default search action
Computer Communications, Volume 36
Volume 36, Number 1, December 2012
- Kyung-Joon Park, Rong Zheng, Xue Liu:
Cyber-physical systems: Milestones and research challenges. 1-7 - Ahmad T. Al-Hammouri:
A comprehensive co-simulation platform for cyber-physical systems. 8-19 - Junbeom Hur, Kyungtae Kang:
Dependable and secure computing in medical information systems. 20-28 - Gregory Hackmann, Fei Sun, Nestor E. Castaneda, Chenyang Lu, Shirley Dyke:
A holistic approach to decentralized structural damage localization using wireless sensor networks. 29-41 - Santiago J. Barro Torres, Tiago M. Fernández-Caramés, Héctor J. Pérez-Iglesias, Carlos J. Escudero:
Real-time personal protective equipment monitoring system. 42-50 - Hwantae Kim, Suk Kyu Lee, Hyunsoon Kim, Hwangnam Kim:
Implementing home energy management system with UPnP and mobile applications. 51-62
- Hasan Tuncer, Sumita Mishra, Nirmala Shenoy:
A survey of identity and handoff management approaches for the future Internet. 63-79
- Wenjie Zhang, Chai Kiat Yeo:
Joint iterative algorithm for optimal cooperative spectrum sensing in cognitive radio networks. 80-89 - Juan Vera del Campo, Josep Pegueroles, Juan Hernández-Serrano, Miguel Soriano:
Design of a P2P content recommendation system using affinity networks. 90-104 - Chao Zhang, Jun Zhang, Guo Wei, Pinyi Ren:
An efficient cooperative ARQ protocol for wireless relay networks. 105-112 - Seyed Hossein Khasteh, Saeed Bagheri Shouraki, Nima Hajiabdorahim, Ehsan Dadashnialehi:
A new approach for integrated coverage and connectivity in wireless sensor networks. 113-120
Volume 36, Number 2, January 2013
- Jiguo Yu, Nannan Wang, Guanghui Wang, Dongxiao Yu:
Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey. 121-134
- Fadi M. Al-Turjman, Hossam S. Hassanein, Mohamed Ibnkahla:
Efficient deployment of wireless sensor networks targeting environment monitoring applications. 135-148 - Rone Ilídio da Silva, Daniel Fernandes Macedo, José Marcos S. Nogueira:
Duty cycle aware spatial query processing in wireless sensor networks. 149-161 - Lin Xing, Wei Wang:
Energy-balanced cross layer traffic and coding optimality in battery-powered wireless mesh networks. 162-169 - Sheng-Shih Wang, Yi-Shiun Lin:
PassCAR: A passive clustering aided routing protocol for vehicular ad hoc networks. 170-179 - Abderrahmen Mtibaa, Khaled A. Harras:
CAF: Community aware framework for large scale mobile opportunistic networks. 180-190 - Flavio Roberto Santos, Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary, Antônio Marinho Pilla Barcellos:
Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems. 191-202 - Yanmin Zhu, Lei Ni, Bo Li:
Exploiting mobility patterns for inter-technology handover in mobile environments. 203-210 - Yang Liu, Zheng Zheng, Kai Liu, Xingchun Liu:
Delay-SRLG constrained, backup-shared path protection in WDM networks with sleep scheduling. 211-222 - Krishanthmohan Ratnam, Mohan Gurusamy, Kee Chaing Chua:
A flexible optical switch architecture for efficient transmission of optical bursts. 223-241
Volume 36, Number 3, February 2013
- Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah:
A new class of Hash-Chain based key pre-distribution schemes for WSN. 243-255 - Huan Li, Yanlei Liu, Weifeng Chen, Weijia Jia, Bing Li, Junwu Xiong:
COCA: Constructing optimal clustering architecture to maximize sensor network lifetime. 256-268 - Qin Liu, Yanan Chang, Xiaohua Jia:
A hybrid method of CSMA/CA and TDMA for real-time data aggregation in wireless sensor networks. 269-278 - Philip Ginzboorg, Valtteri Niemi, Jörg Ott:
Fragmentation algorithms for DTN links. 279-290 - Feng Zhong, Chai Kiat Yeo, Bu-Sung Lee:
EFLoM: An Efficient Framework for Local Mobility. 291-302 - P. Arun Raj Kumar, S. Selvakumar:
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. 303-319 - Sangho Lee, Jong Kim:
Fluxing botnet command and control channels with URL shortening services. 320-332 - Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha:
Distributed lightpath establishment techniques using Multi-wavelength Reservation Protocols in WDM optical networks. 333-341 - Weigang Hou, Lei Guo, Xiaoxue Gong, Zhimin Sun:
Multi-domain integrated grooming algorithm for green IP over WDM network. 342-350 - Mingdong Tang, Guoqiang Zhang, Tao Lin, Jianxun Liu:
HDLBR: A name-independent compact routing scheme for power-law networks. 351-359
- Agassi Z. Melikov, Leonid A. Ponomarenko:
Comment on "Probabilistic framework and performance evaluation for prioritized call admission control in next generation networks". 360-361
Volume 36, Number 4, February 2013
- Stojan Trajanovski, Fernando A. Kuipers, Javier Martín Hernández, Piet Van Mieghem:
Generating graphs that approach a prescribed modularity. 363-372 - Yossi Kanizo, David Hay, Isaac Keslassy:
Access-efficient Balanced Bloom Filters. 373-385 - Raúl Peña-Ortiz, José A. Gil, Julio Sahuquillo, Ana Pont:
Analyzing web server performance under dynamic user workloads. 386-395 - Raffaele Bolla, Roberto Bruschi:
An open-source platform for distributed Linux Software Routers. 396-410 - Jie Wu, Ying Dai, Yanchao Zhao:
Effective channel assignments in cognitive radio networks. 411-420 - Seyed Mohamad Alavi, Chi Zhou, Wan Wang Gen:
Efficient resource allocation algorithm for OFDMA systems with delay constraint. 421-430 - Jaeseon Hwang, Taewoon Kim, Jungmin So, Hyuk Lim:
A receiver-centric multi-channel MAC protocol for wireless networks. 431-444 - Tzung-Shi Chen, Hua-Wen Tsai, Yu-Hsin Chang, Tzung-Cheng Chen:
Geographic convergecast using mobile sink in wireless sensor networks. 445-458 - Shanshan Li, Shaoliang Peng, Weifeng Chen, Xiaopei Lu:
INCOME: Practical land monitoring in precision agriculture with sensor networks. 459-467 - Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and secure payment with RFID. 468-480
Volume 36, Number 5, March 2013
- Stefano Ferretti:
Shaping opportunistic networks. 481-503 - Seunghun Cha, Elmurod Talipov, Hojung Cha:
Data delivery scheme for intermittently connected mobile sensor networks. 504-519 - Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutaba:
Reliable and energy efficient cooperative detection in wireless sensor networks. 520-532 - Andrei Pruteanu, Lucia D'Acunto, Stefan Dulman:
Distributed online flash-crowd detection in P2P swarming systems. 533-541 - Josep Domingo-Ferrer, David Megías:
Distributed multicast of fingerprinted content based on a rational peer-to-peer community. 542-550 - Jason Brown, Jamil Y. Khan:
Key performance aspects of an LTE FDD based Smart Grid communications network. 551-561 - Dongwon Seo, Heejo Lee, Ejovi Nuwere:
SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree. 562-574 - Yoshiki Kanda, Romain Fontugne, Kensuke Fukuda, Toshiharu Sugawara:
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches. 575-588 - Mohamed Lamine Lamali, Hélia Pouyllau, Dominique Barth:
Path computation in multi-layer multi-domain networks: A language theoretic approach. 589-599 - James Yiming Zhang, Jing Wu, Gregor von Bochmann:
A proof of wavelength conversion not improving Lagrangian bounds of the sliding scheduled RWA problem. 600-606
Volume 36, Number 6, March 2013
- Piotr Cholda, Bjarne E. Helvik:
Reliable network-based services. 607-610
- Héctor Cancela, Franco Robledo, Gerardo Rubino, Pablo Sartor:
Monte Carlo estimation of diameter-constrained network reliability conditioned by pathsets and cutsets. 611-620 - Samir Sebbah, Brigitte Jaumard:
Differentiated quality-of-protection in survivable WDM mesh networks using p-structures. 621-629 - M. Farhan Habib, Massimo Tornatore, Ferhat Dikbiyik, Biswanath Mukherjee:
Disaster survivability in optical communication networks. 630-644 - Levente Csikor, János Tapolcai, Gábor Rétvári:
Optimizing IGP link costs for improving IP-level resilience with Loop-Free Alternates. 645-655 - Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester:
OpenFlow: Meeting carrier-grade recovery requirements. 656-665 - Victor Yu Liu, David Tipper:
Spare capacity allocation using shared backup path protection for dual link failures. 666-677 - Iyad A. Katib, Deep Medhi:
Network protection design models, a heuristic, and a study for concurrent single-link per layer failures in three-layer networks. 678-688 - Dahai Xu, Guangzhi Li, Byrav Ramamurthy, Angela L. Chiu, Dongmei Wang, Robert D. Doverspike:
On provisioning diverse circuits in heterogeneous multi-layer optical networks. 689-697 - Sahel Sahhaf, Wouter Tavernier, Didier Colle, Mario Pickavet, Piet Demeester:
Link failure recovery technique for greedy routing in the hyperbolic plane. 698-707 - Andrés J. Gonzalez, Bjarne E. Helvik:
SLA success probability assessment in networks with correlated failures. 708-717
Volume 36, Number 7, April 2013
- Bengt Ahlgren, Holger Karl, Dirk Kutscher, Lixia Zhang:
Special section on Information-Centric Networking. 719-720 - Christian Dannewitz, Dirk Kutscher, Börje Ohlman, Stephen Farrell, Bengt Ahlgren, Holger Karl:
Network of Information (NetInf) - An information-centric networking architecture. 721-735 - Christian Dannewitz, Matteo D'Ambrosio, Vinicio Vercellone:
Hierarchical DHT-based name resolution for information-centric networks. 736-749 - Giovanna Carofiglio, Massimo Gallo, Luca Muscariello, Diego Perino:
Evaluating per-application storage management in content-centric networks. 750-757 - Wei Koong Chai, Diliang He, Ioannis Psaras, George Pavlou:
Cache "less for more" in information-centric networks (extended version). 758-770 - Giuseppe Rossini, Dario Rossi:
Evaluating CCN multi-path interest forwarding strategies. 771-778 - Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, Lixia Zhang:
A case for stateful forwarding plane. 779-791 - Marica Amadeo, Antonella Molinaro, Giuseppe Ruggeri:
E-CHANET: Routing, forwarding and transport in Information-Centric multihop wireless networks. 792-803
- Osama Khader, Andreas Willig:
An energy consumption analysis of the Wireless HART TDMA protocol. 804-816 - Pelayo Nuño, Juan C. Granda, Francisco J. Suárez, Daniel F. García:
Self-∗ in Multimedia Communication Overlays. 817-833 - Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:
Doppler effect on target tracking in wireless sensor networks. 834-848
Volume 36, Number 8, May 2013
- Zhiting Lin, Xiufang Jiang:
Universal scheme improving probabilistic routing in delay-tolerant networks. 849-860 - Nilesh Padhariya, Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa:
Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networks. 861-874 - Sathiamoorthy Manoharan, Tianxu Ge:
A demerit point strategy to reduce free-riding in BitTorrent. 875-880 - Bernardo de la Ossa, José A. Gil, Julio Sahuquillo, Ana Pont:
Referrer Graph: A cost-effective algorithm and pruning method for predicting web accesses. 881-894 - Y. Xie, S. Tang, X. Huang, C. Tang, Xingcheng Liu:
Detecting latent attack behavior from aggregated Web traffic. 895-907 - Frederic Raspall-Chaure:
Scalable identification and measurement of heavy-hitters. 908-926 - Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch:
An efficient hybrid approach to per-flow state tracking for high-speed networks. 927-938 - Sungwook Kim:
A repeated Bayesian auction game for cognitive radio spectrum sharing scheme. 939-946 - Arash Azarfar, Jean-François Frigon, Brunilde Sansò:
Reliability analysis of a channel restoration mechanism for opportunistic spectrum access. 947-961
Volume 36, Number 9, May 2013
- Charalampos Konstantopoulos, Paolo Bellavista, Chi-Fu Huang, Damla Turgut:
Special issue: Reactive wireless sensor networks. 963-964
- Majid I. Khan, Wilfried N. Gansterer, Günter Haring:
Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networks. 965-978 - Ivan Mezei, Milan Lukic, Veljko Malbasa, Ivan Stojmenovic:
Auctions and iMesh based task assignment in wireless sensor and actuator networks. 979-987 - Yuanyuan Zeng, Deshi Li, Athanasios V. Vasilakos:
Real-time data report and task execution in wireless sensor and actuator networks using self-aware mobile actuators. 988-997 - Fadi M. Al-Turjman, Ashraf E. Al-Fagih, Waleed Alsalih, Hossam S. Hassanein:
A delay-tolerant framework for integrated RSNs in IoT. 998-1010 - Estanislao Mercadal, Carlos Vidueira, Cormac J. Sreenan, Joan Borrell:
Improving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries. 1011-1023 - Samaneh Hosseini Semnani, Otman A. Basir:
Target to sensor allocation: A hierarchical dynamic Distributed Constraint Optimization approach. 1024-1038 - Dimitrios Zorbas, Tahiry Razafindralambo:
Prolonging network lifetime under probabilistic target coverage in wireless mobile sensor networks. 1039-1053 - Leandro A. Villas, Azzedine Boukerche, Daniel L. Guidoni, Horacio A. B. F. de Oliveira, Regina Borges de Araujo, Antonio Alfredo Ferreira Loureiro:
An energy-aware spatio-temporal correlation mechanism to perform efficient data collection in wireless sensor networks. 1054-1066 - Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. 1067-1077 - Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Edwin Hsing-Mean Sha:
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. 1078-1093 - Lu Jin, Defeng David Huang:
A slotted CSMA based reinforcement learning approach for extending the lifetime of underwater acoustic wireless sensor networks. 1094-1099
Volume 36, Numbers 10-11, June 2013
- Behrouz Shahgholi Ghahfarokhi, Naser Movahhedinia:
A survey on applications of IEEE 802.21 Media Independent Handover framework in next generation wireless networks. 1101-1119
- Faraz Ahmed, Muhammad Abulaish:
A generic statistical approach for spam detection in Online Social Networks. 1120-1129 - Valerio Arnaboldi, Andrea Guazzini, Andrea Passarella:
Egocentric online social networks: Analysis of key features and prediction of tie strength in Facebook. 1130-1144 - Slimane Lemmouchi, Mohammed Haddad, Hamamache Kheddouci:
Robustness study of emerged communities from exchanges in peer-to-peer networks. 1145-1158 - Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior:
Trust-based security for the OLSR routing protocol. 1159-1171 - Mubashir Husain Rehmani, Aline Carneiro Viana, Hicham Khalife, Serge Fdida:
SURF: A distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks. 1172-1185 - Sang-Seon Byun, Ilangko Balasingham, Heung-No Lee:
An inventory model-based spectrum pooling for wireless service provider and unlicensed users. 1186-1192 - Hairui Zhou, Chengchen Hu, Lina He:
Improving the efficiency and fairness of eXplicit Control Protocol in multi-bottleneck networks. 1193-1208 - Daisuke Satoh, Harutaka Ueno:
Marking algorithm of distinguishing three traffic load states with two encoding states for pre-congestion notification. 1209-1224 - Hakki Ulas Ünal, Daniel Melchor-Aguilar, Deniz Üstebay, Silviu-Iulian Niculescu, Hitay Özbay:
Comparison of PI controllers designed for the delay model of TCP/AQM networks. 1225-1234 - Jianxin Wang, Pingping Dong, Jie Chen, Jiawei Huang, Shigeng Zhang, Weiping Wang:
Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks. 1235-1244 - Sebastian Schildt, Johannes Morgenroth, Lars C. Wolf:
Efficient false positive free set synchronization using an extended bloom filter approach. 1245-1254 - Derek Chi-Wai Pao, Nga Lam Or, Ray C. C. Cheung:
A memory-based NFA regular expression match engine for signature-based intrusion detection. 1255-1267
Volume 36, Number 12, July 2013
- Bingdong Li, Esra Erdin, Mehmet Hadi Gunes, George Bebis, Todd Shipley:
An overview of anonymity technology usage. 1269-1283
- Oscar García Morchon, Dmitriy Kuptsov, Andrei V. Gurtov, Klaus Wehrle:
Cooperative security in distributed networks. 1284-1297 - Ismael de Fez, Francisco Fraile, Juan Carlos Guerri:
Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol. 1298-1309 - Yue Han, Mingwu Yao, Zengji Liu:
A scalable method for DCLC problem using hierarchical MDP model. 1310-1316 - Marcos Postigo-Boix, José Luis Melús-Moreno:
A pricing method for elastic services that guarantees the GoS in a scenario of evolutionary demand. 1317-1328 - Alireza Monemi, Roozbeh Zarei, Muhammad N. Marsono:
Online NetFPGA decision tree statistical traffic classifier. 1329-1340 - Waleed Ejaz, Najam Ul Hasan, Hyung Seok Kim:
Distributed cooperative spectrum sensing in cognitive radio for ad hoc networks. 1341-1349
- Peter M. van de Ven, Sem C. Borst, Lei Ying:
Inefficiency of MaxWeight scheduling in spatial wireless networks. 1350-1359 - Omur Ozel, Jing Yang, Sennur Ulukus:
Optimal transmission schemes for parallel and fading Gaussian broadcast channels with an energy harvesting rechargeable transmitter. 1360-1372 - Veeraruna Kavitha, Sreenath Ramanath, Mérouane Debbah:
Satisfying demands in a multicellular network: A universal power allocation algorithm. 1373-1386
Volume 36, Number 13, July 2013
- Shameek Bhattacharjee, Shamik Sengupta, Mainak Chatterjee:
Vulnerabilities in cognitive radio networks: A survey. 1387-1398
- Junaid Ansari, Xi Zhang, Petri Mähönen:
A decentralized MAC protocol for opportunistic spectrum access in cognitive wireless networks. 1399-1410 - Ahmad Abbas, Mohamed F. Younis:
Establishing connectivity among disjoint terminals using a mix of stationary and mobile relays. 1411-1421 - Omar Abdel Wahab, Hadi Otrok, Azzam Mourad:
VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks. 1422-1435 - Maria Estrella Sousa Vieira, Andrés Suárez-González, Manuel Fernández-Veiga, José C. López-Ardao, Cándido López-García:
Model selection for long-memory processes in the spectral domain. 1436-1449 - Y. Sinan Hanay, Abhishek Dwaraki, Kekai Hu, Tilman Wolf:
High-performance implementation of in-network traffic pacing for small-buffer networks. 1450-1459 - Guang Cheng, Yongning Tang:
Line speed accurate superspreader identification using dynamic error compensation. 1460-1470 - Li Ming Chen, Meng Chang Chen, Wanjiun Liao, Yeali S. Sun:
A scalable network forensics mechanism for stealthy self-propagating attacks. 1471-1484
Volume 36, Number 14, August 2013
- Kaushik R. Chowdhury, Marco Di Felice, Luciano Bononi:
XCHARM: A routing protocol for multi-channel wireless mesh networks. 1485-1497 - Shin-Jer Yang, Wen-Chieh Tseng:
Design novel weighted rating of multiple attributes scheme to enhance handoff efficiency in heterogeneous wireless networks. 1498-1514 - Yinan Li, Ing-Ray Chen:
Hierarchical agent-based secure and reliable multicast in wireless mesh networks. 1515-1526 - Alejandro Pérez-Méndez, Fernando Pereñíguez-Garcia, Rafael Marín López, Gabriel López Millán:
Out-of-band federated authentication for Kerberos based on PANA. 1527-1538
- Brigitte Jaumard, Rejaul Chowdhury:
An efficient optimization scheme for WDM/TDM PON network planning. 1539-1551 - Peng Xu, Xuming Fang, Meirong Chen, Yang Xu:
A Stackelberg game-based spectrum allocation scheme in macro/femtocell hierarchical networks. 1552-1558 - Hasan Erkan, Georgios Ellinas, Antonis Hadjiantonis, Roger Dorsinville, Mohamed A. Ali:
Dynamic and fair resource allocation in a distributed ring-based WDM-PON architectures. 1559-1569 - Burak Kantarci, Hussein T. Mouftah:
Two-stage report generation in long-reach EPON for enhanced delay performance. 1570-1580
Volume 36, Numbers 15-16, September - October 2013
- Xiaojun Zhu, Xiaobing Wu, Guihai Chen:
Relative localization for wireless sensor networks with linear topology. 1581-1591 - Andrey Sapegin, Steve Uhlig:
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events. 1592-1605
- Fernando Boavida, Eduardo Cerqueira, Andreas Mauthe, Marília Curado, Eng Keong Lua, Mikolaj Leszczuk:
Special section on human-centric multimedia networking: Guest editorial. 1606-1607 - Alberto Álvarez, Laura Pozueco, Sergio Cabrero, Xabiel G. Pañeda, Roberto García, David Melendi, Gabriel Díaz Orueta:
Subjective evaluation of critical success factors for a QoE aware adaptive system. 1608-1620 - Jalal Awed, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Perception-aware packet-loss resilient compression for networked haptic systems. 1621-1628 - Ianire Taboada, Fidel Liberal, Jose Oscar Fajardo, Urtzi Ayesta:
QoE-aware optimization of multimedia flow scheduling. 1629-1638 - Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones, Faycal Bouhafs:
Exploiting linked data to create rich human digital memories. 1639-1656 - Thomas C. Schmidt, Matthias Wählisch, Dominik Charousset, Sebastian Meiling:
On name-based group communication: Challenges, concepts, and transparent deployment. 1657-1664
Volume 36, Numbers 17-18, November - December 2013
- Emilio Ancillotti, Raffaele Bruno, Marco Conti:
The role of communication systems in smart grids: Architectures, technical solutions and research challenges. 1665-1697
- Haesun Byun, Meejeong Lee:
A P4P-integrated data-driven P2P system for the live multimedia streaming service. 1698-1707 - Hasan T. Karaoglu, Aparna Gupta, Murat Yuksel, Weini Liu, Koushik Kar:
Bailout forward contracts for edge-to-edge internet services. 1708-1725 - Iván Vidal, Jaime García-Reinoso, Ignacio Soto, Antonio de la Oliva:
A solution for transparent mobility with route optimization in the IP multimedia subsystem. 1726-1744 - Ronghui Hou, Sikai Qu, King-Shan Lui, Jiandong Li:
Coding- and interference-aware routing protocol in wireless networks. 1745-1753 - Yuan-Cheng Lai, Ling-Yen Hsiao, Bor-Shen Lin:
An RFID anti-collision algorithm with dynamic condensation and ordering binary tree. 1754-1767
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.