Slēptie lauki
Grāmatas Grāmatas
" In Proceedings of the sixth annual international conference on Mobile computing and networking (Mobicom '00), pages 56-67, Nov2003. 18. B. KarpandH. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. "
Wireless Network Security - 134. lappuse
laboja - 2007 - 424 lapas
Ierobežota priekšskatīšana - Par šo grāmatu

From Animals to Animats 7: Proceedings of the Seventh International ...

Bridget Hallam, Dario Floreano, John Hallam, Gillian M. Hayes, Jean-Arcady Meyer - 2002 - 438 lapas
...Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCOM '00), pages 56-67, Boston, Massachussetts, USA. Khoshnevis, B., Kovac, B., Shen, W.-M., and Will, P....
Ierobežota priekšskatīšana - Par šo grāmatu

Modeling and Using Context: 5th International and ..., 5. sējums

Anind Dey - 2005 - 1392 lapas
...Estrin. Directed diffusion: a scalable and robust communication paradigm for sensor networks. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, Massachusetts, August 6-11, 2000, 56-67 3. William Adjie-Winoto, Elliot Schwartz, Hari...
Ierobežota priekšskatīšana - Par šo grāmatu

Ad Hoc Wireless Networking

Xiuzhen Cheng, Xiao Huang, Ding-Zhu Du - 2004 - 638 lapas
...Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Procedings of the The Sixth Annual International Conference on Mobile Computing and Networking (Mobicom) Boston, MA, Aug. 2000 [27] D. Maughan, M. Schertler, M. Schneider and J. Turner, "Internet Security Association...
Ierobežota priekšskatīšana - Par šo grāmatu

Networking 2005 Networking Technologies, Services, And Protocols ...

Raouf Boutaba - 2005 - 1512 lapas
...misbehavior in mobile ad hoc networks. Proc. 6th ACM Mobile Comp. & Netw. (MobiCom), pp. 255-265, 2000. 6. Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. Proc. 6th ACM MobiCom, pp. 275-283, 2000. 7. L. Buttyan and J.-P. Hubaux. Enforcing service availability...
Ierobežota priekšskatīšana - Par šo grāmatu

Security and Routing in Wireless Networks

Yang Xiao, Jie Li, Yi Pan - 2005 - 336 lapas
...AND V. BH ARGHAVAN, A new model for packet scheduling in multihop wireless networks, in Proceedings of the sixth annual international conference on Mobile computing and networking (MOBICOM), ACM Press, 2000, pp. 76-86. [18] H. LUO, P. MEDVEDEV, J. CHENG, AND S. Lu, A self-coordinating approach...
Ierobežota priekšskatīšana - Par šo grāmatu

Modeling and Using Context: 5th International and ..., 5. sējums

Anind Dey - 2005 - 1392 lapas
...Estrin. Directed diffusion: a scalable and robust communication paradigm for sensor networks. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, Massachusetts, August 6—11, 2000,56—67 3. William Adjie-Winoto, Elliot Schwartz,...
Ierobežota priekšskatīšana - Par šo grāmatu

Security in Sensor Networks

Yang Xiao - 2016 - 341 lapas
...Services for Ad Hoc Wireless Networks, Technical Report 200030, UCLA Computer Science Department, 2000 32. Y. Zhang and W. Lee, Intrusion Detection in Wireless Ad-Hoc Networks, Proc. of the Sixth International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, August 2000....
Ierobežota priekšskatīšana - Par šo grāmatu

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc ...

Radha Poovendran, Cliff Wang, Sumit Roy - 2007 - 396 lapas
...Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the sixth annual international conference on Mobile computing and networking (Mobicom '00), pages 56-67, Nov2003. 18. B. KarpandH. T. Kung. GPSR: Greedy perimeter stateless routing for...
Ierobežota priekšskatīšana - Par šo grāmatu

Computational Science and Its Applications - ICCSA 2007: International ...

Osvaldo Gervasi - 2007 - 1129 lapas
...38-47 (2004) 16. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000) (August 2000) A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy* Daeyoung...
Ierobežota priekšskatīšana - Par šo grāmatu

Computational Intelligence and Security: International Conference, CIS 2006 ...

Yunping Wang - 2007 - 1139 lapas
...TJ, Lai, K., Baker, M.: Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking MobiCom (2000) 7. IETF MANET Working Group Internet Drafts. http://www.ietf.org/ ids . by . wg/manet . html...
Ierobežota priekšskatīšana - Par šo grāmatu




  1. Mana bibliotēka
  2. Palīdzība
  3. Izvērstā grāmatu meklēšana