-
2
-
-
84874964588
-
-
NYCwireless. http:/www.nycwireless.net
-
NYCwireless
-
-
-
3
-
-
39049108303
-
-
Consume, http://www.consume.net
-
Consume
-
-
-
5
-
-
39049122193
-
-
Motorola CN620. http://www.motorola.com/wlan/solution_cn620.html
-
Motorola CN620
-
-
-
6
-
-
39049152473
-
-
Nokia 9500. http://www.nokia.com/nokia/0.,54106,00.html
-
Nokia 9500. http://www.nokia.com/nokia/0.,54106,00.html
-
-
-
-
7
-
-
39049156878
-
-
Electronic Frontier Foundation EFF
-
Electronic Frontier Foundation (EFF) Wireless friendly ISP list. http://www.eff.org/Infrastructure/Wireless_cellular_radio/ wireless_friendly_isp_list.html
-
Wireless friendly ISP list
-
-
-
9
-
-
26844521290
-
-
E. C. Efstathiou and G. C. Polyzos, Self-organized peering of wireless LAN hotspots, European Transactions on Telecommunications, 16, no. 5 (special issue on Self-Organization in Mobile Networking), 2005.
-
E. C. Efstathiou and G. C. Polyzos, "Self-organized peering of wireless LAN hotspots," European Transactions on Telecommunications, vol. 16, no. 5 (special issue on Self-Organization in Mobile Networking), 2005.
-
-
-
-
12
-
-
9644289531
-
Indirect reciprocity can stabilize cooperation without the second-order free rider problem
-
K. Panchanathan and R. Boyd, "Indirect reciprocity can stabilize cooperation without the second-order free rider problem," Nature, vol. 432, pp. 499-502, 2004.
-
(2004)
Nature
, vol.432
, pp. 499-502
-
-
Panchanathan, K.1
Boyd, R.2
-
13
-
-
80051768284
-
Sustaining cooperation in multi-hop wireless networks
-
Boston, MA, May 2-4
-
nd USENIX Symposium on Networked System Design and Implementation (NSDI '05), Boston, MA, May 2-4, 2005.
-
(2005)
nd USENIX Symposium on Networked System Design and Implementation (NSDI '05)
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
15
-
-
39049098167
-
-
th Joint Working Conference on Communications and Multimedia Security, Portoroz, Slovenia, 2002.
-
th Joint Working Conference on Communications and Multimedia Security, Portoroz, Slovenia, 2002.
-
-
-
-
16
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
San Francisco, CA, March 30-April 3
-
S. Zhong, J. Chen, and Y. R. Yang, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks," In Proc. IEEE INFOCOM, San Francisco, CA, March 30-April 3, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
17
-
-
32144433522
-
On designing incentivecompatible routing and forwarding protocols in wireless ad-hoc networks
-
Cologne, Germany, August 28-September 2, in press
-
S. Zhong, L. Li, Y. Liu, and Y. R. Yang, "On designing incentivecompatible routing and forwarding protocols in wireless ad-hoc networks," In Proc. ACM MOBICOM, Cologne, Germany, August 28-September 2, 2005, in press.
-
(2005)
Proc. ACM MOBICOM
-
-
Zhong, S.1
Li, L.2
Liu, Y.3
Yang, Y.R.4
-
18
-
-
0042660545
-
Stimulating cooperation in selforganizing mobile ad hoc networks
-
L. Buttyán and J.-P. Hubaux, "Stimulating cooperation in selforganizing mobile ad hoc networks," ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003.
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
20
-
-
3242802867
-
Robust incentive techniques for peer-to-peer networks
-
New York, NY, May 17-20
-
M. Feldman, K. Lai, I. Stoica, and J. Chuang, "Robust incentive techniques for peer-to-peer networks," In Proc. ACM Conference on Electronic Commerce (EC'04), New York, NY, May 17-20, 2004.
-
(2004)
Proc. ACM Conference on Electronic Commerce (EC'04)
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
22
-
-
13244288768
-
Authentication metric analysis and design
-
M. K. Reiter and S. G. Stubblebine, "Authentication metric analysis and design," ACM Transactions on Information and System Security, vol. 2, no. 2, pp. 138-158, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 138-158
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
23
-
-
33749055553
-
The evolution of cooperation under cheap pseudonyms
-
München, Germany, July 19-22, in press
-
th IEEE Conference on E-Commerce Technology (CEC), München, Germany, July 19-22, 2005, in press.
-
(2005)
th IEEE Conference on E-Commerce Technology (CEC)
-
-
Feldman, M.1
Chuang, J.2
-
24
-
-
0004161458
-
-
Penguin Books, London, First published by Basic Books, New York
-
R. Axelrod, "The evolution of co-operation," Penguin Books, London, 1990. (First published by Basic Books, New York, 1984.)
-
(1984)
The evolution of co-operation
-
-
Axelrod, R.1
-
25
-
-
0032507958
-
Evolution of indirect reciprocity by image scoring
-
M. A. Nowak and K. Sigmund, "Evolution of indirect reciprocity by image scoring," Nature, vol. 393, pp. 573-577, 1998.
-
(1998)
Nature
, vol.393
, pp. 573-577
-
-
Nowak, M.A.1
Sigmund, K.2
-
30
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
S. Čapkun, L. Buttyán, and J.-P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, 2003.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
-
-
Čapkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
31
-
-
0043016341
-
Cooperative peer groups in NICE
-
San Francisco, CA, March 30-April 3
-
S. Lee, R. Sherwood, and B. Bhattacharjee, "Cooperative peer groups in NICE," In Proc. IEEE INFOCOM, San Francisco, CA, March 30-April 3,2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Lee, S.1
Sherwood, R.2
Bhattacharjee, B.3
-
34
-
-
34547280925
-
Reputation-based wi-fi deployment
-
July, in press
-
N. Ben Salem, J.-P. Hubaux, and M. Jakobsson, "Reputation-based wi-fi deployment," Mobile Computing and Communications Review (MC2R), July 2005, in press.
-
(2005)
Mobile Computing and Communications Review (MC2R)
-
-
Ben Salem, N.1
Hubaux, J.-P.2
Jakobsson, M.3
-
35
-
-
11244351729
-
Rethinking incentives for mobile ad hoc networks
-
Portland, OR, August 30-September 3
-
E. Huang, J. Crowcroft, and I. Wassel, "Rethinking incentives for mobile ad hoc networks," In Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS), Portland, OR, August 30-September 3, 2004.
-
(2004)
Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS)
-
-
Huang, E.1
Crowcroft, J.2
Wassel, I.3
-
36
-
-
11244287362
-
Experiences applying game theory to system design
-
Portland, OR, August 30-September 3
-
R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Experiences applying game theory to system design," In Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS), Portland, OR, August 30-September 3, 2004.
-
(2004)
Proc. SIGCOMM Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (PINS)
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
38
-
-
33847124720
-
The peer-to-peer wireless network confederation protocol: Design specification and performance analysis,
-
Technical Report 2005-MMLAB-TR-02, Mobile Multimedia Laboratory, Athens University of Economics and Business, June, Available at
-
P. A. Frangoudis, "The peer-to-peer wireless network confederation protocol: design specification and performance analysis," Technical Report 2005-MMLAB-TR-02, Mobile Multimedia Laboratory, Athens University of Economics and Business, June 2005. Available at http://mm.aueb.gr/technicalreports/
-
(2005)
-
-
Frangoudis, P.A.1
-
41
-
-
0024090156
-
A new approach to the maximumflow problem
-
A. V. Goldberg and R. E. Tarjan, "A new approach to the maximumflow problem," Journal of the ACM, vol. 35, no. 4, pp. 921-940, 1988.
-
(1988)
Journal of the ACM
, vol.35
, Issue.4
, pp. 921-940
-
-
Goldberg, A.V.1
Tarjan, R.E.2
-
42
-
-
0000122499
-
On implementing the pushrelabel method for the maximum flow problem
-
B. V. Cherkassky and A. V. Goldberg, "On implementing the pushrelabel method for the maximum flow problem," Algorithmica, vol. 19, no. 4, pp. 390-310, 1997.
-
(1997)
Algorithmica
, vol.19
, Issue.4
, pp. 390-310
-
-
Cherkassky, B.V.1
Goldberg, A.V.2
-
43
-
-
23944524767
-
-
Standards for Efficient Cryptography group, September
-
Standards for Efficient Cryptography group, "SEC1: Elliptic curve cryptography," September 2000. http://www.secg.org
-
(2000)
SEC1: Elliptic curve cryptography
-
-
-
44
-
-
1642319117
-
-
Standards for Efficient Cryprography group, September
-
Standards for Efficient Cryprography group, "SEC2: Recommended elliptic curve domain parameters," September 2000. http://www.secg.org
-
(2000)
SEC2: Recommended elliptic curve domain parameters
-
-
|