• English
    • Ελληνικά
  • English 
    • English
    • Ελληνικά
  • Login
Browsing by Subject 
  •   Home
  • Browsing by Subject
  •   Home
  • Browsing by Subject
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browsing by Subject "Wireless sensor network (WSNs)"

  • 0-9
  • Α
  • Β
  • Γ
  • Δ
  • Ε
  • Ζ
  • Η
  • Θ
  • Ι
  • Κ
  • Λ
  • Μ
  • Ν
  • Ξ
  • Ο
  • Π
  • Ρ
  • Σ
  • Τ
  • Υ
  • Φ
  • Χ
  • Ψ
  • Ω
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z

Sort by:

Order:

Results:

Now showing items 1-3 of 3

  • title
  • submit date
  • accessioned date
  • ascending
  • descending
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
    • Article  

      Congestion control in wireless sensor networks based on bird flocking behavior 

      Antoniou, Pavlos Ch.; Pitsillides, Andreas; Blackwell, T.; Engelbrecht, A.; Michael, Loizos (2013)
      This paper proposes that the flocking behavior of birds can guide the design of a robust, scalable and self-adaptive congestion control protocol in the context of wireless sensor networks (WSNs). The proposed approach ...

    • Article  

      Congestion control in wireless sensor networks based on the bird flocking behavior 

      Antoniou, Pavlos Ch.; Pitsillides, Andreas; Engelbrecht, A.; Blackwell, T.; Michael, Loizos (2009)
      Recently, performance controlled wireless sensor networks have attracted significant interest with the emergence of mission-critical applications (e.g. health monitoring). Performance control can be carried out by robust ...

    • Conference Object  

      Recovering from the selective forwarding attack in WSNs - Enhancing the recovery benefits of blacklisting and rerouting using directional antennas 

      Stavrou, Eliana; Pitsillides, Andreas (Institute of Electrical and Electronics Engineers Inc., 2014)
      Wireless sensor networks (WSNs) face a number of security challenges that can compromise their operation. A typical security attack that can be launched by an adversary, in order to affect the network's communication, is ...

      Browse

      EverywhereCommunities & CollectionsBy Submission DateAuthorsTitlesSubjectsBy TypeBy DepartmentBy Faculty

      My Account

      Login
      Πνευματικά δικαιώματα ©  Βιβλιοθήκη Πανεπιστημίου Κύπρου
      Contact Us | Send Feedback
      Οδηγίες κατάθεσης διδακτορικής διατριβής
      Open Access
      ORCiD