nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A distributed routing for wireless sensor networks with mobile sink based on the greedy embedding
|
Jiang, Yisong |
|
2014 |
20 |
C |
p. 150-162 13 p. |
artikel |
2 |
A hybrid MAC protocol for emergency response wireless sensor networks
|
Sitanayah, Lanny |
|
2014 |
20 |
C |
p. 77-95 19 p. |
artikel |
3 |
A novel range-free localization algorithm to turn connectivity traces and motion data into localization information
|
Cabero, José María |
|
2014 |
20 |
C |
p. 36-52 17 p. |
artikel |
4 |
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
|
Turkanović, Muhamed |
|
2014 |
20 |
C |
p. 96-112 17 p. |
artikel |
5 |
Comparison of optimization algorithms in the sensor selection for predictive target tracking
|
Pino-Povedano, Sara |
|
2014 |
20 |
C |
p. 182-192 11 p. |
artikel |
6 |
Design of a generic management system for wireless sensor networks
|
Cao, Trang Minh |
|
2014 |
20 |
C |
p. 16-35 20 p. |
artikel |
7 |
Economy driven content dissemination in Delay Tolerant Networks
|
Hajiaghajani, Faezeh |
|
2014 |
20 |
C |
p. 132-149 18 p. |
artikel |
8 |
Inside Front Cover - Editorial Board
|
|
|
2014 |
20 |
C |
p. IFC- 1 p. |
artikel |
9 |
Link availability estimation based reliable routing for aeronautical ad hoc networks
|
Lei, Lei |
|
2014 |
20 |
C |
p. 53-63 11 p. |
artikel |
10 |
Network coding versus traditional routing in adversarial wireless networks
|
Zhu, Donghai |
|
2014 |
20 |
C |
p. 119-131 13 p. |
artikel |
11 |
On convexification of range measurement based sensor and source localization problems
|
Fidan, Barış |
|
2014 |
20 |
C |
p. 113-118 6 p. |
artikel |
12 |
Optimal channel assignment with aggregation in multi-channel systems: A resilient approach to adjacent-channel interference
|
Uyanik, Gulnur Selda |
|
2014 |
20 |
C |
p. 64-76 13 p. |
artikel |
13 |
SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks
|
Novales, Ramon L. |
|
2014 |
20 |
C |
p. 163-181 19 p. |
artikel |
14 |
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
|
Wang, Ding |
|
2014 |
20 |
C |
p. 1-15 15 p. |
artikel |