PLRSA: Promiscuous Listening Routing Security Algorithm
碩士 === 國立成功大學 === 電機工程學系碩博士班 === 91 === Routing security in the ad hoc networks has been extensively studied recently. Due to the characteristics of wireless ad hoc networks, e.g., limitation of communication range, data packets have to be relayed by other intermediate nodes to successfully reach th...
Main Authors: | Cheng-Ta Lee, 李政達 |
---|---|
Other Authors: | Jung-Shian Li |
Format: | Others |
Language: | en_US |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/06865467417440801272 |
Similar Items
-
Correction: Exploiting the promiscuity of imatinib
by: Lee Shun J, et al.
Published: (2010-06-01) -
The ancient Greek promiscuity
by: Čvorović Jelena
Published: (2002-01-01) -
Object Monitoring and Tracking Algorithms in Wireless Sensor Networks
by: Cheng-Ta Lee, et al.
Published: (2010) -
A measure of the promiscuity of proteins and characteristics of residues in the vicinity of the catalytic site that regulate promiscuity.
by: Sandeep Chakraborty, et al.
Published: (2012-01-01) -
Study on the Government imposed taxes in gained Securities Transactions
by: CHENG-TA LI, et al.
Published: (2015)