Search results
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > NCUS 2006 Symposium > 203-212
Lecture Notes in Computer Science > Machine Learning and Knowledge Discovery in Databases > Regular Papers > 282-297
Lecture Notes in Computer Science > Information Processing in Sensor Networks > Information Processing in Sensor Networks > 301-316
Lecture Notes in Computer Science > Security and Privacy in Ad-Hoc and Sensor Networks > Regular Papers > 6-17
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing > Ad Hoc and Sensor Networks > 661-670
Lecture Notes in Computer Science > Management of Convergence Networks and Services > Session 1: Management of Ad-Hoc and SensorNetworks > 11-22
Lecture Notes in Computer Science > Frontiers of High Performance Computing and Networking ISPA 2007 Workshops > Workshop on Security and Survivability in Distributed Sensor Networks > 41-49
Information Technology: Transmission, Processing and Storage > Wireless Communications Systems and Networks > 531-557
Studies in Computational Intelligence > Semantic Agent Systems > Applications of Semantic Agent Systems > 189-213
Lecture Notes in Computer Science > Neural Information Processing. Theory and Algorithms > Neurodynamics > 25-32
Lecture Notes in Computer Science > Management of Multimedia Networks and Services > End-to-End Monitoring Techniques and Services Workshop > 488-502
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 770-780
Lecture Notes in Computer Science > Distributed Computing in Sensor Systems > Performance of a Propagation Delay Tolerant ALOHA Protocol for Underwater Wireless Networks > 372-385
Lecture Notes in Computer Science > Wired/Wireless Internet Communications > Energy Efficient WSN Design > 13-23
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications/Virus Protection > 15-29