What people are saying - Write a review
We haven't found any reviews in the usual places.
QoS for Wireless Ad hoc and Sensor Networks
Wireless Network Security II
Taxonomy and Research Issues
3 other sections not shown
achieve adaptive algorithm allocated allows applications approach architecture assigned associated assume attack authentication average bandwidth base station buffer capacity cell changes cluster communication Computer connection consider copies defined delay described destination detection distributed dynamic efficient encryption energy example Figure flow forwarding function given higher hoc networks IEEE increases initial integrity layer load mechanism messages mobile monitor multicast multimedia neighbors node Note operation overhead packet parameters path performance positives possible present probability problem Proceedings proposed protocol range received reduced relay request requires routing scheduling scheme selection sensor networks servers shown shows simulation solution specific stream subnets Table throughput tion topology traffic transmission transmit tree trust types utility wireless wireless networks