chuckle 发表于 2025-3-23 12:30:55

Impact of a Deterministic Delay in the DCA Protocol,delay. We find that the system performance is significantly affected by the relationship between the deterministic delay and the number of nodes and can be well predicted by our model. The extensive ns2 simulations verify that our model is very accurate.

forecast 发表于 2025-3-23 14:32:22

http://reply.papertrans.cn/103/10290/1028933/1028933_12.png

Grasping 发表于 2025-3-23 20:10:33

iSound: A Smartphone Based Intelligent Sound Fusion System for the Hearing Impaired,compression techniques as required. We implement iSound on an off-the-shelf Android-based smartphone. The current implementation of iSound is demonstrated to be able to compress signals to a desired range of frequencies as specified, with some distortions and delays. We believe iSound can be a viable alternative for hearing impaired individuals.

glucagon 发表于 2025-3-24 00:51:48

http://reply.papertrans.cn/103/10290/1028933/1028933_14.png

使隔离 发表于 2025-3-24 04:33:44

http://reply.papertrans.cn/103/10290/1028933/1028933_15.png

floaters 发表于 2025-3-24 08:09:47

Computing an Optimal Path with the Minimum Number of Distinct Sensors,lgorithms and compare the number of sensors crossed by a random path, a line segment path, a selfish path, and two paths generated by Dijkstra’s algorithm and an adapted Bellman-Ford algorithm. Some important empirical results are obtained.

Lipoprotein 发表于 2025-3-24 12:28:15

Conference proceedings 2015s in wireless networks. Topics of interests include effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks....

音乐戏剧 发表于 2025-3-24 17:37:33

Privacy-Preserving Public Auditing Together with Efficient User Revocation in the Mobile Environmene efficient user revocation. In this paper, we analyze a previous work, and improve the protocol to get better user revocation efficiency and preserve the users’ privacy against the untrusted cloud platform and the auditor.

冒号 发表于 2025-3-24 21:00:20

Multi-proxy Multi-signature Binding Positioning Protocol,tocol, one model of MPMS binding positioning protocol is proposed. In the model, positioning protocol is bound to MPMS tightly, not loosely. Further, we propose one scheme of MPMS binding positioning protocol. As far as we know, it is the first scheme of MPMS binding positioning protocol.

ALIEN 发表于 2025-3-25 00:16:52

0302-9743 , and Applications, WASA 2015, held in Qufu, Shandong, China, in August 2015..The 36 revised full papers presented together with 5 revised short papers and 42 invited papers were carefully reviewed and selected from 133 initial submissions. The papers present current trends, challenges, and state-of
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Wireless Algorithms, Systems, and Applications; 10th International C Kuai Xu,Haojin Zhu Conference proceedings 2015 Springer International