Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             105 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A carrier sense multiple access protocol with power backoff (CSMA/PB) Colbourn, Charles J.
2007
8 p. 1233-1250
18 p.
artikel
2 A coverage-preserving scheme for wireless sensor network with irregular sensing range Boukerche, Azzedine
2007
8 p. 1303-1316
14 p.
artikel
3 A cross-layer framework for multiobjective performance evaluation of wireless ad hoc networks Jaffrès-Runser, Katia
2013
8 p. 2147-2171
25 p.
artikel
4 Ad hoc networks: Special issue on energy efficient design in wireless ad hoc and sensor networks Yarvis, Mark
2008
8 p. 1183-1184
2 p.
artikel
5 Admission control on multipath routing in 802.11-based wireless mesh networks Zhao, Peng
2013
8 p. 2235-2251
17 p.
artikel
6 A dual-mode energy efficient encryption protocol for wireless sensor networks Moh’d, Abidalrahman
2013
8 p. 2588-2604
17 p.
artikel
7 A framework for route configurability in power-constrained wireless mesh networks Shillingford, Nadine
2010
8 p. 857-871
15 p.
artikel
8 AGREE: exploiting energy harvesting to support data-centric access control in WSNs Bianchi, Giuseppe
2013
8 p. 2625-2636
12 p.
artikel
9 An efficient and robust name resolution protocol for dynamic MANETs Nazeeruddin, M.
2010
8 p. 842-856
15 p.
artikel
10 A new method for distributing power usage across a sensor network Vincent, Patrick
2008
8 p. 1258-1280
23 p.
artikel
11 An exploration of aggregation convergecast scheduling de Souza, Evandro
2013
8 p. 2391-2407
17 p.
artikel
12 A novel batch-based group key management protocol applied to the Internet of Things Veltri, Luca
2013
8 p. 2724-2737
14 p.
artikel
13 ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks Dong, Ying
2009
8 p. 1536-1550
15 p.
artikel
14 A routing protocol for socially selfish delay tolerant networks Li, Qinghua
2012
8 p. 1619-1632
14 p.
artikel
15 ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks Huang, Dijiang
2009
8 p. 1526-1535
10 p.
artikel
16 Automated design algorithms for tactical wireless networks Younis, Ossama
2013
8 p. 2461-2469
9 p.
artikel
17 Balancing computation and communication costs: The case for hybrid execution in sensor networks Koshy, Joel
2008
8 p. 1185-1200
16 p.
artikel
18 Building trees based on aggregation efficiency in sensor networks Harris III, Albert F.
2007
8 p. 1317-1328
12 p.
artikel
19 Channelization for dynamic multi-frequency, multi-hop wireless cellular networks Shin, JaeSheung
2007
8 p. 1284-1302
19 p.
artikel
20 Context information prediction for social-based routing in opportunistic networks Nguyen, Hoang Anh
2012
8 p. 1557-1569
13 p.
artikel
21 Cooperative schemes for path establishment in mobile ad-hoc networks under shadow-fading Dimitriou, Nikos
2013
8 p. 2556-2566
11 p.
artikel
22 CSI: A paradigm for behavior-oriented profile-cast services in mobile networks Hsu, Wei-jen
2012
8 p. 1586-1602
17 p.
artikel
23 Dealing with dishonest recommendation: The trials in reputation management court Chen, Shenlong
2012
8 p. 1603-1618
16 p.
artikel
24 Decentralised detection of periodic encounter communities in opportunistic networks Williams, M.J.
2012
8 p. 1544-1556
13 p.
artikel
25 Defense against misbehavior in anonymous vehicular ad hoc networks Sun, Jinyuan
2009
8 p. 1515-1525
11 p.
artikel
26 Design and evaluation of network reconfiguration protocols for mostly-off sensor networks Li, Yuan
2008
8 p. 1301-1315
15 p.
artikel
27 Design and implementation of CLASS: A Cross-Layer ASSociation scheme for wireless mesh networks He, Yan
2011
8 p. 1476-1488
13 p.
artikel
28 Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach Adelantado, Ferran
2013
8 p. 2367-2380
14 p.
artikel
29 DistressNet: A disaster response system providing constant availability cloud-like services Chenji, Harsha
2013
8 p. 2440-2460
21 p.
artikel
30 Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks Ho, Jun-Won
2009
8 p. 1476-1488
13 p.
artikel
31 DTLS based security and two-way authentication for the Internet of Things Kothmayr, Thomas
2013
8 p. 2710-2723
14 p.
artikel
32 DTN routing in body sensor networks with dynamic postural partitioning Quwaider, Muhannad
2010
8 p. 824-841
18 p.
artikel
33 Editorial Board 2008
8 p. IFC-
1 p.
artikel
34 Editorial Board 2007
8 p. IFC-
1 p.
artikel
35 Editorial for special issue on privacy and security in wireless sensorand ad hoc networks Zhang, Wensheng
2009
8 p. 1431-1433
3 p.
artikel
36 Editorial for special issue on social-based routing in mobile and delay-tolerant networks Haahr, Mads
2012
8 p. 1517-1519
3 p.
artikel
37 Energy and spectrum-aware MAC protocol for perpetual wireless nanosensor networks in the Terahertz Band Wang, Pu
2013
8 p. 2541-2555
15 p.
artikel
38 Energy constraint clustering algorithms for wireless sensor networks Albath, Julia
2013
8 p. 2512-2525
14 p.
artikel
39 Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems Tulone, Daniela
2007
8 p. 1251-1271
21 p.
artikel
40 Erratum to “On the feasibility of UMTS-based Traffic Information Systems” [Ad Hoc Networks 8 (5) (2010) 506–517] Sommer, Christoph
2010
8 p. 904-
1 p.
artikel
41 Fair content dissemination in participatory DTNs Mashhadi, Afra J.
2012
8 p. 1633-1645
13 p.
artikel
42 Fast distributed multi-hop relative time synchronization protocol and estimators for wireless sensor networks Djenouri, Djamel
2013
8 p. 2329-2344
16 p.
artikel
43 Heuristic optimization techniques for self-orientation of directional antennas in long-distance point-to-point broadband networks Min, Byung-Cheol
2013
8 p. 2252-2263
12 p.
artikel
44 Human-mobility enabled networks in urban environments: Is there any (mobile wireless) small world out there? Cacciapuoti, Angela Sara
2012
8 p. 1520-1531
12 p.
artikel
45 Impact of node distance on selfish replica allocation in a mobile ad-hoc network Ryu, Byung-Gul
2013
8 p. 2187-2202
16 p.
artikel
46 Impact of sensor-enhanced mobility prediction on the design of energy-efficient localization You, Chuang-Wen
2008
8 p. 1221-1237
17 p.
artikel
47 Impacts of user-selfishness on cooperative content caching in social wireless networks Taghizadeh, Mahmoud
2013
8 p. 2423-2439
17 p.
artikel
48 Improved network resilience of wireless mesh networks using MPLS and Fast Re-Routing techniques Bisti, L.
2011
8 p. 1448-1460
13 p.
artikel
49 Improving scalability in vehicular communication using one-way hash chain method Sulaiman, Ashraph
2013
8 p. 2526-2540
15 p.
artikel
50 Improving the transport performance in delay tolerant networks by random linear network coding and global acknowledgments Ali, Arshad
2013
8 p. 2567-2587
21 p.
artikel
51 Improving vehicular safety message delivery through the implementation of a cognitive vehicular network Ghandour, Ali J.
2013
8 p. 2408-2422
15 p.
artikel
52 Increasing base-station anonymity in wireless sensor networks Acharya, Uday
2010
8 p. 791-809
19 p.
artikel
53 Indoor deployment of IEEE 802.11s mesh networks: Lessons and guidelines Lin, Ying-Dar
2011
8 p. 1404-1413
10 p.
artikel
54 Inside Front Cover - Editorial Board 2010
8 p. IFC-
1 p.
artikel
55 Inside Front Cover - Editorial Board 2009
8 p. IFC-
1 p.
artikel
56 Inside Front Cover - Editorial Board 2013
8 p. IFC-
1 p.
artikel
57 Inside Front Cover - Editorial Board 2011
8 p. IFC-
1 p.
artikel
58 Inside Front Cover - Editorial Board 2012
8 p. IFC-
1 p.
artikel
59 Instant collision resolution for tag identification in RFID networks Bonuccelli, Maurizio A.
2007
8 p. 1220-1232
13 p.
artikel
60 Interactions between the physical layer and upper layers in wireless networks Tobagi, Fouad A.
2007
8 p. 1208-1219
12 p.
artikel
61 Interconnection of geographically distributed wireless mesh testbeds: Resource sharing on a large scale Di Stasi, Giovanni
2011
8 p. 1389-1403
15 p.
artikel
62 It measures like me: An IoTs algorithm in WSNs based on heuristics behavior and clustering methods Di Stefano, Alessandro
2013
8 p. 2637-2647
11 p.
artikel
63 Joint route selection and resource allocation in multihop wireless networks based on a game theoretic approach Ortín, Jorge
2013
8 p. 2203-2216
14 p.
artikel
64 Lightweight routing with dynamic interests in wireless sensor and actor networks Akbaş, Mustafa İlhan
2013
8 p. 2313-2328
16 p.
artikel
65 Link quality analysis and measurement in wireless mesh networks Kolar, Vinay
2011
8 p. 1430-1447
18 p.
artikel
66 Load balancing techniques for lifetime maximizing in wireless sensor networks Kacimi, Rahim
2013
8 p. 2172-2186
15 p.
artikel
67 Location safety protection in ad hoc networks Xu, Toby
2009
8 p. 1551-1562
12 p.
artikel
68 LORD: Tracking mobile clients in a real mesh Bezahaf, Mehdi
2011
8 p. 1461-1475
15 p.
artikel
69 Making a mesh router/gateway from a smartphone: Is that a practical solution? Iera, Antonio
2011
8 p. 1414-1429
16 p.
artikel
70 MERLIN: Cross-layer integration of MAC and routing for low duty-cycle sensor networks Ruzzelli, Antonio G.
2008
8 p. 1238-1257
20 p.
artikel
71 Multiple point of interest discovery and coverage with mobile wireless sensors Erdelj, Milan
2013
8 p. 2288-2300
13 p.
artikel
72 One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks Wang, Qiuhua
2013
8 p. 2500-2511
12 p.
artikel
73 On the dynamics of human proximity for data diffusion in ad-hoc networks Panisson, André
2012
8 p. 1532-1543
12 p.
artikel
74 On the tradeoff between altruism and selfishness in MANET trust management Cho, Jin-Hee
2013
8 p. 2217-2234
18 p.
artikel
75 Onto scalable wireless ad hoc networks: Adaptive and location-aware clustering Conceição, Luís
2013
8 p. 2484-2499
16 p.
artikel
76 Opportunistic social dissemination of micro-blogs Allen, S.M.
2012
8 p. 1570-1585
16 p.
artikel
77 Optimum node placement in wireless opportunistic routing networks Cerdà-Alabern, Llorenç
2013
8 p. 2273-2287
15 p.
artikel
78 Passive wake-up radios: From devices to applications Ba, He
2013
8 p. 2605-2621
17 p.
artikel
79 Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks Di Pietro, Roberto
2009
8 p. 1463-1475
13 p.
artikel
80 Privacy preservation in wireless sensor networks: A state-of-the-art survey Li, Na
2009
8 p. 1501-1514
14 p.
artikel
81 Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations González-Tablas, A.I.
2013
8 p. 2693-2709
17 p.
artikel
82 Recent advances on practical aspects of Wireless Mesh Networks Avallone, Stefano
2011
8 p. 1371-1373
3 p.
artikel
83 Recent research directions in wireless ad hoc networking Basagni, Stefano
2007
8 p. 1205-1207
3 p.
artikel
84 Reliable data approximation in wireless sensor network Kamal, Abu Raihan M.
2013
8 p. 2470-2483
14 p.
artikel
85 Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems Cardenas, Alvaro A.
2009
8 p. 1434-1447
14 p.
artikel
86 RFID-based localization with Non-Blocking tag scanning Kashkouli Nejad, Keyvan
2013
8 p. 2264-2272
9 p.
artikel
87 RT-Link: A global time-synchronized link protocol for sensor networks Rowe, Anthony
2008
8 p. 1201-1220
20 p.
artikel
88 Sacrificing a little coverage can substantially increase network lifetime Wang, Limin
2008
8 p. 1281-1300
20 p.
artikel
89 Scalable location estimation using smart antennas in wireless sensor networks Kucuk, Kerem
2010
8 p. 889-903
15 p.
artikel
90 Secure group communication in wireless mesh networks Dong, Jing
2009
8 p. 1563-1576
14 p.
artikel
91 Secure median computation in wireless sensor networks Roy, Sankardas
2009
8 p. 1448-1462
15 p.
artikel
92 Security, privacy and trust management in the internet of things era – SePriT Sicari, Sabrina
2013
8 p. 2623-2624
2 p.
artikel
93 Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications Sun, Bo
2009
8 p. 1489-1500
12 p.
artikel
94 Sensing clouds: A distributed cooperative target tracking with tiny binary noisy sensors Marian, Tal
2013
8 p. 2356-2366
11 p.
artikel
95 Service capacity in vehicular networks: A resource dissemination analysis Galluccio, L.
2007
8 p. 1272-1283
12 p.
artikel
96 Simple ant routing algorithm strategies for a (Multipurpose) MANET model Correia, Fernando
2010
8 p. 810-823
14 p.
artikel
97 Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure Stajano, Frank
2010
8 p. 872-888
17 p.
artikel
98 Spoofing detection in IEEE 802.15.4 networks based on received signal strength Jokar, Paria
2013
8 p. 2648-2660
13 p.
artikel
99 SVELTE: Real-time intrusion detection in the Internet of Things Raza, Shahid
2013
8 p. 2661-2674
14 p.
artikel
100 TC-BAC: A trust and centrality degree based access control model in wireless sensor networks Duan, Junqi
2013
8 p. 2675-2692
18 p.
artikel
101 Threshold-related throughput – A new criterion for evaluation of sensor network performance Ledvich, Ilya
2007
8 p. 1329-1348
20 p.
artikel
102 Towards benchmarking routing protocols in wireless mesh networks Friginal, Jesús
2011
8 p. 1374-1388
15 p.
artikel
103 Towards efficient dynamic surface gateway deployment for underwater network Ibrahim, Saleh
2013
8 p. 2301-2312
12 p.
artikel
104 VANET-based secure taxi service Chim, T.W.
2013
8 p. 2381-2390
10 p.
artikel
105 Void traversal for efficient non-planar geometric routing Clouser, Thomas
2013
8 p. 2345-2355
11 p.
artikel
                             105 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland