default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2012
- Po Yang:
Efficient particle filter algorithm for ultrasonic sensor-based 2D range-only simultaneous localisation and mapping application. IET Wirel. Sens. Syst. 2(4): 394-401 (2012) - Wei Chen, Ian J. Wassell:
Energy-efficient signal acquisition in wireless sensor networks: a compressive sensing framework. IET Wirel. Sens. Syst. 2(1): 1-8 (2012) - Mohammad-Reza Ashouri, Z. Zali, S. R. Mousavi, Mahnaz R. Hashemi:
New optimal solution to disjoint set K-coverage for lifetime extension in wireless sensor networks. IET Wirel. Sens. Syst. 2(1): 31-39 (2012) - Muhammad Imran Aslam, Seyed A. Zekavat:
New channel path loss model for near-ground antenna sensor networks. IET Wirel. Sens. Syst. 2(2): 103-107 (2012) - Ruay-Shiung Chang, Shuo-Hung Wang, S.-L. Tsai, W.-P. Yang:
Planning rendezvous using the Halin graph in wireless sensor networks. IET Wirel. Sens. Syst. 2(3): 222-229 (2012) - Yifan Chen:
Chernoff information path loss in wireless relay sensor networks. IET Wirel. Sens. Syst. 2(3): 201-213 (2012) - Dahlila P. Dahnil, Yashwant Prasad Singh, Chin Kuan Ho:
Topology-controlled adaptive clustering for uniformity and increased lifetime in wireless sensor networks. IET Wirel. Sens. Syst. 2(4): 318-327 (2012) - Mohammad Ghamari, Behzad Momahed Heravi, Utz Roedig, Bahram Honary, Carl A. Pickering:
Improving transmission reliability of low-power medium access control protocols using average diversity combining. IET Wirel. Sens. Syst. 2(4): 377-384 (2012) - Sami Ghnimi, Ali Gharsallah:
Online tracking of coherent signals over multiple-input multiple-output code division multiple access communication channel using JADE-capon method in conjunction with iterative space-time lifting preprocessing scheme. IET Wirel. Sens. Syst. 2(2): 146-159 (2012) - Amiotosh Ghosh, Walaa Hamouda:
Multiple-input multiple-output cross-layer antenna selection and beamforming for cognitive networks. IET Wirel. Sens. Syst. 2(3): 170-175 (2012) - Khusvinder Gill, Shuang-Hua Yang, Wanliang Wang:
Scheme for preventing low-level denial-of-service attacks on wireless sensor network-based home automation systems. IET Wirel. Sens. Syst. 2(4): 361-368 (2012) - Yongtai He, Lihui Liu, Yanqiu Li:
Design of solar photovoltaic micro-power supply for application of wireless sensor nodes in complex illumination environments. IET Wirel. Sens. Syst. 2(1): 16-21 (2012) - Duc Chinh Hoang, Rajesh Kumar, Sanjeev Kumar Panda:
Optimal data aggregation tree in wireless sensor networks based on intelligent water drops algorithm. IET Wirel. Sens. Syst. 2(3): 282-292 (2012) - Ashraf Hossain, S. Chakrabarti, P. K. Biswas:
Impact of sensing model on wireless sensor network coverage. IET Wirel. Sens. Syst. 2(3): 272-281 (2012) - S.-C. Hsia, S.-W. Hsu, Y.-J. Chang:
Remote monitoring and smart sensing for water meter system and leakage detection. IET Wirel. Sens. Syst. 2(4): 402-408 (2012) - Dirk De Jager, Jeffrey S. Reeve:
Efficient information valuation and costing for distributed wireless sensor networks. IET Wirel. Sens. Syst. 2(3): 191-200 (2012) - Xiangdong Jia, Longxiang Yang, Shixiang Shao, Shengchen Wu, Hongbo Zhu:
Asymptotic performance analysis for two-way opportunistic relaying based on amplify-and-forward network coding. IET Wirel. Sens. Syst. 2(2): 136-145 (2012) - Sana Hoor Jokhio, Imran Ali Jokhio, Andrew H. Kemp:
Node capture attack detection and defence in wireless sensor networks. IET Wirel. Sens. Syst. 2(3): 161-169 (2012) - Eraj Khan, Ernst M. Gabidulin, Bahram Honary, Hassan Ahmed:
Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks. IET Wirel. Sens. Syst. 2(2): 108-114 (2012) - Ijaz Muhammad Khan, Nafaâ Jabeur, Sherali Zeadally:
Hop-based approach for holes and boundary detection in wireless sensor networks. IET Wirel. Sens. Syst. 2(4): 328-337 (2012) - Yibin Li, Zhiping Jia, Fucai Liu, Shuai Xie:
Hardware reconfigurable wireless sensor network node with power and area efficiency. IET Wirel. Sens. Syst. 2(3): 247-252 (2012) - Yong Li, Depeng Jin, Li Su, Lieguang Zeng, Habib F. Rashvand:
Performance evaluation of routing schemes for energy-constrained delay/fault-tolerant mobile sensor network. IET Wirel. Sens. Syst. 2(3): 262-271 (2012) - W. Li, W. Zhang:
Coverage analysis and active scheme of wireless sensor networks. IET Wirel. Sens. Syst. 2(2): 86-91 (2012) - W. Li, W. Zhang:
Sensor selection for improving accuracy of target localisation in wireless visual sensor networks. IET Wirel. Sens. Syst. 2(4): 293-301 (2012) - Ali Mahani, Amin Kargar, Yousef Seifi Kavian, Habib F. Rashvand:
Non-uniform distribution of multi-hop sensor networks: performance improvement and energy hole mitigation. IET Wirel. Sens. Syst. 2(4): 302-308 (2012) - Sabato Manfredi:
Reliable and energy-efficient cooperative routing algorithm for wireless monitoring systems. IET Wirel. Sens. Syst. 2(2): 128-135 (2012) - Babak Moussakhani, John T. Flåm, Stig Støa, Ilangko Balasingham, Tor A. Ramstad:
On localisation accuracy inside the human abdomen region. IET Wirel. Sens. Syst. 2(1): 9-15 (2012) - Christopher Wing Hong Ngau, Li-Minn Ang, Kah Phooi Seng:
Low memory visual saliency architecture for data reduction in wireless sensor networks. IET Wirel. Sens. Syst. 2(2): 115-127 (2012) - Trilochan Panigrahi, Ganapati Panda, Bernard Mulgrew:
Distributed bearing estimation technique using diffusion particle swarm optimisation algorithm. IET Wirel. Sens. Syst. 2(4): 385-393 (2012) - Bighnaraj Panigrahi, Ashwani Sharma, Swades De:
Interference aware power controlled forwarding for lifetime maximisation of wireless ad hoc networks. IET Wirel. Sens. Syst. 2(1): 22-30 (2012)
skipping 16 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-03 00:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint