Radiation 发表于 2025-3-27 00:16:48
http://reply.papertrans.cn/103/10290/1028928/1028928_31.pngsclera 发表于 2025-3-27 04:08:56
Multicast Extensions to the Location-Prediction Based Routing Protocol for Mobile Ad Hoc NetworksR-MLPBR predicts a path to the source that has the minimum number of non-receiver nodes. If the predicted path exists in reality, the source accommodates the path as part of the multicast tree and continues to send the multicast packets in the modified tree. Otherwise, the source initiates another global broadcast tree discovery.取之不竭 发表于 2025-3-27 06:21:47
Conference proceedings 2009 networks. They are divided in topical sections on applications, experimentation, power management; coverage, detection, and topology control; routing, querying, and data collection; localization, security, and services; scheduling and resource management; and online social networks, applications, and systems.lethargy 发表于 2025-3-27 10:33:09
http://reply.papertrans.cn/103/10290/1028928/1028928_34.pngsphincter 发表于 2025-3-27 15:28:30
Long-Term Animal Observation by Wireless Sensor Networks with Sound Recognitiont. However, the lifetime of sensor is limited by the battery, especially when the monitored data type is audio, the lifetime is very short due to a huge amount of data transmission. By intuition, sensor mote analyzes the sensed data and decides not to deliver them to server that can reduce the expen惹人反感 发表于 2025-3-27 19:42:54
Experimental Study on Mobile RFID Performanceapplications. Unlike static RFID experiments, mobile RFID studies require more expensive equipment that are unavailable to most researchers. In this paper, we conduct machine-aided experiments to study the effects of mobility on RFID. Our results show that up to 50 RFID tags moving at speeds up to 2荨麻 发表于 2025-3-27 22:40:38
Experimental Study on Secure Data Collection in Vehicular Sensor Networks a vehicular sensor networks. We demonstrate that the protocol works in a realistic setting by collecting the real trace data through real implementation. Some of the key considerations are efficiency, deployability and security. The protocol does not safeguard against some of the techniques an adve澄清 发表于 2025-3-28 04:58:43
http://reply.papertrans.cn/103/10290/1028928/1028928_38.pngBanister 发表于 2025-3-28 09:19:55
http://reply.papertrans.cn/103/10290/1028928/1028928_39.png撕裂皮肉 发表于 2025-3-28 13:28:32
Dynamic Power Management for Sensor Node in WSN Using Average Reward MDPn this paper we model power management problem in a sensor node as an average reward Markov Decision Process and solve it using dynamic programming. We achieve an optimal policy that maximizes long-term average of utility per energy consumption. Simulation results show our approach has the ability o