Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             14 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A distributed routing for wireless sensor networks with mobile sink based on the greedy embedding Jiang, Yisong
2014
20 C p. 150-162
13 p.
artikel
2 A hybrid MAC protocol for emergency response wireless sensor networks Sitanayah, Lanny
2014
20 C p. 77-95
19 p.
artikel
3 A novel range-free localization algorithm to turn connectivity traces and motion data into localization information Cabero, José María
2014
20 C p. 36-52
17 p.
artikel
4 A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion Turkanović, Muhamed
2014
20 C p. 96-112
17 p.
artikel
5 Comparison of optimization algorithms in the sensor selection for predictive target tracking Pino-Povedano, Sara
2014
20 C p. 182-192
11 p.
artikel
6 Design of a generic management system for wireless sensor networks Cao, Trang Minh
2014
20 C p. 16-35
20 p.
artikel
7 Economy driven content dissemination in Delay Tolerant Networks Hajiaghajani, Faezeh
2014
20 C p. 132-149
18 p.
artikel
8 Inside Front Cover - Editorial Board 2014
20 C p. IFC-
1 p.
artikel
9 Link availability estimation based reliable routing for aeronautical ad hoc networks Lei, Lei
2014
20 C p. 53-63
11 p.
artikel
10 Network coding versus traditional routing in adversarial wireless networks Zhu, Donghai
2014
20 C p. 119-131
13 p.
artikel
11 On convexification of range measurement based sensor and source localization problems Fidan, Barış
2014
20 C p. 113-118
6 p.
artikel
12 Optimal channel assignment with aggregation in multi-channel systems: A resilient approach to adjacent-channel interference Uyanik, Gulnur Selda
2014
20 C p. 64-76
13 p.
artikel
13 SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks Novales, Ramon L.
2014
20 C p. 163-181
19 p.
artikel
14 Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks Wang, Ding
2014
20 C p. 1-15
15 p.
artikel
                             14 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland