Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Wireless sensor networks: A survey on the state of the art and the 802.15. 4 and ZigBee standards
Wireless sensor networks are an emerging technology for low-cost, unattended monitoring
of a wide range of environments. Their importance has been enforced by the recent delivery …
of a wide range of environments. Their importance has been enforced by the recent delivery …
A survey of DHT security techniques
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …
Collection tree protocol
This paper presents and evaluates two principles for wireless routing protocols. The first is
datapath validation: data traffic quickly discovers and fixes routing inconsistencies. The …
datapath validation: data traffic quickly discovers and fixes routing inconsistencies. The …
[کتاب][B] Algorithms and protocols for wireless sensor networks
A Boukerche - 2009 - Wiley Online Library
With the recent technological advances in wireless communication and networking, coupled
with the availability of intelligent and low-cost actor and sensor devices with powerful …
with the availability of intelligent and low-cost actor and sensor devices with powerful …
Geographic routing using hyperbolic space
We propose a scalable and reliable point-to-point routing algorithm for ad hoc wireless
networks and sensor-nets. Our algorithm assigns to each node of the network a virtual …
networks and sensor-nets. Our algorithm assigns to each node of the network a virtual …
An empirical study of low-power wireless
We present empirical measurements of the packet delivery performance of the latest sensor
platforms: Micaz and Telos motes. In this article, we present observations that have …
platforms: Micaz and Telos motes. In this article, we present observations that have …
Vampire attacks: Draining life from wireless ad hoc sensor networks
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …
pervasive computing. Prior security work in this area has focused primarily on denial of …
Virtual ring routing: network routing inspired by DHTs
This paper presents Virtual Ring Routing (VRR), a new network routing protocol that
occupies a unique point in the design space. VRR is inspired by overlay routing algorithms …
occupies a unique point in the design space. VRR is inspired by overlay routing algorithms …
CTP: An efficient, robust, and reliable collection tree protocol for wireless sensor networks
We describe CTP, a collection routing protocol for wireless sensor networks. CTP uses three
techniques to provide efficient, robust, and reliable routing in highly dynamic network …
techniques to provide efficient, robust, and reliable routing in highly dynamic network …
Efficient naming, addressing and profile services in Internet-of-Things sensory environments
We present a naming, addressing, and profile server (NAPS) as a middleware to bridge
different platforms in Internet-of-Things (IoT) sensory environments. Given massive amount …
different platforms in Internet-of-Things (IoT) sensory environments. Given massive amount …