Filter your results
- 3
- 3
- 3
- 3
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
A version of LEACH Adapted to the Lognormal Shadowing Model5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.465-475, ⟨10.1007/978-3-319-19578-0_38⟩
Conference papers
hal-01789956v1
|
||
|
On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.406-415, ⟨10.1007/978-3-319-19578-0_33⟩
Conference papers
hal-01789947v1
|
||
|
QoS-Aware Web Services Selection Based on Fuzzy Dominance5th International Conference on Computer Science and Its Applications (CIIA), May 2015, Saida, Algeria. pp.291-300, ⟨10.1007/978-3-319-19578-0_24⟩
Conference papers
hal-01789939v1
|