找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Wired/Wireless Internet Communications; 7th International Co Hans Berg,Geert Heijenk,Dirk Staehle Conference proceedings 2009 Springer-Verl

[復(fù)制鏈接]
樓主: Waterproof
11#
發(fā)表于 2025-3-23 11:55:31 | 只看該作者
12#
發(fā)表于 2025-3-23 15:36:36 | 只看該作者
A Novel MAC Protocol for Event-Based Wireless Sensor Networks: Improving the Collective QoStion messages are sent simultaneously to the sink, resulting in sporadic increases of the network load. Additionally, these messages sometimes require a lower latency and higher reliability as they can be associated to emergency situations. Current MAC protocols for WSNs are not able to react rapidl
13#
發(fā)表于 2025-3-23 21:37:38 | 只看該作者
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systemsovide various low power sleep modes. Utilizing them can lead to great energy savings. In this paper we present an approach for power management in embedded systems, based on the event-driven operating system .. The implicit power management is mostly hardware independent, lightweight and efficiently
14#
發(fā)表于 2025-3-24 01:00:48 | 只看該作者
15#
發(fā)表于 2025-3-24 04:31:27 | 只看該作者
Routing and Aggregation Strategies for Contour Map Applications in Sensor Networksmes in which data from a sensor are routed to the node that can perform the most effective data aggregation. We then seek alternative forms of aggregation where, in principle, it is possible to aggregate readings from many sensors into a single one. To this end, we select contour maps as the most co
16#
發(fā)表于 2025-3-24 08:43:23 | 只看該作者
17#
發(fā)表于 2025-3-24 12:03:48 | 只看該作者
18#
發(fā)表于 2025-3-24 18:52:49 | 只看該作者
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensorso characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in p
19#
發(fā)表于 2025-3-24 20:19:38 | 只看該作者
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networksforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over ”synthesized” mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols
20#
發(fā)表于 2025-3-24 23:40:02 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-14 11:35
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
武夷山市| 潞西市| 博客| 邯郸市| 泰顺县| 孝感市| 张家界市| 虎林市| 睢宁县| 建昌县| 华阴市| 台南县| 桃园市| 岳池县| 海盐县| 尼勒克县| 儋州市| 伊春市| 吉首市| 肥东县| 开江县| 宽甸| 抚州市| 江安县| 泰宁县| 和田县| 东平县| 石柱| 新巴尔虎左旗| 常宁市| 乐亭县| 公安县| 宜兰市| 辽阳县| 淮南市| 长宁区| 康定县| 库车县| 宣化县| 新绛县| 太谷县|