1.Predicting Missing Items in Shopping Carts.
2.A Gen2-Based RFID Authentication Protocol for Security and Privacy.
3 .A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks.
4 .Biased Random Walks in Uniform Wireless Networks.
5 .Cell Breathing Techniques for Load Balancing in Wireless LANs.
6 .Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period
7 .Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks.
8 .RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks.
9 .Resource Allocation in OFDMA Wireless Communications Systems Supporting
Multimedia Services
10 .Route Stability in MANETs under the Random Direction Mobility Model.
11 .Secure and Policy-Compliant Source Routing.
12 .Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking.
13.On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint.
14.Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows.
15 .Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks.
16 .Cell Breathing Techniques for Load Balancing in Wireless LANs.
17 .Explicit Load Balancing Technique forNGEO Satellite IP Networks With On-Board Processing Capabilities.
18 .Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification.
19 .Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services.
20 .Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks.
21 .Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications.
22 .Secure and Policy-Compliant Source Routing.
23 .Biased Random Walks in Uniform Wireless Networks.
24 .Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period.
25 .A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks.
26 .An Integrated Approach to Sensor Role Selection.
27 .Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking.
28 .On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint.
29.Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications.
30.Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks.
31.A Gen2-Based RFID Authentication Protocol for Security and Privacy.
32.RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks.
33.Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks.
34.On the Security of Route Discovery in MANETs.
35.Route Stability in MANETs under the Random Direction Mobility Model.
36.A Gen2-Based RFID Authentication Protocol for Security and Privacy .
37 .A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks.
38 .Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks.
39 .Biased Random Walks in Uniform Wireless Networks.
40 .Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period.
41 .Explicit Load Balancing Technique for NGEO Satellite IP Networks with On-Board Processing Capabilities.
42 .Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks.
43 .Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking.
44 .On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint.
45 .Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications.
46 .Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services.
47 .Route Stability in MANETs under the Random Direction Mobility Model .
48.Secure and Policy-Compliant Source Routing.
49 .Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths.
50 .Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification.
2.A Gen2-Based RFID Authentication Protocol for Security and Privacy.
3 .A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks.
4 .Biased Random Walks in Uniform Wireless Networks.
5 .Cell Breathing Techniques for Load Balancing in Wireless LANs.
6 .Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period
7 .Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks.
8 .RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks.
9 .Resource Allocation in OFDMA Wireless Communications Systems Supporting
Multimedia Services
10 .Route Stability in MANETs under the Random Direction Mobility Model.
11 .Secure and Policy-Compliant Source Routing.
12 .Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking.
13.On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint.
14.Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows.
15 .Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks.
16 .Cell Breathing Techniques for Load Balancing in Wireless LANs.
17 .Explicit Load Balancing Technique forNGEO Satellite IP Networks With On-Board Processing Capabilities.
18 .Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification.
19 .Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services.
20 .Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks.
21 .Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications.
22 .Secure and Policy-Compliant Source Routing.
23 .Biased Random Walks in Uniform Wireless Networks.
24 .Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period.
25 .A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks.
26 .An Integrated Approach to Sensor Role Selection.
27 .Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking.
28 .On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint.
29.Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications.
30.Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks.
31.A Gen2-Based RFID Authentication Protocol for Security and Privacy.
32.RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks.
33.Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks.
34.On the Security of Route Discovery in MANETs.
35.Route Stability in MANETs under the Random Direction Mobility Model.
36.A Gen2-Based RFID Authentication Protocol for Security and Privacy .
37 .A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks.
38 .Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks.
39 .Biased Random Walks in Uniform Wireless Networks.
40 .Energy Maps for Mobile Wireless Networks: Coherence Time versus Spreading Period.
41 .Explicit Load Balancing Technique for NGEO Satellite IP Networks with On-Board Processing Capabilities.
42 .Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks.
43 .Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking.
44 .On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint.
45 .Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications.
46 .Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services.
47 .Route Stability in MANETs under the Random Direction Mobility Model .
48.Secure and Policy-Compliant Source Routing.
49 .Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths.
50 .Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair Resolutions for RFID Tag Identification.
No comments:
Post a Comment