Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1835
search results - page 214 / 367
»
Security-aware ad hoc routing for wireless networks
Sort
relevance
views
votes
recent
update
View
thumb
title
54
Voted
ICC
2007
IEEE
91
views
Communications
»
more
ICC 2007
»
A Hierarchical Clustering Method in Wireless Ad Hoc Sensor Networks
15 years 4 months ago
Download
www.prism.uvsq.fr
Yuefeng Zhou, Michael Hart, Sunil Vadgama, A. Rouz
claim paper
Read More »
67
Voted
VTC
2007
IEEE
172
views
Communications
»
more
VTC 2007
»
A Novel Multi-Channel MAC Protocol for Wireless Ad Hoc Networks
15 years 4 months ago
Download
ir.lib.stut.edu.tw
Shou-Chih Lo, Chia-Wei Tseng
claim paper
Read More »
48
click to vote
VTC
2006
IEEE
95
views
Communications
»
more
VTC 2006
»
On The Distance Distributions of The Wireless Ad Hoc Networks
15 years 4 months ago
Download
ntur.lib.ntu.edu.tw
Chih-Cheng Tseng, Hsuan-Tsang Chen, Kwang-Cheng Ch...
claim paper
Read More »
45
click to vote
INFOCOM
2005
IEEE
99
views
Communications
»
more
INFOCOM 2005
»
Impact of power control on the performance of ad hoc wireless networks
15 years 3 months ago
Download
www.ee.ucla.edu
Arash Behzad, Izhak Rubin
claim paper
Read More »
104
click to vote
INFOCOM
2005
IEEE
182
views
Communications
»
more
INFOCOM 2005
»
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
15 years 3 months ago
Download
mcn.cse.psu.edu
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
claim paper
Read More »
« Prev
« First
page 214 / 367
Last »
Next »