-
1
-
-
13844296355
-
Wireless Mesh Networks: A Survey
-
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Computer Networks, vol. 47, no. 4, pp. 445-487, 2005.
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
2
-
-
34748889998
-
-
TU-Darmstadt, Germany, Tech. Rep. 08
-
P. S. Mogre, M. Hollick, and R. Steinmetz, "The IEEE 802.16-2004 MeSH Mode Explained," TU-Darmstadt, Germany, ftp://ftp.kom.tu-darmstadt.de/ pub/TR/KOM-TR-2006-08.pdf, Tech. Rep. 08, 2006.
-
(2006)
The IEEE 802.16-2004 MeSH Mode Explained
-
-
Mogre, P.S.1
Hollick, M.2
Steinmetz, R.3
-
3
-
-
47249159712
-
-
IEEE Computer Society and IEEE Microwave Theory and Techniques Society, 802.16 IEEE Standard for Local and metropolitan area networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std. 802.16-2004, October 2004.
-
IEEE Computer Society and IEEE Microwave Theory and Techniques Society, "802.16 IEEE Standard for Local and metropolitan area networks, Part 16: Air Interface for Fixed Broadband Wireless Access Systems," IEEE Std. 802.16-2004, October 2004.
-
-
-
-
4
-
-
11244327295
-
-
Addison-Wesley, ch. 5, pp
-
D. Johnson, D. Maltz, and J. Broch, DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Addison-Wesley, 2001, ch. 5, pp. 139-172.
-
(2001)
DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
, pp. 139-172
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
6
-
-
84892591410
-
A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks
-
D. Djenouri, L. Khelladi, and A. N. Badache, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," Communications Surveys & Tutorials, IEEE, vol. 7, no. 4, pp. 2-28, 2005.
-
(2005)
Communications Surveys & Tutorials, IEEE
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
7
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in MobiCom 2000, 2000, pp. 255-265.
-
(2000)
MobiCom 2000
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
8
-
-
84954161437
-
Enforcing Service Availability in Mobile Ad Hoc WANs
-
Boston, MA, USA
-
L. Buttyan and J.-P. Hubaux, "Enforcing Service Availability in Mobile Ad Hoc WANs," in ACM MobiHoc, Boston, MA, USA, 2000.
-
(2000)
ACM MobiHoc
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
9
-
-
8344242588
-
-
Department of Computer Science, Yale University, Tech. Rep. Yale/DCS/TR1235
-
S. Zhong, Y. Yang, and J. Chen, "Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad Hoc Networks," Department of Computer Science, Yale University, Tech. Rep. Yale/DCS/TR1235, 2002.
-
(2002)
Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad Hoc Networks
-
-
Zhong, S.1
Yang, Y.2
Chen, J.3
-
10
-
-
11844300974
-
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
-
September
-
F. Kargl, S. Schlott, A. Klenk, A. Geiss, and M. Weber, "Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks," Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), September 2004.
-
(2004)
Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS
-
-
Kargl, F.1
Schlott, S.2
Klenk, A.3
Geiss, A.4
Weber, M.5
-
11
-
-
33750012091
-
Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks
-
Springer
-
D. Djenouri and N. Badache, "Cross-Layer Approach to Detect Data Packet Droppers in Mobile Ad-Hoc Networks," in IWSOS 2006, vol. 4124. Springer, 2006, pp. 163-176.
-
(2006)
IWSOS 2006
, vol.4124
, pp. 163-176
-
-
Djenouri, D.1
Badache, N.2
-
13
-
-
0000873984
-
Antnet: Distributed Stigmergetic Control for Communications Networks
-
G. Di Caro and M. Dorigo, "Antnet: Distributed Stigmergetic Control for Communications Networks," Journal of Artificial Intelligence Research, vol. 9, pp. 317-365, 1998.
-
(1998)
Journal of Artificial Intelligence Research
, vol.9
, pp. 317-365
-
-
Di Caro, G.1
Dorigo, M.2
-
14
-
-
5044250232
-
-
University of Virgina, Department of Computer Science, Tech. Rep. CS, Apr
-
W. Zhong and D. Evans, "When Ants Attack: Security Issues for Stigmergic Systems," University of Virgina, Department of Computer Science, Tech. Rep. CS-2002-23, Apr. 2002.
-
(2002)
When Ants Attack: Security Issues for Stigmergic Systems
, pp. 2002
-
-
Zhong, W.1
Evans, D.2
-
15
-
-
0034819266
-
Improved AntNet Routing
-
B. Baran, "Improved AntNet Routing," SIGCOMM Comput. Commun. Rev., vol. 31, no. 2 supplement, pp. 42-48, 2001.
-
(2001)
SIGCOMM Comput. Commun. Rev
, vol.31
, Issue.2 SUPPL.EMENT
, pp. 42-48
-
-
Baran, B.1
-
16
-
-
35148834491
-
Coping with misbehavior in mobile ad-hoc networks,
-
Ph.D. dissertation, Swiss Federal Institute of Technology EPFL, April
-
S. Buchegger, "Coping with misbehavior in mobile ad-hoc networks," Ph.D. dissertation, Swiss Federal Institute of Technology (EPFL), April 2004.
-
(2004)
-
-
Buchegger, S.1
-
18
-
-
39349106463
-
A Security Framework for Organic Mesh Networks,
-
Master's thesis, TU-Darmstadt, May
-
K. Graffi, "A Security Framework for Organic Mesh Networks," Master's thesis, TU-Darmstadt, May 2006.
-
(2006)
-
-
Graffi, K.1
|