-
1
-
-
79960152551
-
Analyzing Interaction Between Network Protocols, Topology and Traffic in Wireless Radio Networks
-
New Orleans
-
C. Barrett, M. Drozda, A. Marathe and M. V. Marathe, "Analyzing Interaction Between Network Protocols, Topology and Traffic in Wireless Radio Networks", In Proc. IEEE Wireless Communications and Networking Conference (WCNC '03),Vol. 3, pp. 1760-1766, New Orleans, 2003.
-
(2003)
Proc. IEEE Wireless Communications and Networking Conference (WCNC '03)
, vol.3
, pp. 1760-1766
-
-
Barrett, C.1
Drozda, M.2
Marathe, A.3
Marathe, M.V.4
-
2
-
-
0023670186
-
Conditional limit theorems under Markov conditioning
-
p.p, Nov
-
I. Csiszar, T. Cover and B-S. Choi, "Conditional limit theorems under Markov conditioning", IEEE Trans. on Information Theory, vol. 33, No. 6, p.p. 788-801, Nov. 1987.
-
(1987)
IEEE Trans. on Information Theory
, vol.33
, Issue.6
, pp. 788-801
-
-
Csiszar, I.1
Cover, T.2
Choi, B.-S.3
-
3
-
-
34547459925
-
-
IEEE, IEEE Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
-
IEEE, IEEE Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999.
-
-
-
-
4
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
p.p
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks", Mobile Computing, p.p. 153-181, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
5
-
-
16244383830
-
A cautionary perspective on cross-layer design
-
p.p, February
-
V. Kawadia and P. R. Kumar,"A cautionary perspective on cross-layer design", IEEE Wireless Communications, Vol. 12, No. 1, p.p. 3-11, February 2005.
-
(2005)
IEEE Wireless Communications
, vol.12
, Issue.1
, pp. 3-11
-
-
Kawadia, V.1
Kumar, P.R.2
-
8
-
-
33749037166
-
A Framework for MAC Protocol Misbehavior Detection in Wireless Networks
-
p.p, Cologne, Germany, September
-
S. Radosavac, J. S. Baras and I. Koutsopoulos,"A Framework for MAC Protocol Misbehavior Detection in Wireless Networks", In Proc. 4th ACM workshop on Wireless security (WiSe), p.p. 33-42, Cologne, Germany, September 2005.
-
(2005)
Proc. 4th ACM workshop on Wireless security (WiSe)
, pp. 33-42
-
-
Radosavac, S.1
Baras, J.S.2
Koutsopoulos, I.3
-
9
-
-
34547435640
-
-
S. Radosavac, G. V. Moustakides, J. S. Baras and I. Koutsopoulos, An analytic framework for modeling and detecting access layer misbehavior in wireless networks, submitted to ACM Transactions on Information and System Security (TISSEC), 2006.
-
S. Radosavac, G. V. Moustakides, J. S. Baras and I. Koutsopoulos, "An analytic framework for modeling and detecting access layer misbehavior in wireless networks", submitted to ACM Transactions on Information and System Security (TISSEC), 2006.
-
-
-
-
10
-
-
0018877134
-
Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy
-
p.p, January
-
J. E. Shore and R. W. Johnson, "Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy", IEEE Trans. on Information Theory, Vol. 26, No. 1, p.p. 26-37, January 1980.
-
(1980)
IEEE Trans. on Information Theory
, vol.26
, Issue.1
, pp. 26-37
-
-
Shore, J.E.1
Johnson, R.W.2
-
11
-
-
0019586465
-
Properties of Cross-Entropy Minimization
-
p.p, July
-
J. E. Shore and R. W. Johnson, "Properties of Cross-Entropy Minimization", IEEE Trans. on Information Theory, Vol. 27, No. 4, p.p. 472-482, July 1981.
-
(1981)
IEEE Trans. on Information Theory
, vol.27
, Issue.4
, pp. 472-482
-
-
Shore, J.E.1
Johnson, R.W.2
-
12
-
-
77951119133
-
-
V. Srivastava and M. Motani, Cross-Layer Design: A Survey and the Road Ahead, In IEEE Communications Magazine, 43, p. p. 12-19, December 2005.
-
V. Srivastava and M. Motani, "Cross-Layer Design: A Survey and the Road Ahead", In IEEE Communications Magazine, Vol. 43, p. p. 12-19, December 2005.
-
-
-
-
13
-
-
0041473688
-
-
Y. Zhang, W. Lee and Y.-A. Huang, Intrusion detection techniques for mobile wireless networks, Wireless Networks, 9, No. 5, p. p. 545-556, 2003.
-
Y. Zhang, W. Lee and Y.-A. Huang, "Intrusion detection techniques for mobile wireless networks", Wireless Networks, Vol. 9, No. 5, p. p. 545-556, 2003.
-
-
-
|