Volume 26,Issue S1,2015 Table of Contents
NLOS Mitigation Location Method Based on Scatterers ModelWANG Rui, YANG Xiao-Feng and PENG Li2015,26(S1):1-7 [Abstract(3013)] [View PDF(4490)513.17 K]A Biclique Cryptanalysis on Lightweight Block Cipher MIBS-80LUO Fang, OU Qing-Yu, ZHOU Xue-Guang, CHEN Yun and LI Shi-Lei2015,26(S1):8-16 [Abstract(2856)] [View PDF(4665)536.29 K]Dynamic Routing System for WSNs Based on Policy EngineZHANG Zu-Sheng, ZHAO Tie-Zhu and YUAN Hua-Qiang2015,26(S1):17-28 [Abstract(3051)] [View PDF(4156)794.53 K]Community-Based Message Opportunistic Transmission Scheme in Mobile Social NetworksZHANG Sheng, LIU Xiao-Dong, BAO Xiao-Ling, GUO Shui-Ying and WANG Xin2015,26(S1):29-38 [Abstract(3321)] [View PDF(4552)794.30 K]A Survey on Activity Recognition Using Wireless SignalsYANG Xue, Lü Shao-He, ZHANG Min, WANG Xiao-Dong and ZHOU Xing-Ming2015,26(S1):39-48 [Abstract(3169)] [View PDF(10715)610.95 K]Authenticated Key Agreement Scheme for Heterogeneous Sensor NetworksWANG Jiu-Ru, DING Lin-Hua, LIU Li and WANG Hai-Feng2015,26(S1):49-57 [Abstract(2791)] [View PDF(4864)891.91 K]Dynamic-Window PCA Algorithm for Step Direction EstimationZHU Xiang-Jun, CHEN Jing and LIANG Jiu-Zhen2015,26(S1):58-69 [Abstract(2923)] [View PDF(5654)1.50 M]Cloud Model-Based Link Quality Prediction Model for Wireless Sensor NetworksLIU Lin-Lan, GU Xiao-Le, LIU Song and SHU Jian2015,26(S1):70-77 [Abstract(2891)] [View PDF(5562)536.26 K]Key Technologies of Indoor Navigation Based on Heuristic Path Planning and IMUZHANG Xiao-Dong, ZHAN De-Chen, WANG Chen-Yu and QU Jin-Chun2015,26(S1):78-89 [Abstract(2746)] [View PDF(6857)1.06 M]