-
1
-
-
85104896255
-
-
The network simulator ns-2
-
The network simulator - ns-2. http://www.isi.edu/nsnam/ns/.
-
-
-
-
2
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
Philadelphia, PA, Sep
-
I. Aad, J. Hubaux, and E. Knightly. Denial of service resilience in ad hoc networks. In Proceedings of ACM MOBICOM, Philadelphia, PA, Sep. 2004.
-
(2004)
Proceedings of ACM MOBICOM
-
-
Aad, I.1
Hubaux, J.2
Knightly, E.3
-
3
-
-
32144437968
-
Enhancements for clustering stability in mobile ad hoc networks
-
Montreal, Quebec, Canada, Oct
-
Mohammed S. Al-kahtani and Hussein T. Mouftah. Enhancements for clustering stability in mobile ad hoc networks. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pages 112–121, Montreal, Quebec, Canada, Oct. 2005.
-
(2005)
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
, pp. 112-121
-
-
Al-kahtani, Mohammed S.1
Mouftah, Hussein T.2
-
4
-
-
18144374310
-
Adaptive routing in wireless communication networks using swarm intelligence
-
pages Toulouse, France, Apr
-
P. Arabshahi, A. Gray, I. Kassabalidis, A. Das, S. Narayanan, M. El-Sharkawi, and R. Marks II. Adaptive routing in wireless communication networks using swarm intelligence. In Proceedings of the 9th AIAA Int. Communications Satellite Systems Conf., pages 17–20, Toulouse, France, Apr. 2001.
-
(2001)
Proceedings of the 9th AIAA Int. Communications Satellite Systems Conf
, pp. 17-20
-
-
Arabshahi, P.1
Gray, A.2
Kassabalidis, I.3
Das, A.4
Narayanan, S.5
El-Sharkawi, M.6
Marks, R.7
-
5
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
Atlanta, GA, Sep
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An on-demand secure routing protocol resilient to byzantine failures. In Proceedings of the ACM Workshop on Wireless Security (WiSe), Atlanta, GA, Sep. 2002.
-
(2002)
Proceedings of the ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
7
-
-
33745183661
-
Data security in ad hoc networks using multipath routing
-
Beijing, China, Sep
-
S. Bouam and J. Othman. Data security in ad hoc networks using multipath routing. In Proceedings of 14th IEEE PIMRC, Beijing, China, Sep. 2003.
-
(2003)
Proceedings of 14th IEEE PIMRC
-
-
Bouam, S.1
Othman, J.2
-
8
-
-
3042547159
-
Secure multipath communication in mobile ad hoc networks
-
Las Vegas, NV, Apr
-
M. Burmester and T. Le. Secure multipath communication in mobile ad hoc networks. In Proceedings of IEEE ITCC, Las Vegas, NV, Apr. 2004.
-
(2004)
Proceedings of IEEE ITCC
-
-
Burmester, M.1
Le, T.2
-
9
-
-
84959869447
-
Investigating performance of power-aware routing protocols for mobile ad hoc networks
-
Forworth, Texas, USA, Oct
-
J. Cano and D. Kim. Investigating performance of power-aware routing protocols for mobile ad hoc networks. In Proc. of the International Mobility and Wireless Access Workshop, pages 80–86, Forworth, Texas, USA, Oct 2002.
-
(2002)
Proc. of the International Mobility and Wireless Access Workshop
, pp. 80-86
-
-
Cano, J.1
Kim, D.2
-
11
-
-
26844541249
-
AntHocNet: An adaptive nature-inspired algorithm for routing in mobile ad hoc networks
-
G. D. Caro, F. Ducatelle, and L. M. Gambardella. AntHocNet: An adaptive nature-inspired algorithm for routing in mobile ad hoc networks. European Transactions on Telecommunications, Special Issue on Self-organization in Mobile Networking, 16:443–455, 2005.
-
(2005)
European Transactions on Telecommunications, Special Issue on Self-organization in Mobile Networking
, vol.16
, pp. 443-455
-
-
Caro, G. D.1
Ducatelle, F.2
Gambardella, L. M.3
-
12
-
-
0033885342
-
Energy conserving routing in wireless ad-hoc networks
-
Tel-Aviv, Israel, Mar
-
J.-H. Chang and L. Tassiulas. Energy conserving routing in wireless ad-hoc networks. In Proceedings of IEEE INFOCOM, Tel-Aviv, Israel, Mar 2000.
-
(2000)
Proceedings of IEEE INFOCOM
-
-
Chang, J.-H.1
Tassiulas, L.2
-
13
-
-
0031618385
-
On finding multi-constrained paths
-
Atlanta, GA, USA, Jun
-
S. Chen and K. Nahrstedt. On finding multi-constrained paths. In Proceedings of IEEE ICC’98, pages 874–879, Atlanta, GA, USA, Jun 1998.
-
(1998)
Proceedings of IEEE ICC’98
, pp. 874-879
-
-
Chen, S.1
Nahrstedt, K.2
-
15
-
-
0347709584
-
An on-demand minimum energy routing protocol for a wireless ad hoc network
-
S. Doshi, S. Bhandare, and T. Brown. An on-demand minimum energy routing protocol for a wireless ad hoc network. MC2R, 6(3), 2002.
-
(2002)
MC2R
, vol.6
, Issue.3
-
-
Doshi, S.1
Bhandare, S.2
Brown, T.3
-
16
-
-
84950246952
-
An efficient approximate algorithm for delay-cost-constrained QoS routing
-
Phoenix, AZ, USA, Oct
-
G. Feng, K. Makki, N. Pissinou, and C. Doulgeris. An efficient approximate algorithm for delay-cost-constrained QoS routing. In Proceedings of ICCCN, pages 395–400, Phoenix, AZ, USA, Oct 2001.
-
(2001)
Proceedings of ICCCN
, pp. 395-400
-
-
Feng, G.1
Makki, K.2
Pissinou, N.3
Doulgeris, C.4
-
18
-
-
84954568516
-
ARA - the ant-colony based routing algorithm for MANETs
-
Vancouver, B.C., Canada, Aug
-
M. Gunes, U. Sorges, and I. Bouazizi. ARA - the ant-colony based routing algorithm for MANETs. In Proceedings of ICPPW, Vancouver, B.C., Canada, Aug. 2002.
-
(2002)
Proceedings of ICPPW
-
-
Gunes, M.1
Sorges, U.2
Bouazizi, I.3
-
19
-
-
84961572484
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Y. Hu, D. Johnson, and A. Perrig. Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the IEEE WMCSA, 2002.
-
(2002)
Proceedings of the IEEE WMCSA
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
20
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, Sep
-
Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM MOBICOM, Atlanta, GA, Sep. 2002.
-
(2002)
Proceedings of ACM MOBICOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
21
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM, 2003.
-
(2003)
Proceedings of IEEE INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
22
-
-
3042667172
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of ACM WiSe, 2003.
-
(2003)
Proceedings of ACM WiSe
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
23
-
-
29144475846
-
Probability routing algorithm for mobile ad hoc networks’ resources management
-
Dec
-
O.H. Hussein, T.N. Saadawi, and Myung Jong Lee. Probability routing algorithm for mobile ad hoc networks’ resources management. IEEE JSAC, 23:2248–2259, Dec. 2005.
-
(2005)
IEEE JSAC
, vol.23
, pp. 2248-2259
-
-
Hussein, O.H.1
Saadawi, T.N.2
Lee, Myung Jong3
-
24
-
-
84962094522
-
Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing
-
Urbana, IL, USA, Sep
-
P. Jeon and G. Kesidis. Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing. In Proceedings of the 43rd Annual Allerton Conference on Communication, Control, and Computing, Urbana, IL, USA, Sep. 2005.
-
(2005)
Proceedings of the 43rd Annual Allerton Conference on Communication, Control, and Computing
-
-
Jeon, P.1
Kesidis, G.2
-
25
-
-
31844448026
-
Pheromone aided robust multipath and multipriority routing in wireless MANETs
-
Montreal, Quebec, Canada, Oct
-
P. Jeon and G. Kesidis. Pheromone aided robust multipath and multipriority routing in wireless MANETs. In Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pages 106–113, Montreal, Quebec, Canada, Oct. 2005.
-
(2005)
Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
, pp. 106-113
-
-
Jeon, P.1
Kesidis, G.2
-
26
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski and Korth, editors, pages Kluwer Academic Publishers
-
D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors, Mobile Computing, volume 353, pages 153–181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
27
-
-
15244358870
-
Resisting malicious packet dropping in wireless ad hoc networks
-
Montreal, Canada, Oct
-
M. Just, E. Kranakis, and T. Wan. Resisting malicious packet dropping in wireless ad hoc networks. In Proceedings of ADHOC-NOW, Montreal, Canada, Oct. 2003.
-
(2003)
Proceedings of ADHOC-NOW
-
-
Just, M.1
Kranakis, E.2
Wan, T.3
-
28
-
-
0034266911
-
Location-aided routing (LAR) in mobile ad hoc networks
-
Y. Ko and N. H. Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. Wireless Networks, 6(4):307–321, 2000.
-
(2000)
Wireless Networks
, vol.6
, Issue.4
, pp. 307-321
-
-
Ko, Y.1
Vaidya, N. H.2
-
29
-
-
0038126832
-
Source-oriented topology aggregation with multiple QoS parameters in hierarchical networks
-
T. Korkmaz and M. Krunz. Source-oriented topology aggregation with multiple QoS parameters in hierarchical networks. Modeling and Computer Simulation, 10(4):295–325, 2000.
-
(2000)
Modeling and Computer Simulation
, vol.10
, Issue.4
, pp. 295-325
-
-
Korkmaz, T.1
Krunz, M.2
-
32
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in ad hoc networks
-
pages Jun
-
S. J. Lee and M. Gerla. Split multipath routing with maximally disjoint paths in ad hoc networks. In ICC 2001, volume 10, pages 3201–3205, Jun 2001.
-
(2001)
ICC 2001
, vol.10
, pp. 3201-3205
-
-
Lee, S. J.1
Gerla, M.2
-
33
-
-
33745205586
-
Biologically inspired self-adaptive multi-path routing in overlay networks
-
Mar
-
Kenji Leibnitz, Naoki Wakamiya, and Masayuki Murata. Biologically inspired self-adaptive multi-path routing in overlay networks. Communications of the ACM, 49(3):62–67, Mar. 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.3
, pp. 62-67
-
-
Leibnitz, Kenji1
Wakamiya, Naoki2
Murata, Masayuki3
-
34
-
-
16244390862
-
Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks
-
Oct
-
X. Li and L. Cuthbert. Stable node-disjoint multipath routing with low overhead in mobile ad hoc networks. In Proceedings of IEEE MASCOTS, Oct. 2004.
-
(2004)
Proceedings of IEEE MASCOTS
-
-
Li, X.1
Cuthbert, L.2
-
35
-
-
0035703920
-
On-demand multipath distance vector routing in ad hoc networks
-
Riverside, CA, Nov
-
M. Marina and S. Das. On-demand multipath distance vector routing in ad hoc networks. In Proceedings of the IEEE ICNP, Riverside, CA, Nov. 2001.
-
(2001)
Proceedings of the IEEE ICNP
-
-
Marina, M.1
Das, S.2
-
36
-
-
0035509489
-
A survey on position-based routing in mobile ad hoc networks
-
Nov
-
M. Mauve, J. Widmer, and H. Hartenstein. A survey on position-based routing in mobile ad hoc networks. IEEE Network Magazine, 15(6):30–39, Nov 2001.
-
(2001)
IEEE Network Magazine
, vol.15
, Issue.6
, pp. 30-39
-
-
Mauve, M.1
Widmer, J.2
Hartenstein, H.3
-
37
-
-
12244282095
-
Detecting packet mishandling in manets
-
Las Vegas, NV, Jun
-
S. Medidi, M. Medidi, S. Gavini, and R. Griswold. Detecting packet mishandling in manets. In Proceedings of SAM, Las Vegas, NV, Jun. 2004.
-
(2004)
Proceedings of SAM
-
-
Medidi, S.1
Medidi, M.2
Gavini, S.3
Griswold, R.4
-
41
-
-
1542287664
-
Secure data transmission in mobile ad hoc networks
-
San Diego, CA, Sep
-
P. Papadimitratos and Z. Haas. Secure data transmission in mobile ad hoc networks. In Proceedings of WiSe, San Diego, CA, Sep. 2003.
-
(2003)
Proceedings of WiSe
-
-
Papadimitratos, P.1
Haas, Z.2
-
42
-
-
0031353437
-
A highly adaptive distributed routing algorithm for mobile wireless networks
-
Kobe, Japan, April
-
V. Park and M. Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of IEEE INFOCOM, Kobe, Japan, April 1997.
-
(1997)
Proceedings of IEEE INFOCOM
-
-
Park, V.1
Corson, M.2
-
44
-
-
0842331554
-
Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
-
Dec
-
R. Rao and G. Kesidis. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. In Proceedings of Globecom, Dec. 2003.
-
(2003)
Proceedings of Globecom
-
-
Rao, R.1
Kesidis, G.2
-
46
-
-
0036983413
-
Energy-aware routing in manets: Analysis and enhancements
-
Atlanta, GA, USA, Sep
-
A. Safwat, H. Hassanein, and H. Mouftah. Energy-aware routing in manets: Analysis and enhancements. In Proceedings of MSWiM, Atlanta, GA, USA, Sep 2002.
-
(2002)
Proceedings of MSWiM
-
-
Safwat, A.1
Hassanein, H.2
Mouftah, H.3
-
48
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
Paris, France, Nov
-
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Royer. A secure routing protocol for ad hoc networks. In Proceedings of IEEE ICNP, Paris, France, Nov. 2002.
-
(2002)
Proceedings of IEEE ICNP
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Royer, E.5
-
49
-
-
17444389301
-
Ad hoc multicast routing algorithm with swarm intelligence
-
Feb
-
Chien-Chung Shen and Chaiporn Jaikaeo. Ad hoc multicast routing algorithm with swarm intelligence. Mobile Networks and Applications, 10(1-2):47–59, Feb. 2005.
-
(2005)
Mobile Networks and Applications
, vol.10
, Issue.1-2
, pp. 47-59
-
-
Shen, Chien-Chung1
Jaikaeo, Chaiporn2
-
50
-
-
0003264517
-
Pamas: Power aware multi-access protocol with signaling for ad hoc networks
-
Jul
-
S. Singh and C. Raghavendra. Pamas: Power aware multi-access protocol with signaling for ad hoc networks. ACM SIGCOMM Computer Communication Review, 26(3):5–25, Jul 1998.
-
(1998)
ACM SIGCOMM Computer Communication Review
, vol.26
, Issue.3
, pp. 5-25
-
-
Singh, S.1
Raghavendra, C.2
-
51
-
-
0001887844
-
Hash-based IP traceback
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent, and W.T. Strayer. Hash-based IP traceback. In Proc. ACM SIGCOMM, 2001.
-
(2001)
Proc. ACM SIGCOMM
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
52
-
-
0036947597
-
Single-packet ip traceback
-
Dec
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent, and W.T. Strayer. Single-packet ip traceback. IEEE Trans. Networking, Dec. 2002.
-
(2002)
IEEE Trans. Networking
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
53
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In Proceedings of IEEE INFOCOM, 2001.
-
(2001)
Proceedings of IEEE INFOCOM
-
-
Song, D.1
Perrig, A.2
-
54
-
-
1542269184
-
Minimum energy disjoint path routing in wireless ad-hoc networks
-
San Diego, CA, USA, Sep
-
A. Srinivas and E. Modiano. Minimum energy disjoint path routing in wireless ad-hoc networks. In Proceedings of MOBICOM, San Diego, CA, USA, Sep 2003.
-
(2003)
Proceedings of MOBICOM
-
-
Srinivas, A.1
Modiano, E.2
-
55
-
-
0038322587
-
Internet indirection infrastructure
-
Aug
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. In Proceedings of SIGCOMM, Aug. 2002.
-
(2002)
Proceedings of SIGCOMM
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
56
-
-
84880653464
-
Ants and reinforcement learning: A case study in routing in dynamic networks
-
Aug
-
D. Subramanian, P.Druschel, and J. Chen. Ants and reinforcement learning: A case study in routing in dynamic networks. In Proceedings of IJCAI, Aug. 1997.
-
(1997)
Proceedings of IJCAI
-
-
Subramanian, D.1
Druschel, P.2
Chen, J.3
-
57
-
-
0036498659
-
The broadcast storm problem in a mobile ad hoc network
-
Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu. The broadcast storm problem in a mobile ad hoc network. Wireless Networks, 8:153–167, 2002.
-
(2002)
Wireless Networks
, vol.8
, pp. 153-167
-
-
Tseng, Y.-C.1
Ni, S.-Y.2
Chen, Y.-S.3
Sheu, J.-P.4
-
58
-
-
32444432940
-
Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
-
Washington DC, USA, June
-
Horst F. Wedde, Muddassar Farooq, Thorsten Pannenbaecker, Bjoern Vogel, Christian Mueller, Johannes Meth, and Rene Jeruschkat. Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In GECCO’05: Proceedings of the 2005 conference on Genetic and evolutionary computation, pages 153–160, Washington DC, USA, June 2005.
-
(2005)
GECCO’05: Proceedings of the 2005 conference on Genetic and evolutionary computation
, pp. 153-160
-
-
Wedde, Horst F.1
Farooq, Muddassar2
Pannenbaecker, Thorsten3
Vogel, Bjoern4
Mueller, Christian5
Meth, Johannes6
Jeruschkat, Rene7
-
59
-
-
0042032991
-
Comparison of broadcasting techniques for mobile ad hoc networks
-
New York, NY, USA, June
-
B. Williams and T. Camp. Comparison of broadcasting techniques for mobile ad hoc networks. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, pages 194–205, New York, NY, USA, June 2002.
-
(2002)
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
, pp. 194-205
-
-
Williams, B.1
Camp, T.2
-
61
-
-
0034822355
-
Performance study of a multipath routing method for wireless mobile ad hoc networks
-
Washington, DC, USA, Aug
-
K. Wu and J. Harms. Performance study of a multipath routing method for wireless mobile ad hoc networks. In Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS’01), pages 99–107, Washington, DC, USA, Aug. 2001.
-
(2001)
Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS’01)
, pp. 99-107
-
-
Wu, K.1
Harms, J.2
-
63
-
-
0036343658
-
An energy-efficient mac protocol for wireless sensor networks
-
New York, NY, USA, Jun
-
W. Ye, J. Heidemann, and D. Estrin. An energy-efficient mac protocol for wireless sensor networks. In Proceedings of IEEE INFOCOM, New York, NY, USA, Jun 2002.
-
(2002)
Proceedings of IEEE INFOCOM
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
-
64
-
-
0042475197
-
A framework for reliable routing in mobile ad hoc networks
-
San Francisco, CA, Mar
-
Z. Ye, S. Krishnamurthy, and S. Tripathi. A framework for reliable routing in mobile ad hoc networks. In Proceedings of IEEE INFOCOM, San Francisco, CA, Mar. 2003.
-
(2003)
Proceedings of IEEE INFOCOM
-
-
Ye, Z.1
Krishnamurthy, S.2
Tripathi, S.3
-
65
-
-
33646903243
-
Ant routing algorithm for mobile ad-hoc networks based on adaptive improvement
-
pages Wuhan, China, Sept
-
Yuan yuan Zeng and Yan xiang He. Ant routing algorithm for mobile ad-hoc networks based on adaptive improvement. In Proceedings of IEEE WCNM, volume 2, pages 678–681, Wuhan, China, Sept. 2005.
-
(2005)
Proceedings of IEEE WCNM
, vol.2
, pp. 678-681
-
-
Zeng, Yuan yuan1
He, Yan xiang2
-
66
-
-
32244445050
-
A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks
-
Montreal, Quebec, Canada, Oct
-
Saida Ziane and Abdelhamid Melouk. A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks. In Q2SWinet ’05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pages 55–62, Montreal, Quebec, Canada, Oct. 2005.
-
(2005)
Q2SWinet ’05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
, pp. 55-62
-
-
Ziane, Saida1
Melouk, Abdelhamid2
|