Wi-Fi for sensor networks

被引:0
|
作者
Verhappen, Ian [1 ]
机构
[1] Willowglen Systems Inc, Canada
来源
Control | 2019年 / 32卷 / 08期
关键词
2;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A Centralised Wi-Fi Management Framework for D2D Communications in Dense Wi-Fi Networks
    Seyedebrahimi, Mirghiasaldin
    Raschella, Alessandro
    Bouhafs, Faycal
    Mackay, Michael
    Shi, Qi
    Eiza, Mahmoud Hashem
    [J]. 2016 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2016,
  • [42] 查看Wi-Fi密码与Wi-Fi的连接
    王荣桂
    [J]. 电脑知识与技术(经验技巧), 2016, (08) : 24 - 25
  • [43] Downlink Capacity of Super Wi-Fi Coexisting with Conventional Wi-Fi
    Kim, Hyoil
    Shin, Kyubo
    Joo, Changhee
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 980 - 985
  • [44] Passive Wi-Fi: Bringing Low Power to Wi-Fi Transmissions
    Kellogg, Bryce
    Talla, Vamsi
    Gollakota, Shyamnath
    Smith, Joshua R.
    [J]. 13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), 2016, : 151 - 164
  • [45] Wi-Fi Radar: Recognizing Human Behavior with Commodity Wi-Fi
    Zou, Yongpan
    Liu, Weifeng
    Wu, Kaishun
    Ni, Lionel M.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (10) : 105 - 111
  • [47] Wi-Fi Channels Saturation Using Standard Wi-Fi Gateway
    Cortes Canas, Daniel
    Reyes Daza, Brayan S.
    Salcedo Parra, Octavio J.
    [J]. MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, MSPN 2015, 2015, 9395 : 101 - 108
  • [48] PASSIVE WI-FI: Bringing Low Power to Wi-Fi Transmissions
    Kellogg, Bryce
    Talla, Vamsi
    Smith, Joshua R.
    Gollakota, Shyamnath
    [J]. GETMOBILE-MOBILE COMPUTING & COMMUNICATIONS REVIEW, 2016, 20 (03) : 38 - 41
  • [49] Sampleless Wi-Fi: Bringing Low Power to Wi-Fi Communications
    Wang, Wei
    Chen, Yingjie
    Wang, Lu
    Zhang, Qian
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) : 1663 - 1672
  • [50] An Optimal Sensor Architecture for Wi-Fi Intrusion Detection
    Tao, Zhiqi
    Nath, Baikunth
    Lonie, Andrew
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 10 - 19