Found: 38
Select item for more details and to access through your institution.
Joint node selection, flow routing, and cell coverage optimisation for network sum-rate maximisation in wireless sensor networks.
- Published in:
- IET Wireless Sensor Systems (Wiley-Blackwell), 2019, v. 9, n. 6, p. 424, doi. 10.1049/iet-wss.2019.0072
- By:
- Publication type:
- Article
Software-Defined Collaborative Offloading for Heterogeneous Vehicular Networks.
- Published in:
- Wireless Communications & Mobile Computing, 2018, p. 1, doi. 10.1155/2018/3810350
- By:
- Publication type:
- Article
High precision ranging with IR-UWB: a compressed sensing approach.
- Published in:
- Wireless Communications & Mobile Computing, 2016, v. 16, n. 17, p. 3015, doi. 10.1002/wcm.2742
- By:
- Publication type:
- Article
Secure machine-type communications in LTE networks.
- Published in:
- Wireless Communications & Mobile Computing, 2016, v. 16, n. 12, p. 1495, doi. 10.1002/wcm.2612
- By:
- Publication type:
- Article
Cluster-based coordination scheme for cooperative cognitive radio networks.
- Published in:
- Wireless Communications & Mobile Computing, 2016, v. 16, n. 9, p. 1050, doi. 10.1002/wcm.2585
- By:
- Publication type:
- Article
CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 9, p. 823, doi. 10.1002/sec.895
- By:
- Publication type:
- Article
CSMA/CA-based medium access control for indoor millimeter wave networks.
- Published in:
- Wireless Communications & Mobile Computing, 2016, v. 16, n. 1, p. 3, doi. 10.1002/wcm.2492
- By:
- Publication type:
- Article
Trust-Based Anomaly Detection in Emerging Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, p. 1, doi. 10.1155/2015/363569
- By:
- Publication type:
- Article
Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication.
- Published in:
- Wireless Communications & Mobile Computing, 2015, v. 15, n. 10, p. 1456, doi. 10.1002/wcm.2446
- By:
- Publication type:
- Article
Performance analysis of spectrally efficient amplify-and-forward opportunistic relaying scheme for adaptive cooperative wireless systems.
- Published in:
- Wireless Communications & Mobile Computing, 2015, v. 15, n. 8, p. 1247, doi. 10.1002/wcm.2397
- By:
- Publication type:
- Article
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 6, p. 1026, doi. 10.1002/sec.1057
- By:
- Publication type:
- Article
Distributed power control over multiple channels for ad hoc wireless networks.
- Published in:
- Wireless Communications & Mobile Computing, 2014, v. 14, n. 14, p. 1365, doi. 10.1002/wcm.2266
- By:
- Publication type:
- Article
Dimensioning the packet loss burstiness over wireless channels: a novel metric, its analysis and application.
- Published in:
- Wireless Communications & Mobile Computing, 2014, v. 14, n. 12, p. 1160, doi. 10.1002/wcm.2262
- By:
- Publication type:
- Article
Modeling epidemic data diffusion for wireless mobile networks.
- Published in:
- Wireless Communications & Mobile Computing, 2014, v. 14, n. 7, p. 745, doi. 10.1002/wcm.2233
- By:
- Publication type:
- Article
RSEL: revocable secure efficient lightweight RFID authentication scheme.
- Published in:
- 2014
- By:
- Publication type:
- Other
SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 265, doi. 10.1002/sec.727
- By:
- Publication type:
- Article
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 1, p. 234, doi. 10.1002/sec.699
- By:
- Publication type:
- Article
OUR: Optimal Update-based Replacement policy for cache in wireless data access networks with optimal effective hits and bandwidth requirements.
- Published in:
- Wireless Communications & Mobile Computing, 2013, v. 13, n. 15, p. 1337, doi. 10.1002/wcm.1182
- By:
- Publication type:
- Article
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 19, n. 1/2, p. 95
- By:
- Publication type:
- Article
Multichannel medium access control for ad hoc wireless networks Multichannel medium access control for ad hoc wireless networks.
- Published in:
- Wireless Communications & Mobile Computing, 2013, v. 13, n. 11, p. 1047, doi. 10.1002/wcm.1159
- By:
- Publication type:
- Article
ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 4, p. 401, doi. 10.1002/sec.625
- By:
- Publication type:
- Article
MULTI-SCROLL CHAOTIC AND HYPERCHAOTIC ATTRACTORS GENERATED FROM CHEN SYSTEM.
- Published in:
- International Journal of Bifurcation & Chaos in Applied Sciences & Engineering, 2012, v. 22, n. 2, p. 1250033-1, doi. 10.1142/S0218127412500332
- By:
- Publication type:
- Article
An efficient and provably secure public key encryption scheme based on coding theory.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 12, p. 1440, doi. 10.1002/sec.274
- By:
- Publication type:
- Article
Special issue on the selected papers of IWCMC'11.
- Published in:
- Wireless Communications & Mobile Computing, 2011, v. 11, n. 12, p. 1495, doi. 10.1002/wcm.1237
- By:
- Publication type:
- Article
Resource allocation in OFDMA networks based on interior point methods.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 11, p. 1493, doi. 10.1002/wcm.838
- By:
- Publication type:
- Article
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 6, p. 843, doi. 10.1002/wcm.796
- By:
- Publication type:
- Article
Call admission control with opportunistic scheduling scheme.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 3, p. 372, doi. 10.1002/wcm.771
- By:
- Publication type:
- Article
REP: Location Privacy for VANETs Using Random Encryption Periods.
- Published in:
- Mobile Networks & Applications, 2010, v. 15, n. 1, p. 172, doi. 10.1007/s11036-009-0175-4
- By:
- Publication type:
- Article
A Stochastic Multiobjective Optimization Framework for Wireless Sensor Networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2010, p. 1, doi. 10.1155/2010/430615
- By:
- Publication type:
- Article
A NOVEL SOFTWARE-BUILT PARALLEL MACHINES AND THEIR INTERCONNECTIONS.
- Published in:
- Journal of Interconnection Networks, 2008, v. 9, n. 1/2, p. 1, doi. 10.1142/S0219265908002138
- By:
- Publication type:
- Article
Guest Editorial.
- Published in:
- Wireless Networks (10220038), 2007, v. 13, n. 3, p. 281, doi. 10.1007/s11276-006-7524-z
- By:
- Publication type:
- Article
Scheduling with base station diversity and fairness analysis for the downlink of CDMA cellular networks.
- Published in:
- Wireless Communications & Mobile Computing, 2007, v. 7, n. 5, p. 569, doi. 10.1002/wcm.372
- By:
- Publication type:
- Article
Air interface switching and performance analysis for fast vertical handoff in cellular network and WLAN interworking.
- Published in:
- Wireless Communications & Mobile Computing, 2007, v. 7, n. 5, p. 581, doi. 10.1002/wcm.373
- By:
- Publication type:
- Article
Mobile location estimation for DS-CDMA systems using self-organizing maps.
- Published in:
- Wireless Communications & Mobile Computing, 2007, v. 7, n. 3, p. 285, doi. 10.1002/wcm.325
- By:
- Publication type:
- Article
Special issue: medium access control protocols for wireless ad hoc networks.
- Published in:
- Wireless Communications & Mobile Computing, 2006, v. 6, n. 6, p. 741, doi. 10.1002/wcm.438
- By:
- Publication type:
- Article
VoIP over WLAN: voice capacity, admission control, QoS, and MAC.
- Published in:
- International Journal of Communication Systems, 2006, v. 19, n. 4, p. 491, doi. 10.1002/dac.801
- By:
- Publication type:
- Article
Wireless network security.
- Published in:
- Wireless Communications & Mobile Computing, 2006, v. 6, n. 3, p. 269, doi. 10.1002/wcm.393
- By:
- Publication type:
- Article
Ultra-wideband wireless communications.
- Published in:
- Wireless Communications & Mobile Computing, 2003, v. 3, n. 6, p. 663, doi. 10.1002/wcm.149
- By:
- Publication type:
- Article