Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Image document

A version of LEACH Adapted to the Lognormal Shadowing Model

Chifaa Tabet Hellel , Mohamed Lehsaini , Hervé Guyennet
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.465-475, ⟨10.1007/978-3-319-19578-0_38⟩
Conference papers hal-01789956v1
Image document

On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks

Nabila Labraoui , Mourad Gueroui , Larbi Sekhri
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.406-415, ⟨10.1007/978-3-319-19578-0_33⟩
Conference papers hal-01789947v1
Image document

QoS-Aware Web Services Selection Based on Fuzzy Dominance

Amal Halfaoui , Fethallah Hadjila , Fedoua Didi
5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.291-300, ⟨10.1007/978-3-319-19578-0_24⟩
Conference papers hal-01789939v1