default search action
Ad Hoc & Sensor Wireless Networks, Volume 31
Volume 31, Numbers 1-4, 2016
- Baoming Sun, Wei Xie, Lei Zhu, Ning Li, Jianfeng Zhang:
IC-CRP: An Interference-Constrained Routing Protocol for Multi-Hop Cognitive Radio Ad Hoc Networks. 1-20 - Sohail Jabbar, Abid Ali Minhas, Rashid Tahir, Seungmin Rho:
Heuristic Approach for Stagnation Free Energy Aware Routing in Wireless Sensor Networks. 21-45 - Zhaokun Qin, Weigang Wu, Yajuan Tang, Jiebin Zhang:
PAR-MAC: Reliable MAC Broadcast for Ad Hoc Networks with High Dynamicity. 47-68 - Pham Thanh Hiep:
Spatial Reuse Superframe for High Throughput Cluster-Based WBAN with CSMA/CA. 69-87 - Sania Yaqoob, Taeshik Shon:
A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network. 89-99 - Marco Avvenuti, Cinzia Bernardeschi, Luca Cassano, Alessio Vecchio:
Adapting the Duty Cycle to Traffic Load in a Preamble Sampling MAC for WSNs: Formal Specification and Performance Evaluation. 101-129 - Li Huang, Xinlai Tang, Hao Liu, Da Xiao:
Practical Single Sign-on Mechanism for Distributed Computer Networks. 131-149 - Xueping Ren, Ming Jiang, Ting Wu, Xianghua Xu, Yinglong Ge:
A Scalable Authentication Protocol with Classified Protection in RFID-based Systems. 151-172 - Gulustan Dogan:
A Survey of Provenance in Wireless Sensor Networks. 173-197 - Luca Anchora, Antonio Capone, Luca Mainetti, Vincenzo Mighali, Luigi Patrono, Francesco Simone:
AS2-MAC: An Energy-efficient MAC Protocol for Wireless Sensor Networks. 199-226 - Walid I. Khedr:
Improved Lightweight Authentication Scheme for IEEE 802.11p Vehicle-to-Infrastructure Communication. 227-258 - Milica Popovic, Dejan Drajic, Philipp Svoboda, Navid Nikaein, Srdan Krco, Markus Laner:
Latency Analysis for M2M and Online Gaming Traffic in an HSPA Network. 259-277 - Yingyou Wen, Zhi Li, Yinghui Meng, Tongjie Zhang:
A Novel Greedy Optimization Localization Algorithm for Wireless Sensor Networks in a Concave Area. 279-302 - Mohammad J. Abdel-Rahman, Dima Abu-Aysheh, Ahmad I. Abu-El-Haija, Rasheed J. Abu-Aysheh, Hazem M. Al-Najjar:
Detecting Intruders by Wireless Sensor Networks. 303-337
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.