Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3370
search results - page 12 / 674
»
Adding Networks
Sort
relevance
views
votes
recent
update
View
thumb
title
14
click to vote
ICNP
2002
IEEE
101
views
Computer Networks
»
more
ICNP 2002
»
Key Management for Heterogeneous Ad Hoc Wireless Networks
14 years 8 days ago
Download
www-sal.cs.uiuc.edu
Seung Yi, Robin Kravets
claim paper
Read More »
19
click to vote
ICDCSW
2000
IEEE
238
views
Computer Networks
»
more
ICDCSW 2000
»
A Link Availability Prediction Model for Wireless Ad Hoc Networks
13 years 11 months ago
Download
www.jos.org.cn
Dajiang He, Shengming Jiang, Jianqiang Rao
claim paper
Read More »
18
click to vote
ALGOSENSORS
2006
Springer
132
views
Sensor Networks
»
more
ALGOSENSORS 2006
»
Adaptive Initialization Algorithm for Ad Hoc Radio Networks with Carrier Sensing
13 years 11 months ago
Download
kutylowski.im.pwr.wroc.pl
Jacek Cichon, Miroslaw Kutylowski, Marcin Zawada
claim paper
Read More »
25
click to vote
ALGOSENSORS
2006
Springer
111
views
Sensor Networks
»
more
ALGOSENSORS 2006
»
Minimizing Interference of a Wireless Ad-Hoc Network in a Plane
13 years 11 months ago
Download
www.ru.is
Magnús M. Halldórsson, Takeshi Tokuy...
claim paper
Read More »
23
click to vote
ESAS
2007
Springer
192
views
Sensor Networks
»
more
ESAS 2007
»
Key Establishment in Heterogeneous Self-organized Networks
14 years 1 months ago
Download
www.usukita.org
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini
claim paper
Read More »
« Prev
« First
page 12 / 674
Last »
Next »