Affable 发表于 2025-3-28 15:24:54

http://reply.papertrans.cn/15/1445/144448/144448_41.png

Mere仅仅 发表于 2025-3-28 18:47:35

978-3-319-04104-9Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014

Lumbar-Spine 发表于 2025-3-28 22:58:33

Mostafa Hashem Sherif,Abdelhamid Mellouk,Paolo BelUp-to-date results.State-of-the-art research.Fast-track conference proceedings.Includes supplementary material:

OGLE 发表于 2025-3-29 03:07:02

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/a/image/144448.jpg

温室 发表于 2025-3-29 08:26:05

Ad Hoc Networks978-3-319-04105-6Series ISSN 1867-8211 Series E-ISSN 1867-822X

把…比做 发表于 2025-3-29 14:43:50

Lecture Notes in Computer Sciencelarge impact on the network behavior namely the dynamic network topology and the synchronization loss of mobile nodes. Given that, this paper proposes two new re-association procedures for reliable handover to deal with nodes mobility in IEEE 802.15.4 WSNs. In the first approach, the handover proces

AGGER 发表于 2025-3-29 17:25:33

Lecture Notes in Computer Scienceerves multiple partitions to collect their sensed data and relay it to the sink node if the sink is in one of the served partitions. If not, then the data needs to be passed to another MDC serving the sink partition at a certain rendezvous location. This causes an extra waiting time for the MDCs tha

万神殿 发表于 2025-3-29 23:13:03

Moulay Rachid Douiri,Charaf Chermitepplication areas. Conceiving an idea of implementing wireless sensor network has shown many challenges i.e. node deployment, data clustering, data aggregation, energy efficiency, lifetime improvement, etc. This paper deals with an important aspect i.e. clustering. In this paper a new clustering appr

本能 发表于 2025-3-30 02:36:10

Introduction to Space Radiation Detection,work by improving the energy-efficiency, the freshness of collected data and reducing the network traffic and message conflicts. Due to the constraints on sensor nodes’ energy resources and the vulnerability of the distributed infrastructure of wireless networks, an efficient, scalable and accurate

Judicious 发表于 2025-3-30 05:01:28

Luis Santamaría,Ildefonso Ingelmopriate protocol and finding the optimal parameterization for a given network pose a major challenge in practice. This paper investigates the performance of well-established non-secure routing protocols (such as OLSR, BATMAN and HWMP) and the secure protocol PASER in chain mesh networks. A thorough a
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Ad Hoc Networks; 5th International IC Mostafa Hashem Sherif,Abdelhamid Mellouk,Paolo Bel Conference proceedings 2014 Institute for Computer