×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [surrounding nodes]
Documents
Fyp ca2
465 views
Documents
Problems in Ad Hoc Channel Access Hidden Terminal Problem : Two nodes are said to be hidden from one another (out of signal range) when both attempt to
217 views
Documents
LOGO Security Issues in Wireless Sensor Networks (WSNs) Shayan Zamani & Mojtaba Jafari Mazanadaran University of Science and Technology, Distributed Systems
216 views
Engineering
Performance evaluation of variants of particle swarm optimization algorithms for the purpose of clustering in wireless sensor networks
102 views
Documents
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
38 views
Documents
Architectures and Applications for Wireless Sensor Networks (01204525) Medium Access Control Chaiporn Jaikaeo
[email protected]
Department of Computer
219 views
Documents
By Areeba Rao with Dr. Nadeem Javaid COMSATS, Institute of Information Technology, Islamabad, Pakistan AM-DisCNT: Angular Multi-hop DIStance based Circular
219 views
Documents
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can
218 views
Documents
Network Kernel Architectures and Implementation (01204423) ) Medium Access Control and WPAN Technologies Chaiporn Jaikaeo
[email protected]
Department
217 views
Documents
1 Applications of Relative Importance Why is relative importance interesting? Web Social Networks Citation Graphs Biological Data Graphs become too
217 views
Documents
Applications of Relative Importance
28 views
Documents
Shinkhole Attack
10 views
Next >