Journal: Computer Communications

Volume 29, Issue 2

149 -- 150Mohamed Eltoweissy, Mohamed F. Younis. Dependable Wireless Sensor Networks
151 -- 161Karim Seada, Ahmed Helmy. Efficient and robust geocasting protocols for sensor networks
162 -- 172Yong Yuan, Zongkai Yang, Zhihai He, Jianhua He. An integrated energy aware wireless transmission system for QoS provisioning in wireless sensor network
173 -- 182Ertan Onur, Cem Ersoy, Hakan DeliƧ. How many sensors for an acceptable breach detection probability?
183 -- 199Sandeep S. Kulkarni, Mahesh Arumugam. Transformations for write-all-with-collision model:::, :::
200 -- 215Sandeep S. Kulkarni, Mohamed G. Gouda, Anish Arora. Secret instantiation in ad-hoc networks
216 -- 230Jing Deng, Richard Han, Shivakant Mishra. INSENS: Intrusion-tolerant routing for wireless sensor networks
231 -- 245Min Chen, Taekyoung Kwon, Yanghee Choi. Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks
246 -- 256Michael G. Hinchey, James L. Rash, Christopher Rouff, Denis Gracanin. Achieving dependability in sensor networks through automated requirements-based programming
257 -- 267Yu-Wei Chen, Yi-Ta Lee. A broadcasting scheme with supporting VCR functions for near video-on-demand systems
268 -- 278Lotfi Benachenhou, Samuel Pierre. Protection of a mobile agent with a reference clone