default search action
Ad Hoc & Sensor Wireless Networks, Volume 17
Volume 17, Numbers 1-2, 2012
- Bowen Li, Panlong Yang, Jinlong Wang, Liang Shen, Yitao Xu, Yijing Liu, Xiang-Yang Li:
Optimal Action Point for Dynamic Spectrum Utilization Under Rayleigh Fading. 1-32 - Mohanapriya M., Ilango Krishnamurthi:
A Light-Weight and Scalable Solution for Secure Routing in DSR MANET for Black Hole Attack. 33-52 - Hadi Tabatabaee Malazi, Kamran Zamanifar, Ali Khalili, Stefan Dulman:
DEC: Diversity-Based Energy Aware Clustering for Heterogeneous 53 Sensor Networks. 53-72 - Ivan Mezei, Veljko Malbasa, Ivan Stojmenovic:
Greedy Extension of Localized Auction Based Protocols for Wireless Actuator Task Assignment. 73-85 - Wei Shi, Michel Barbeau, Joaquín García-Alfaro, Jean-Pierre Corriveau:
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. 87-102 - Mohammadreza Eslaminejad, Shukor Abd Razak, Mehdi Sookhak:
Classification of Energy-Efficient Routing Protocols for Wireless Sensor Networks. 103-129 - Rui Min, Yiming Pi, Benjun Wang:
A 3-D Imaging Method Based on Radar Sensor Network Distributed Along Circular Geometry. 131-142 - Arny Ambrose, Mihaela Cardei, Ionut Cardei:
HEMS: a Hurricane Evacuation Management System. 143-167
Volume 17, Numbers 3-4, 2013
- Yiyang Zhao, Lionel M. Ni:
VIRE: Virtual Reference Elimination for Active RFID-based Localization. - A. S. Poornima, B. B. Amberker:
Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks. 193-219 - Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices. 221-231 - So-Tsung Chou, Hann-Tzong Chern, Cheng-Mu Shiao, Zne-Jung Lee:
Cross-Layer Design of AODV Protocol for Multi-Hop Flow in Ad Hoc Network. 233-252 - Dimitri Kagaris:
Maximizing the Lifetime of a Wireless Sensor Network with Fixed Targets. 253-268 - Ping Yi, Ting Zhu, Jianqing Ma, Yue Wu:
An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks. 269-292 - Lixin Wang, XiaoHua Xu:
Approximation Algorithms for Maximum Weight Independent Set of Links Under the SINR Model. 293-311 - Li Wei, Yongtao Yao, Zhijun Ding, Qiong Pu:
Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks. 313-339
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.