default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 13
Volume 13, Number 1, 2013
- Chih-Min Chao, Ming-Wei Lu:
Energy-efficient transmissions for bursty traffic in underwater sensor networks. 1-9 - Jianmin Zou, Stephen Gundry, Janusz Kusyk, M. Ümit Uyar, Cem Safak Sahin:
3D genetic algorithms for underwater sensor networks. 10-22 - Yeong-Hun Cho, Seung-Man Chun, Jong-Tae Park:
An enhanced fast IP mobility management using multiple care-of-addresses in vehicular networks. 23-37 - Elaheh Vaezpour, Mehdi Dehghan:
Evolutionary-based channel assignment in multi-radio multi-channel wireless mesh networks for multicast applications. 38-47 - Shu-Fen Yang, Tien-Hsiung Ku, Andy An-Kai Jeng, Rong-Hong Jan, Yu-Chee Tseng, Kuochen Wang, Yuh-Jyh Hu:
iPCA: an integration information system for patient controlled analgesia using wireless techniques. 48-58 - Ali Ghiasian, Hossein Saidi, Mohammad Behdadfar:
Delay analysis of randomised algorithms for link scheduling in wireless networks. 59-72
Volume 13, Number 2, 2013
- Jia Jan Ong, Li-Minn Ang, Kah Phooi Seng:
Selective secure error correction on SPIHT coefficients for pervasive wireless visual network. 73-82 - Rong Hu, Wanchun Dou, Jianxun Liu:
A personalised search approach for web service recommendation. 83-95 - Tao Lin, Kailun Zhou, Shuhui Wang:
Cloudlet-screen computing: a client-server architecture with top graphics performance. 96-108 - Fan Wu, Supeng Leng, Yuming Mao, Xiaoyan Huang:
A joint resource allocation scheme for OFDMA-based wireless pervasive networks with carrier aggregation. 109-119 - Jose Felipe Mejia Bernal, Paolo Falcarin, Luca Ardito, Oscar Rodriguez Rocha, Maurizio Morisio, Francesco Pistillo, Flavio Giovanelli:
Emergency situations supported by context-aware and application streaming technologies. 120-131 - J. Valarmathi, V. Rhymend Uthariaraj:
An integrated approach for trust management based on policy, community adherence and reputation. 132-139 - Hai Wan, Yang Yu, Jian-Tian Zheng:
Design and implementation of P2P reasoning system based on description logic. 140-154
Volume 13, Numbers 3/4, 2013
- Sana Ullah, Min Chen, Waleed Alsalih:
Performance analysis of contention access period of IEEE 802.15.3 MAC protocol. 158-166 - Paul E. Estrada-Martinez, J. Antonio García-Macías:
Semantic interactions in the Internet of Things. 167-175 - Jingwu Cui, Jianxin Chen, Baoyu Zheng:
Energy-aware distributed scheduling for multimedia streaming over Internet of Things. 176-186 - Jiafu Wan, Hehua Yan, Qiang Liu, Keliang Zhou, Rongshuang Lu, Di Li:
Enabling cyber-physical systems with machine-to-machine technologies. 187-196 - Kun Wang, Yue Yu:
A query-matching mechanism over out-of-order event stream in IOT. 197-208 - Manuel Delamo Ramos, Andrew David Foster, Santiago Felici-Castell, Vicent Gallart Fos, Juan José Pérez Solano:
Gatherer: an environmental monitoring application based on IPv6 using wireless sensor networks. 209-217 - Alejandro Cadenas, Carlos Baladrón Zorita, Javier M. Aguiar Pérez, Belén Carro, Antonio Sánchez-Esguevillas:
Intelligent context retrieval and management for services in the Internet of Things. 218-227 - Antonio J. Jara, Ved P. Kafle, Antonio Fernandez Gómez-Skarmeta:
Secure and scalable mobility management scheme for the Internet of Things integration in the future internet architecture. 228-242 - B. S. Panda, D. Pushparaj Shetty:
Minimum interference strong bidirectional topology for wireless sensor networks. 243-253 - Yahui Wu, Su Deng, Hongbin Huang:
Performance analysis of epidemic routing in DTNs with limited forwarding times and selfish nodes. 254-263 - Jain-Shing Liu:
Cross-layer lifetime maximisation in wireless multihop networks with network coding. 264-273
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.