倒转 发表于 2025-3-23 10:01:31

Maximizing Network Topology Lifetime Using Mobile Node Rotation,er consumption locations. We propose efficient algorithms for single and multiple rounds of rotations. Our extensive simulations show that mobile node rotation can extend WSN topology lifetime by more than eight times on average in a which is significantly better than existing alternatives.

红肿 发表于 2025-3-23 15:29:00

Optimal Spectrum Sharing for Contention-Based Cognitive Radio Wireless Networks,annels and primary users, we find the optimal number of secondary users that obtains maximum throughput in spectrum sharing with primary users. The results obtained provide low complexity solutions for implementation in practical systems.

VEIL 发表于 2025-3-23 18:57:19

Reliable Cooperative Sensing in Cognitive Networks,t attack scenarios and propose a malicious user detection method to further improve the performance. It is shown that by exploiting the malicious user detection scheme, the system performance is improved significantly under various attacks.

发炎 发表于 2025-3-23 23:21:20

0302-9743 national Conference on Wireless Algorithms, Systems, and Applications, WASA 2012, held in Yellow Mountains, China, in August 2012. The 24 revised full papers presented together with 32 invited papers were carefully reviewed and selected from 116 submissions. The papers cover a wide range of topics s

exostosis 发表于 2025-3-24 02:20:37

Throughput and Delay with Network Coding in Hybrid Mobile Ad Hoc Networks: A Global Perspective,onsider 2-hop and multi-hop schemes with . nodes and . original packets for each pair of source-destination. We consider two ad hoc network mobility models- hybrid random walk models (HRWM) and discrete random direction models (DRDM). For the hybrid random walk models, we divide the unit square into

迎合 发表于 2025-3-24 09:38:12

http://reply.papertrans.cn/103/10290/1028927/1028927_16.png

ERUPT 发表于 2025-3-24 12:11:28

Routing for Information Leakage Reduction in Multi-channel Multi-hop Ad-Hoc Social Networks, models: Trusted Group Multicast (TGM) and Confidential Unicast (CU). In TGM, a group member shares the information with all other group members; while in CU, a group member may only want to share the information with a few selected group members. In both cases, the sender would like to transmit the

Neuropeptides 发表于 2025-3-24 18:47:00

http://reply.papertrans.cn/103/10290/1028927/1028927_18.png

祖传 发表于 2025-3-24 21:00:10

http://reply.papertrans.cn/103/10290/1028927/1028927_19.png

脆弱么 发表于 2025-3-25 00:07:50

SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Nele large chunks of spectrum are left idle at many places, many emerging wireless applications cannot get enough spectrum to provide their services. In contrast to existing truthful mechanisms for channel redistribution, which achieve strategy-proofness at the price of lowered system performance, we
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Wireless Algorithms, Systems, and Applications; 7th International Co Xinbing Wang,Rong Zheng,Kai Xing Conference proceedings 2012 Springer-