-
1
-
-
0028447376
-
Sleepers and workaholics: Caching strategies for mobile environments
-
D. Barbara and T. Imielinski. Sleepers and Workaholics: Caching Strategies for Mobile Environments. ACM SIGMOD, pages 1-12, 1994.
-
(1994)
ACM SIGMOD
, pp. 1-12
-
-
Barbara, D.1
Imielinski, T.2
-
2
-
-
2442597363
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes fairness in dynamic adhoc neTworks
-
June
-
S. Buchegger and J.-Y. Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes Fairness In Dynamic Adhoc NeTworks. ACM Mobihoc, pages 80-91, June 2002.
-
(2002)
ACM Mobihoc
, pp. 80-91
-
-
Buchegger, S.1
Boudec, J.-Y.2
-
3
-
-
0034543872
-
A scalable low-latency cache invalidation strategy for mobile environments
-
G. Cao. A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments. ACM Mobicom, 2000.
-
(2000)
ACM Mobicom
-
-
Cao, G.1
-
4
-
-
0032046534
-
Cooperative cache-based data access in ad hoc networks
-
April
-
P. Cao and C. Liu. Cooperative Cache-Based Data Access in Ad Hoc Networks. IEEE Transactions on Computers, pages 445-457, April 1998.
-
(1998)
IEEE Transactions on Computers
, pp. 445-457
-
-
Cao, P.1
Liu, C.2
-
5
-
-
10744230968
-
A cooperative cache based data access framework for ad hoc networks
-
Feburary
-
G. Cao, L. Yin, and C. Das. A Cooperative Cache Based Data Access Framework For Ad Hoc Networks. IEEE Computer, pages 32-39, Feburary 2004.
-
(2004)
IEEE Computer
, pp. 32-39
-
-
Cao, G.1
Yin, L.2
Das, C.3
-
6
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
S. Das, C. Perkins, and E. Royer. Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks. IEEE Infocom, pages 3-12, 2000.
-
(2000)
IEEE Infocom
, pp. 3-12
-
-
Das, S.1
Perkins, C.2
Royer, E.3
-
8
-
-
85056059061
-
Multicast operations of the ad-hoc on-demand distance vectore routing protocol
-
Aug.
-
E. Royer and C. Perkins. Multicast Operations of the Ad-hoc On-Demand Distance Vectore Routing Protocol. Proceedings of ACM/IEEE Mobicom'99, Aug. 1999.
-
(1999)
Proceedings of ACM/IEEE Mobicom'99
-
-
Royer, E.1
Perkins, C.2
-
9
-
-
85177184451
-
Ariadne: A secure on-demand routing protocol for wireless ad hoc networks
-
Sep.
-
Y. Hu, A. Perrig, and D. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Wireless Ad Hoc Networks. ACM Mobicom, Sep. 2002.
-
(2002)
ACM Mobicom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
10
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
April
-
Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. IEEE Infocom, April 2003.
-
(2003)
IEEE Infocom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
11
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
H. Hubaux, L. Buttyan, and S. Capkun. The Quest for Security in Mobile Ad Hoc Networks. ACM MobiHoc, pages 146-155, 2001.
-
(2001)
ACM MobiHoc
, pp. 146-155
-
-
Hubaux, H.1
Buttyan, L.2
Capkun, S.3
-
12
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
D. Johnson and D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, Kluwer, pages 153-181, 1996.
-
(1996)
Mobile Computing, Kluwer
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
13
-
-
0036346359
-
Effective location-guided tree construction algorithms for small group multicast in MANET
-
June
-
K. Chen and K. Nahrstedt. Effective Location-Guided Tree Construction Algorithms for Small Group Multicast in MANET. Proceedings of IEEE Infocom'02, June 2002.
-
(2002)
Proceedings of IEEE Infocom'02
-
-
Chen, K.1
Nahrstedt, K.2
-
14
-
-
1542298520
-
Detection and handling of MAC layer misbehavior in wireless networks
-
Aug.
-
P. Kyasanur and N. Vaidya. Detection and Handling of MAC Layer Misbehavior in Wireless Networks. Technical Report, UIUC, Aug. 2002.
-
(2002)
Technical Report, UIUC
-
-
Kyasanur, P.1
Vaidya, N.2
-
15
-
-
0036924499
-
On-demand multicast routing protocol in multihop wireless mobile networks
-
December
-
S. Lee, W. Su, and M. Gerla. On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks. ACM/Kluwer Mobile Networks and Applications (MONET), 7(6):441-453, December 2002.
-
(2002)
ACM/Kluwer Mobile Networks and Applications (MONET)
, vol.7
, Issue.6
, pp. 441-453
-
-
Lee, S.1
Su, W.2
Gerla, M.3
-
17
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Aug.
-
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. ACM MobiCom, Aug. 2000.
-
(2000)
ACM MobiCom
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
21
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
Nov.
-
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks. IEEE Int'l Conf. on Network Protocols (ICNP), Nov. 2002.
-
(2002)
IEEE Int'l Conf. on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Belding-Royer, E.5
-
22
-
-
20344365025
-
Prioritized overlay multicast in mobile ad hoc environments
-
Feb.
-
L. Xiao, L. Ni, and A. Esfahanian. Prioritized Overlay Multicast in Mobile Ad Hoc Environments. IEEE Computer, Feb. 2004.
-
(2004)
IEEE Computer
-
-
Xiao, L.1
Ni, L.2
Esfahanian, A.3
-
23
-
-
8344245288
-
On supporting cooperative cache in ad hoc networks
-
L. Yin and G. Cao. On Supporting Cooperative Cache in Ad Hoc networks. IEEE INFOCOM'04, 2004.
-
(2004)
IEEE INFOCOM'04
-
-
Yin, L.1
Cao, G.2
-
24
-
-
25844473466
-
Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration based approach
-
W. Zhang and G. Cao. Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration Based Approach. IEEE INFOCOM'05, 2005.
-
(2005)
IEEE INFOCOM'05
-
-
Zhang, W.1
Cao, G.2
-
25
-
-
0034546898
-
Intrusion detection in wireless adHoc networks
-
Aug.
-
Y. Zhang and W. Lee. Intrusion Detection in Wireless AdHoc Networks. ACM Mobicom, pages 275-283, Aug. 2000.
-
(2000)
ACM Mobicom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
26
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, November/December 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
|