

Author: Fang Yuguang
Publisher: Springer Publishing Company
ISSN: 1022-0038
Source: Wireless Networks, Vol.10, Iss.5, 2004-09, pp. : 607-619
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Strongly Consistent Access Algorithms for Wireless Data Networks
By Fang Yuguang
Wireless Networks, Vol. 11, Iss. 3, 2005-05 ,pp. :




By Fenton C. Nigeon B. Willis B. Harris J.
BT Technology Journal, Vol. 18, Iss. 3, 2000-07 ,pp. :


Wireless sensor gathering data during long time
Telecommunication Systems, Vol. 52, Iss. 4, 2013-04 ,pp. :