-
1
-
-
36949027308
-
Trading structure for randomness in wireless opportunistic routing
-
S. Chachulski, M. Jennings, S. Katti, and D. Katabi, "Trading structure for randomness in wireless opportunistic routing," in Proc. of ACM SIGCOMM '07, 2007.
-
(2007)
Proc. of ACM SIGCOMM '07
-
-
Chachulski, S.1
Jennings, M.2
Katti, S.3
Katabi, D.4
-
2
-
-
51849087177
-
Optimized multipath network coding in lossy wireless networks
-
X. Zhang and B. Li, "Optimized multipath network coding in lossy wireless networks," in Proc. of ICDCS '08, 2008.
-
(2008)
Proc. of ICDCS '08
-
-
Zhang, X.1
Li, B.2
-
3
-
-
70449475675
-
DICE: A game theoretic framework for wireless multipath network coding
-
X. Zhang and B. Li, "DICE: a game theoretic framework for wireless multipath network coding," in Proc. of Mobihoc 2008.
-
Proc. of Mobihoc 2008
-
-
Zhang, X.1
Li, B.2
-
4
-
-
34548342249
-
Xors in the air: Practical wireless network coding
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, and J. Crowcroft, "Xors in the air: practical wireless network coding," in Proc. of ACM SIGCOMM '06, 2006.
-
(2006)
Proc. of ACM SIGCOMM '06
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Médard, M.5
Crowcroft, J.6
-
5
-
-
51849139830
-
DCAR: Distributed coding-aware routing in wireless networks
-
J. Le, J. C. S. Lui, and D. M. Chiu, "DCAR: Distributed coding-aware routing in wireless networks," in Proc. of ICDCS '08, 2008.
-
(2008)
Proc. of ICDCS '08
-
-
Le, J.1
Lui, J.C.S.2
Chiu, D.M.3
-
6
-
-
58049221136
-
Context-based routing: Technique, applications, and experience
-
S. Das, Y. Wu, R. Chandra, and Y. C. Hu, "Context-based routing: Technique, applications, and experience," in Proc. of NSDI '08.
-
Proc. of NSDI '08
-
-
Das, S.1
Wu, Y.2
Chandra, R.3
Hu, Y.C.4
-
9
-
-
70349664122
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signature-based scheme for securing network coding against pollution attacks," in Proceedings of INFOCOM 08, 2008.
-
(2008)
Proceedings of INFOCOM 08
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
12
-
-
5044242517
-
Byzantine modification detection in multicast networks using randomized network coding
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. of ISIT '04.
-
Proc. of ISIT '04
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
13
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient network coding in the presence of byzantine adversaries," in Proc. of INFOCOM '07, 2007.
-
(2007)
Proc. of INFOCOM '07
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
14
-
-
37749034553
-
Practical network coding in wireless networks
-
Q. Dong, J. Wu, W. Hu, and J. Crowcroft, "Practical network coding in wireless networks," in Proc. of MobiCom '07, 2007.
-
(2007)
Proc. of MobiCom '07
-
-
Dong, Q.1
Wu, J.2
Hu, W.3
Crowcroft, J.4
-
15
-
-
58049221132
-
On the pitfalls of using high-throughput multicast metrics in adversarial wireless mesh networks
-
June
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "On the pitfalls of using high-throughput multicast metrics in adversarial wireless mesh networks," in Proc. of SECON '08, June 2008.
-
(2008)
Proc. of SECON '08
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
16
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
17
-
-
46149096001
-
Truelink: A practical countermeasure to the wormhole attack in wireless networks
-
J. Eriksson, S. Krishnamurthy, and M. Faloutsos, "Truelink: A practical countermeasure to the wormhole attack in wireless networks," in Proc. of ICNP '06, 2006.
-
(2006)
Proc. of ICNP '06
-
-
Eriksson, J.1
Krishnamurthy, S.2
Faloutsos, M.3
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of MOBICOM, August 2000.
-
(2000)
Proc. of MOBICOM
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
19
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol. 11, no. 1-2, pp. 21-38, 2005.
-
(2005)
Wirel. Netw
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
21
-
-
58049194143
-
-
MIT roofnet, publications and trace data
-
"MIT roofnet - publications and trace data." http://pdos.csail.mit.edu/roofnet/doku.php?id=publications.
-
-
-
-
22
-
-
56749155062
-
Multipath code casting for wireless mesh networks
-
C. Gkantsidis, W. Hu, P. Key, B. Radunovic, P. Rodriguez, and S. Gheorghiu, "Multipath code casting for wireless mesh networks," in CoNEXT '07, 2007.
-
(2007)
CoNEXT '07
-
-
Gkantsidis, C.1
Hu, W.2
Key, P.3
Radunovic, B.4
Rodriguez, P.5
Gheorghiu, S.6
|