|
Journals in DBLP
- Juan A. Sánchez, Pedro M. Ruiz, Ivan Stojmenovic
Energy-efficient geographic multicast routing for Sensor and Actuator Networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2519-2531 [Journal]
- Yongsub Nam, Taekyoung Kwon, HoJin Lee, Hakyung Jung, Yanghee Choi
Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2532-2545 [Journal]
- Alexandra Czarlinska, Deepa Kundur
Towards characterizing the effectiveness of random mobility against actuation attacks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2546-2559 [Journal]
- Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda
Reliable bursty convergecast in wireless sensor networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2560-2576 [Journal]
- Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charlie Hu
Path planning of mobile landmarks for localization in wireless sensor networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2577-2592 [Journal]
- Azzedine Boukerche, R. B. Araujo, Fernando H. S. Silva, L. Villas
Wireless sensor and actor networks context interpretation for the emergency preparedness class of applications. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2593-2602 [Journal]
- Abdelmalik Bachir, Dominique Barthel, Martin Heusse, Andrzej Duda
O(1)-Reception routing for sensor networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2603-2614 [Journal]
- Yongguo Mei, Changjiu Xian, Saumitra M. Das, Y. Charlie Hu, Yung-Hsiang Lu
Sensor replacement using mobile robots. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2615-2626 [Journal]
- Abdelmounaam Rezgui, Mohamed Eltoweissy
Service-oriented sensor-actuator networks: Promises, challenges, and the road ahead. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2627-2648 [Journal]
- Azzedine Boukerche, Renato B. Machado, Kathia Regina L. Jucá, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare
An agent based and biological inspired real-time intrusion detection and security model for computer network operations. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2649-2660 [Journal]
- Ahmad M. Kholaif, Terence D. Todd
WLAN VoIP capacity allocation using an adaptive voice packetization server. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2661-2675 [Journal]
- Behrouz Shahgholi Ghahfarokhi, Naser Movahhedinia
QoS provisioning by EFuNNs-based handoff planning in cellular MPLS networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2676-2685 [Journal]
- Yassine Chetoui, Nizar Bouabdallah
Adjustment mechanism for the IEEE 802.11 contention window: An efficient bandwidth sharing scheme. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:13, pp:2686-2695 [Journal]
|