第 22卷 第 1期 2009 年 3 月 宁 波 大 学 学 报 ( 理 工 版 ) JOURN AL O F N ING BO UN IVERSITY (N SEE ) V o l_22 N o l M at. 2 0 09 文章编号:1001.5 132 (2009 ) 01―0007.05 无线传感器网络的自身定位算法研究 倪海燕 ,应祥岳 ,简家文 ,胡俊溟 2 (1.宁波大学 信息科学与工程学院,浙江 宁波 31521 l;2.丽水市缙云县委办公室,浙江 丽水 321400 ) 摘
Chapter 1 is a general introduction. Chapter 2 presents the backbone of WSNs, the IEEE 802.15.4 protocol. The requirements for service-oriented sensor webs are presented in Chapter 3. Cross-layer design principles are described in Chapter 4. Grid co
David J. C. MacKay's book. The textbook used for the information theory course in Cambridge University. Also an excellent book for machine learning. The special feature of this book is it reveals the relationship between information theory and machi
内容不是很难, 对研究mesh securiy不久的人有帮助~ "Security in Wireless Mesh Networks" Edited by Yan Zhang 1 An Introduction to Wireless Mesh Networks 2 Mesh Networking in Wireless PANs, LANs, MANs,and WANs 3 Attacks and Security Mechanisms 4 Intrusion Detection in W
Preface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Requ
Copyright Preface The Audience for This Book Background Information Organization of the Material Conventions Used in This Book Using Code Examples We'd Like to Hear from You Safari Enabled Acknowledgments Part I: General Background Chapter 1. Introd
java虚拟机的运行机理的详细介绍 Inside the Java Virtual Machine Bill Venners $39.95 0-07-913248-0 Inside the Java Virtual Machine Acknowledgments Introduction Part One: Java's Architecture 1 Introduction to Java's Architecture Why Java? The Architecture The Java
With a few exceptions, academic packing algorithms for FPGAs are typically applied solely
to theoretical architectures. This has allowed the algorithms to focus on the basic components of
packing while abstracting away many of the details dictated by