Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Topology control in wireless ad hoc and sensor networks
P Santi - ACM computing surveys (CSUR), 2005 - dl.acm.org
Topology Control (TC) is one of the most important techniques used in wireless ad hoc and
sensor networks to reduce energy consumption (which is essential to extend the network …
sensor networks to reduce energy consumption (which is essential to extend the network …
A survey of social-based routing in delay tolerant networks: Positive and negative social effects
Delay tolerant networks (DTNs) may lack continuous network connectivity. Routing in DTNs
is thus challenging since it must handle network partitioning, long delays, and dynamic …
is thus challenging since it must handle network partitioning, long delays, and dynamic …
[PDF][PDF] TRM-IoT: A trust management model based on fuzzy reputation for internet of things
Since a large scale Wireless Sensor Network (WSN) is to be completely integrated into
Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is …
Internet as a core part of Internet of Things (IoT) or Cyber Physical System (CPS), it is …
Mobile ad hoc networking: imperatives and challenges
I Chlamtac, M Conti, JJN Liu - Ad hoc networks, 2003 - Elsevier
Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …
wireless mobile nodes that can freely and dynamically self-organize into arbitrary and …
Performance analysis of the CONFIDANT protocol
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing
and forwarding. However, it may be advantageous for individual nodes not to cooperate. We …
and forwarding. However, it may be advantageous for individual nodes not to cooperate. We …
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks
Multihop data delivery through vehicular ad hoc networks is complicated by the fact that
vehicular networks are highly mobile and frequently disconnected. To address this issue, we …
vehicular networks are highly mobile and frequently disconnected. To address this issue, we …
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general,
routing protocols for MANETs are designed based on the assumption that all participating …
routing protocols for MANETs are designed based on the assumption that all participating …
Self-organized public-key management for mobile ad hoc networks
In contrast with conventional networks, mobile ad hoc networks usually do not provide
online access to trusted authorities or to centralized servers, and they exhibit frequent …
online access to trusted authorities or to centralized servers, and they exhibit frequent …
[PDF][PDF] An overview of mobile ad hoc networks: applications and challenges
In the past few years, we have seen a rapid expansion in the field of mobile computing due
to the proliferation of inexpensive, widely available wireless devices. However, current …
to the proliferation of inexpensive, widely available wireless devices. However, current …