-
1
-
-
34548323656
-
-
DARPA
-
DARPA, http://www.darpa.mil/ato/programs/WolfPack/index.htm.
-
-
-
-
4
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX Security Symposium, 2003.
-
(2003)
Proc. USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
5
-
-
34548311320
-
Intelligent jamming in wireless networks with applications to 802.11b and other networks
-
D. J. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applications to 802.11b and other networks," in Proc. MILCOM, 2006.
-
(2006)
Proc. MILCOM
-
-
Thuente, D.J.1
Acharya, M.2
-
6
-
-
0036793924
-
Denial of service in sensor networks
-
October
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, October 2002.
-
(2002)
IEEE Computer
-
-
Wood, A.D.1
Stankovic, J.A.2
-
8
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. MOBICOM, 2002.
-
(2002)
Proc. MOBICOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
10
-
-
34548323655
-
Using signal processing to analyze wireless data traffic
-
C. Partridge, D. Cousins, A. W. Jackson, R. Krishnan, T. Saxena, and W T. Strayer, "Using signal processing to analyze wireless data traffic," in Proc. MOBICOM, 2002.
-
(2002)
Proc. MOBICOM
-
-
Partridge, C.1
Cousins, D.2
Jackson, A.W.3
Krishnan, R.4
Saxena, T.5
Strayer, W.T.6
-
12
-
-
23044437152
-
Combinatorial exchange mechanisms for efficient bandwidth allocation
-
R. Jain and P. Varaiya, "Combinatorial exchange mechanisms for efficient bandwidth allocation," Communications in Information and Systems, vol. 3, 2004.
-
(2004)
Communications in Information and Systems
, vol.3
-
-
Jain, R.1
Varaiya, P.2
-
13
-
-
0042474409
-
Stability of multipacket slotted aloha with selfish user users and perfect information
-
A. B. MacKenzie and S. B. Wicker, "Stability of multipacket slotted aloha with selfish user users and perfect information," in Proc. INFOCOM, 2003.
-
(2003)
Proc. INFOCOM
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
14
-
-
34548318474
-
A framework for simultaneous evaluation of multiple vehicular ad hoc network protocols
-
W Qian, G. Noubir, X. Liu, and P. Ramachandra, "A framework for simultaneous evaluation of multiple vehicular ad hoc network protocols," in Proc. V2VCOM, 2005.
-
(2005)
Proc. V2VCOM
-
-
Qian, W.1
Noubir, G.2
Liu, X.3
Ramachandra, P.4
-
15
-
-
2342576134
-
Medium access control (mac) and physical specifications,
-
IEEE
-
IEEE, "Medium access control (mac) and physical specifications, " IEEE P802.11/D10, 1999.
-
(1999)
IEEE P802.11/D10
-
-
-
16
-
-
34548365104
-
-
Scalable Network Technologies
-
Scalable Network Technologies, http://www.scalable-networks.com.
-
-
-
-
19
-
-
33748701543
-
Settling the complexity of 2-player nash-equilibrium
-
X. Chen and X. Deng, "Settling the complexity of 2-player nash-equilibrium," in Proc. ECCC, 2005.
-
(2005)
Proc. ECCC
-
-
Chen, X.1
Deng, X.2
-
20
-
-
0242624716
-
-
A. M. Richard J. Lipton, Evangelos Markakis, Playing large games using simple strategies, in Proc. ACM-EC, 2003.
-
A. M. Richard J. Lipton, Evangelos Markakis, "Playing large games using simple strategies," in Proc. ACM-EC, 2003.
-
-
-
-
21
-
-
0031650895
-
Adaptive frame length control for improving wireless link throughput, range, and energy efficiency
-
P. Lettieri and M. B. Srivastava, "Adaptive frame length control for improving wireless link throughput, range, and energy efficiency," in Proc. INFOCOM, 1998.
-
(1998)
Proc. INFOCOM
-
-
Lettieri, P.1
Srivastava, M.B.2
|