找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Wired/Wireless Internet Communications; 7th International Co Hans Berg,Geert Heijenk,Dirk Staehle Conference proceedings 2009 Springer-Verl

[复制链接]
楼主: Waterproof
发表于 2025-3-23 11:55:31 | 显示全部楼层
发表于 2025-3-23 15:36:36 | 显示全部楼层
A Novel MAC Protocol for Event-Based Wireless Sensor Networks: Improving the Collective QoStion messages are sent simultaneously to the sink, resulting in sporadic increases of the network load. Additionally, these messages sometimes require a lower latency and higher reliability as they can be associated to emergency situations. Current MAC protocols for WSNs are not able to react rapidl
发表于 2025-3-23 21:37:38 | 显示全部楼层
Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systemsovide various low power sleep modes. Utilizing them can lead to great energy savings. In this paper we present an approach for power management in embedded systems, based on the event-driven operating system .. The implicit power management is mostly hardware independent, lightweight and efficiently
发表于 2025-3-24 01:00:48 | 显示全部楼层
发表于 2025-3-24 04:31:27 | 显示全部楼层
Routing and Aggregation Strategies for Contour Map Applications in Sensor Networksmes in which data from a sensor are routed to the node that can perform the most effective data aggregation. We then seek alternative forms of aggregation where, in principle, it is possible to aggregate readings from many sensors into a single one. To this end, we select contour maps as the most co
发表于 2025-3-24 08:43:23 | 显示全部楼层
发表于 2025-3-24 12:03:48 | 显示全部楼层
发表于 2025-3-24 18:52:49 | 显示全部楼层
A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensorso characteristics of these environments that can be used effectively to prevent, detect, and confine attacks: redundancy and continuous adaptation. In this article we propose a global strategy and a system architecture to cope with security issues in AmI applications at different levels. Unlike in p
发表于 2025-3-24 20:19:38 | 显示全部楼层
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networksforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over ”synthesized” mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols
发表于 2025-3-24 23:40:02 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-30 19:19
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表