness is verified via simulations.作者: conference 時(shí)間: 2025-3-28 06:26
1867-8211 covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks. The various forms of ad hoc networks promise a broad scope of applications in civilian, 作者: 時(shí)間等 時(shí)間: 2025-3-28 13:38 作者: 競(jìng)選運(yùn)動(dòng) 時(shí)間: 2025-3-28 14:34 作者: IVORY 時(shí)間: 2025-3-28 19:20
pringer.com. A large number of applications related to civil, mining, petroleum and environmental engineering are also included..- The first textbook available on modelling of rock?fracture propagation.- Introd978-94-024-0512-5978-94-007-6904-5作者: 不能強(qiáng)迫我 時(shí)間: 2025-3-29 00:26 作者: Nonporous 時(shí)間: 2025-3-29 03:57
Connectivity-Aware Minimum-Delay Geographic Routing with Vehicle Tracking in VANETs useful) introduction to the main facets of a typical modelling and simulation project. This objective was, furthermore, to include projects emerging from both the discrete-event and the continuous-time domains978-1-84628-622-3作者: 連系 時(shí)間: 2025-3-29 09:09
Front Matterins each solution...This concise and easy-to-follow textbook is a much-needed support tool for students willing to explore beyond the introductory level of learning logic and lecturers looking for examples to heighten student engagement in their computer science courses. ?..?.作者: 起波瀾 時(shí)間: 2025-3-29 12:38
An Energy-Efficient Cluster-Head Selection Protocol for Energy-Constrained Wireless Sensor Networksrmations must be sought in intercrystalline slip and more generally in disloca- tions and the various microstructural defects. Before deformation of polycrystals is tackled, it is necessary to understand the mechanisms which take place within the crystal: the different systems of slip which may be activated a978-94-010-8357-7978-94-009-4181-6作者: defuse 時(shí)間: 2025-3-29 16:46
Optimization of Cluster Heads for Energy Efficiency in Large-Scale Wireless Sensor Networksx dynamics resulting from the collaboration and coordination (or lack thereof) among their members..This book provides the reader with modelling tools to understand, analyse and improve the dynamic behaviour of supply chains. It assembles seminal works on supply chain models and recent developments 作者: landfill 時(shí)間: 2025-3-29 20:59 作者: 人類的發(fā)源 時(shí)間: 2025-3-30 03:21 作者: 規(guī)章 時(shí)間: 2025-3-30 04:19
Upper Bounding Service Capacity in Multihop Wireless SSMA-Based Ad Hoc Networkse the environment, to a greater or lesser extent, and to react appropriately. Such robots will be able to perform the function required of them, in spite of unpredictable, limited changes in the environment. The third volume will deal with teleoperations, the branch of robotics characterized by the 作者: 史前 時(shí)間: 2025-3-30 09:38 作者: 胖人手藝好 時(shí)間: 2025-3-30 16:00
Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approachhe Bundeskammer fUr Gewerbliche Wirtschaft in Vienna he prepared his famous book on queueing theory and stochastic processes in economics. This work has been achieved during his scarce time left by his duties at the Bundeskammer, mostly between 6 a.m. and midnight. All those troubles were, however, soon rewar978-3-7908-2462-9978-3-662-12519-9作者: 山崩 時(shí)間: 2025-3-30 20:33 作者: 袋鼠 時(shí)間: 2025-3-30 22:52
Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networksparts:1. Theoretical foundation of modelling and management of engineering processes, and achievements in theory.2. Experiences from management practice using various modelling methods and tools, and their future challenges.3. New perspectives on modelling methods, techniques and tools.978-1-4471-5717-5978-1-84996-199-8作者: 粗糙 時(shí)間: 2025-3-31 00:57 作者: 詞根詞綴法 時(shí)間: 2025-3-31 05:32
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks neglect the thermal aspects, although they are necessarily there in all physical phenomena, and to use isothermal models. This is equivalent to think that the system is immersed in an infinite temperature reservoir and maintains its temperature constant even if it receives or dissipates electric an作者: morale 時(shí)間: 2025-3-31 09:15 作者: staging 時(shí)間: 2025-3-31 16:04 作者: drusen 時(shí)間: 2025-3-31 20:05
Matthias Thürer,Ralph Riedel,David Romerophase using the bloom filter and the binary search techniques. We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.作者: 極力證明 時(shí)間: 2025-3-31 22:00
Supporting Proactive Application Event Notification to Improve Sensor Network Performance978-3-030-35525-8