要素 发表于 2025-3-23 11:55:31

http://reply.papertrans.cn/103/10290/1028915/1028915_11.png

暂时别动 发表于 2025-3-23 15:36:36

A Novel MAC Protocol for Event-Based Wireless Sensor Networks: Improving the Collective QoStion messages are sent simultaneously to the sink, resulting in sporadic increases of the network load. Additionally, these messages sometimes require a lower latency and higher reliability as they can be associated to emergency situations. Current MAC protocols for WSNs are not able to react rapidl

Interferons 发表于 2025-3-23 21:37:38

Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systemsovide various low power sleep modes. Utilizing them can lead to great energy savings. In this paper we present an approach for power management in embedded systems, based on the event-driven operating system .. The implicit power management is mostly hardware independent, lightweight and efficiently

LAST 发表于 2025-3-24 01:00:48

http://reply.papertrans.cn/103/10290/1028915/1028915_14.png

CHOP 发表于 2025-3-24 04:31:27

Routing and Aggregation Strategies for Contour Map Applications in Sensor Networksmes in which data from a sensor are routed to the node that can perform the most effective data aggregation. We then seek alternative forms of aggregation where, in principle, it is possible to aggregate readings from many sensors into a single one. To this end, we select contour maps as the most co

极小 发表于 2025-3-24 08:43:23

http://reply.papertrans.cn/103/10290/1028915/1028915_16.png

agenda 发表于 2025-3-24 12:03:48

http://reply.papertrans.cn/103/10290/1028915/1028915_17.png

brassy 发表于 2025-3-24 18:52:49

A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensorso characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in p

RACE 发表于 2025-3-24 20:19:38

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networksforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over ”synthesized” mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols

单独 发表于 2025-3-24 23:40:02

http://reply.papertrans.cn/103/10290/1028915/1028915_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Wired/Wireless Internet Communications; 7th International Co Hans Berg,Geert Heijenk,Dirk Staehle Conference proceedings 2009 Springer-Verl