


default search action
Ad Hoc Networks, Volume 45
Volume 45, July 2016
- Usman Raza, Alessandro Bogliolo
, Valerio Freschi, Emanuele Lattanzi
, Amy L. Murphy:
A two-prong approach to energy-efficient WSNs: Wake-up receivers plus dedicated, model-based sensing. 1-12 - Lei Wang
, Zhen Yang, Lijie Xu, Yuwang Yang:
NCVCS: Network-coding-based video conference system for mobile devices in multicast networks. 13-21 - Chandrika J. Satyavolu, Sridhar Radhakrishnan
, Venkatesh Sarangan, Thomas L. Landers, Mahendran Veeramani:
Mobile RFID tag reading with non-overlapping tandem readers on a conveyor belt. 22-33 - Bryce Thomas, Raja Jurdak
, Ian Atkinson
:
Opportunistic content diffusion in mobile ad hoc networks. 34-46 - Thuy T. Truong
, Kenneth N. Brown
, Cormac J. Sreenan:
An online approach for wireless network repair in partially-known environments. 47-64 - Ziaeddin Beheshtifard, Mohammad Reza Meybodi:
Maximal throughput scheduling based on the physical interference model using learning automata. 65-79 - Ahmed Al-Riyami, Ning Zhang
, John Keane:
Impact of hash value truncation on ID anonymity in Wireless Sensor Networks. 80-103 - Ammar E. Abdelkareem
, Bayan S. Sharif
, Charalampos C. Tsimenidis:
Adaptive time varying doppler shift compensation algorithm for OFDM-based underwater acoustic communication systems. 104-119

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.