


default search action
Ad Hoc & Sensor Wireless Networks, Volume 32
Volume 32, Numbers 1-2, 2016
- Wang Jun, Gu Wei:

A Grid-based QoS-aware Routing Protocol for Wireless Sensor Networks. 1-24 - Néstor E. Hernández-Atonal, Mario E. Rivero-Angeles, Fernando Martinez-Pinon:

On the Performance of S-ALOHA and CSMA/CA Random Access Strategies for Data Exchange in Query-Based Wireless Sensor Networks: An Interest-Based Approach. 25-50 - Junbin Liang, Chan Jiang, Xingpo Ma, Gaocai Wang, Xiaoyan Kui:

Secure Data Aggregation for Top-k Queries in Tiered Wireless Sensor Networks. 51-78 - Haipeng Yao, Pengbo Si, Ruizhe Yang, Yanhua Zhang:

Dynamic Spectrum Management with Movement Prediction in Vehicular Ad Hoc Networks. 79-97 - Bosung Kim, Gyumin Lee, Byeong-Hee Roh:

Adaptive Sensing Period Adjustment Scheme in Cognitive Radio Sensor Networks. 99-113 - Haipeng Yao, Zhian Yang, Hao Jiang, Li Ma:

A Scheme of Ad-hoc-Based D2D Communication in Cellular Networks. 115-130 - Juan Luo, Zanyi He, Yu Liu, Junli Zha, Keqin Li:

Energy Confirmable Overlapping Target Tracking Based on Compressive Sensing in Wireless Sensor Networks. 131-148 - Yantao Li, Gang Zhou, Ge Peng:

Energy Modeling and Optimization for BSN and WiFi Networks Using Joint Data Rate Adaptation. 149-173
Volume 32, Numbers 3-4, 2016
- Moeenuddin Tariq, Muhammad Shafie Abdul Latif, Muhammad Ayaz, Yahaya Coulibaly, Abdul Wahid:

Pressure Sensor Based Reliable (PSBR) Routing Protocol for Underwater Acoustic Sensor Networks. 175-196 - Lei Wang, Yuwang Yang, Wei Zhao, Lei Xu, Shaohua Lan:

Multi-rate Network Coding for Energy-Efficient Multicast in Heterogeneous Wireless Multi-hop Networks. 197-219 - Chengliang Wang, Yu Zhang:

Time-Window and Voronoi-Partition Based Aggregation Scheduling in Multi-Sink Wireless Sensor Networks. 221-238 - Kanika Grover, Alvin S. Lim, Seungbae Lee, Qing Yang:

Privacy-Enabled Probabilistic Verification in Broadcast Authentication for Vehicular Networks. 239-274 - Hanady M. Abdulsalam, Bader Ali, Anwar Alyatama:

Air Quality Monitoring Using a LEACH-based Data Aggregation Technique in Wireless Sensor Network. 275-300 - Mohammad Al-Shurman, Bilal Al-Shua'b:

N-BEB: New Binary Exponential Back-off Algorithm for IEEE 802.11. 301-317 - Sungwook Kim:

Game Based Certificate Revocation Algorithm for Internet of Things Security Problems. 319-336

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














