您当前的位置:
首页 >
文章列表页 >
Key infection and its applications in sensor networks
更新时间:2024-10-14
    • Key infection and its applications in sensor networks

    • Vol. 30, Issue 11, Pages: 56-63(2009)
    • CLC: TP212.9;TP393.08
    • Published:2009

    移动端阅览

  • LIU Zhi-hong1, MA Jian-feng1, PANG Liao-jun1, et al. Key infection and its applications in sensor networks[J]. 2009, 30(11): 56-63. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

761

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Trust evaluation model for distributed home photovoltaic collection scenarios in new power system
Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network
Ocean parameter adaptive time synchronization algorithm for ocean sensor network
Study on distributed and dynamic resource management for delay-sensitive sensor network
Design and implementation of wireless multimedia sensor network node based on DSP and binocular vision

Related Author

Xiaolong WANG
Zhixin ZHANG
Rongliang SHI
Xu GUO
Li LI
Youwei DING
Xiaolin QIN
Qian ZHOU

Related Institution

Engineering Research Center of Intelligent Computing for Complex Energy System, Ministry of Education, North China Electric Power University
School of Control and Computer Engineering, North China Electric Power University
Jiangsu Key Laboratory of Internet of Things and Control Technology
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics
College of Computer Science and Technology,Qingdao University of Science and Technology
0