default search action
WASA 2008: Dallas, TX, USA
- Yingshu Li, Dung T. Huynh, Sajal K. Das, Ding-Zhu Du:
Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings. Lecture Notes in Computer Science 5258, Springer 2008, ISBN 978-3-540-88581-8 - Ty Znati:
Research Challenges in Complex Large Scale Networks and Cyber Physical Systems. 1 - Lionel M. Ni:
China's National Research Project on Wireless Sensor Networks. 2 - Jie Wu:
A Utility-Based Routing Scheme in Ad Hoc Networks. 3 - Yu Wang, Chih-Wei Yi, Fan Li:
Delivery Guarantee of Greedy Routing in Three Dimensional Wireless Networks. 4-16 - Sergey Baskakov:
Landmarks Selection Algorithm for Virtual Coordinates Routing. 17-28 - Deying Li, Zheng Li, Lin Liu:
Energy Efficient Broadcast Routing in Ad Hoc Sensor Networks with Directional Antennas. 29-39 - Ionut Cardei, Cong Liu, Jie Wu, Quan Yuan:
DTN Routing with Probabilistic Trajectory Prediction. 40-51 - Manki Min:
A Simple Yet Effective Diversifying Improvement of the Minimum Power Multicast Tree Algorithms in Wireless Ad Hoc Networks. 52-62 - Shadi M. Harb, Janise McNair:
Analytical Study of the Expected Number of Hops in Wireless Ad Hoc Network. 63-71 - Hui Guo, Jiang Li, Yi Qian:
HoP: Pigeon-Assisted Forwarding in Partitioned Wireless Networks. 72-83 - Sameh Gobriel, A. S. Krishnakumar, Parameshwaran Krishnan, Shalini Yajnik:
Load-Based Metrics and Flooding in Wireless Mesh Networks. 84-95 - Ning Zhang, Incheol Shin, Bo Li, Cem Boyaci, Ravi Tiwari, My T. Thai:
New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network. 96-108 - Xiaoming Wang, Qiaoliang Li, Naixue Xiong, Yi Pan:
Ant Colony Optimization-Based Location-Aware Routing for Wireless Sensor Networks. 109-120 - Qiang Ye, Yuxing Huang, Andrew Reddin, Lei Wang, Wuman Luo:
Multi-path GEM for Routing in Wireless Sensor Networks. 121-133 - Feng Zou, Xianyue Li, Donghyun Kim, Weili Wu:
Construction of Minimum Connected Dominating Set in 3-Dimensional Wireless Network. 134-140 - Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Hiromi Okada:
Maintaining CDS in Mobile Ad Hoc Networks. 141-153 - Zhao Zhang, Xiaofeng Gao, Weili Wu, Ding-Zhu Du:
PTAS for Minimum Connected Dominating Set in Unit Ball Graph. 154-161 - Xianyue Li, Xiaofeng Gao, Weili Wu:
A Better Theoretical Bound to Approximate Connected Dominating Set in Unit Disk Graph. 162-175 - Trac N. Nguyen, Dung T. Huynh, Jason A. Bolla:
Minimum Power Minimum D-Hop Dominating Sets in Wireless Sensor Networks. 176-187 - Zheng Fang, Jie Wang:
Convex Combination Approximation for the Min-Cost WSN Point Coverage Problem. 188-199 - Yiwei Wu, Chunyu Ai, Shan Gao, Yingshu Li:
p-Percent Coverage in Wireless Sensor Networks. 200-211 - Yuzhen Liu, Weifa Liang:
Prolonging Network Lifetime for Target Coverage in Sensor Networks. 212-223 - Jue Yang, Chengyang Zhang, Xinrong Li, Yan Huang, Shengli Fu, Miguel F. Acevedo:
An Environmental Monitoring System with Integrated Wired and Wireless Sensors. 224-236 - Qianqian Ren, Hong Gao, Shouxu Jiang, Jianzhong Li:
An Energy-Efficient Object Tracking Algorithm in Sensor Networks. 237-248 - Yinying Yang, Mihaela Cardei:
Sensor Deployment for Composite Event Detection in Mobile WSNs. 249-260 - Liping Peng, Hong Gao, Jianzhong Li, Shengfei Shi, Boduo Li:
Reliable and Fast Detection of Gradual Events in Wireless Sensor Networks. 261-273 - Wenxuan Guo, Xinming Huang:
Mobility Model and Relay Management for Disaster Area Wireless Networks. 274-285 - Gruia Calinescu, Sutep Tongngam:
Relay Nodes in Wireless Sensor Networks. 286-297 - Maggie X. Cheng, Xuan Gong, Lin Cai, Ahmad Ali Abdullah:
Transmission Scheduling for CBR Traffic in Multihop Wireless Networks. 298-309 - Tarun Bansal, Neeraj Mittal, Subbarayan Venkatesan:
Leader Election Algorithms for Multi-channel Wireless Networks. 310-321 - Jaehan Lee, Jang-Sub Kim, Erchin Serpedin:
Clock Offset Estimation in Wireless Sensor Networks Using Bootstrap Bias Correction. 322-329 - Sujit Jos:
Correlation Analysis for Spreading Codewords in Quasi-synchronous CDMA Communication. 330-337 - Mohammed Billoo, Carl Sable:
Energy Consumption Reduction of a WSN Node Using 4-bit ADPCM. 338-348 - Jingtong Hu, Chun Jason Xue, Meikang Qiu, Wei-Che Tseng, Cathy Qun Xu, Lei Zhang, Edwin Hsing-Mean Sha:
Minimizing Transferred Data for Code Update on Wireless Sensor Network. 349-360 - Qian Wang, Kui Ren, Yanchao Zhang, Bo Zhu:
Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. 361-372 - Qi Ling, Jian Ren, Tongtong Li:
Message-Driven Frequency Hopping - Design and Analysis. 373-384 - Shu Chen, Yan Huang, Chengyang Zhang:
Toward a Real and Remote Wireless Sensor Network Testbed. 385-396 - Qiang Hu, Qiaoliang Li, Xiaoming Wang, Naixue Xiong, Yi Pan:
An Optimal Algorithm for Minimizing Cluster Overlap of ACE. 397-408 - Matthew Jakeman, Danny Hughes, Geoff Coulson, Gordon S. Blair, Steve Pink, Kevin Lee:
Supporting IPv6 Interaction with Wireless Sensor Networks Using NP++. 409-419 - Parisa Jalili Marandi, Muharram Mansoorizadeh, Nasrollah Moghaddam Charkari:
The Effect of Re-sampling on Incremental Nelder-Mead Simplex Algorithm: Distributed Regression in Wireless Sensor Networks. 420-431 - Jinghua Zhu, Jianzhong Li, Jizhou Luo, Wei Zhang, Hongzhi Wang:
C-kNN Query Processing in Object Tracking Sensor Networks. 432-443 - Jinbao Li, Peng Wang, Qianqian Ren:
Power-Efficient Data Exchanging Algorithm in Wireless Mesh Networks. 444-453 - Zhongnan Zhang, Weili Wu:
Composite Spatio-Temporal Co-occurrence Pattern Mining. 454-465 - Tal Anker, Danny Dolev, Bracha Hod:
Belief Propagation in Wireless Sensor Networks - A Practical Approach. 466-479 - Qing Yang, Qiaoliang Li, Xiaoming Wang, Naixue Xiong, Yi Pan:
A Random Key Management Scheme for Wireless Sensor Networks. 480-490 - Hai Trong Vu, Ajay Kulkarni, Kamil Saraç, Neeraj Mittal:
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks. 491-502 - A. Selcuk Uluagac, Christopher P. Lee, Raheem A. Beyah, John A. Copeland:
Designing Secure Protocols for Wireless Sensor Networks. 503-514 - Jian Ren:
Privacy-Preserving Communication Algorithms and Network Protocols. 515-525 - Qingkai Ma, Ping Deng:
Secure Multi-party Protocols for Privacy Preserving Data Mining. 526-537 - Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou:
Enhancing Software Product Line Maintenance with Source Code Mining. 538-547 - Syeda Nessa, Muhammad Abedin, W. Eric Wong, Latifur Khan, Yu Qi:
Software Fault Localization Using N-gram Analysis. 548-559 - Donghyun Kim, Xianyue Li, Feng Zou, Zhao Zhang, Weili Wu:
Recyclable Connected Dominating Set for Large Scale Dynamic Wireless Networks. 560-569 - Hui Ling, Taieb Znati:
Locate More Sensors with Fewer Anchors in Wireless Sensor Networks. 570-581
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.