-
1
-
-
60349098753
-
Agent trust evaluation and team formation in heterogeneous organizations
-
Barber, K. S., Ahn, J., Budalakoti, S., DeAngelis, D., Fullam, K. K., Jones, C. L. D., and Sui, X. "Agent trust evaluation and team formation in heterogeneous organizations", Proceedings of International Conference on Autonomous agents and multi-agent systems, 2007, pp.1361-1362.
-
(2007)
Proceedings of International Conference on Autonomous agents and multi-agent systems
, pp. 1361-1362
-
-
Barber, K.S.1
Ahn, J.2
Budalakoti, S.3
DeAngelis, D.4
Fullam, K.K.5
Jones, C.L.D.6
Sui, X.7
-
2
-
-
33747371642
-
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
-
Boukerche, A., El-Khatib, K., Xu, L., and Korba, L. "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, Vol. 63, 2006, pp. 1094-1109.
-
(2006)
Performance Evaluation
, vol.63
, pp. 1094-1109
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
4
-
-
36849005932
-
A new fuzzy-based cooperative movement model in support of QoS in wireless ad-hoc network
-
Brahim, G. B., Ala, A.-f., Kountanis, D., and Khan, B. "A new fuzzy-based cooperative movement model in support of QoS in wireless ad-hoc network", Proceedings of International Conference on wireless communications and mobile computing, 2007, pp. 158-163.
-
(2007)
Proceedings of International Conference on wireless communications and mobile computing
, pp. 158-163
-
-
Brahim, G.B.1
Ala, A.-F.2
Kountanis, D.3
Khan, B.4
-
5
-
-
85106319926
-
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. C., and Jetcheva, J. "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols", Proceedings of the ACM/IEEE Annual International Conference on Mobile Computing and Networking, 1998, pp. 85-97.
-
(1998)
Proceedings of the ACM/IEEE Annual International Conference on Mobile Computing and Networking
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.C.4
Jetcheva, J.5
-
6
-
-
33748966621
-
Certain limitations of reputation-based schemes in mobile environments
-
Carruthers, R., and Nikolaidis, I. "Certain limitations of reputation-based schemes in mobile environments", Proceedings of the 8th ACM international symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2005, pp. 2-11.
-
(2005)
Proceedings of the 8th ACM international symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
, pp. 2-11
-
-
Carruthers, R.1
Nikolaidis, I.2
-
9
-
-
0038349287
-
Why to market IT services and how to do it
-
Grajek, S., Lynch, P., and Cagnetta, L. "Why to market IT services and how to do it", Proceedings of 30th annual ACM SIGUCCS Conference on User services, 2002, pp. 251-253.
-
(2002)
Proceedings of 30th annual ACM SIGUCCS Conference on User services
, pp. 251-253
-
-
Grajek, S.1
Lynch, P.2
Cagnetta, L.3
-
10
-
-
84860388893
-
Trusted secure routing for ad hoc networks
-
Haghpanah, N., Akhoondi, M., Kargar, M., and Movaghar, A. "Trusted secure routing for ad hoc networks", Proceedings of International workshop on mobility management and wireless access, 2007, pp. 176-179.
-
(2007)
Proceedings of International workshop on mobility management and wireless access
, pp. 176-179
-
-
Haghpanah, N.1
Akhoondi, M.2
Kargar, M.3
Movaghar, A.4
-
11
-
-
11844258830
-
Pricing for enabling forwarding in self-configuring ad hoc networks
-
Ileri, O., Mau S.-C., and Mandayam, N. B. "Pricing for enabling forwarding in self-configuring ad hoc networks", IEEE Journal on Selected Areas in Communications, Vol. 23, 2005, pp. 151-162.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, pp. 151-162
-
-
Ileri, O.1
Mau, S.-C.2
Mandayam, N.B.3
-
14
-
-
0035283978
-
Information agent technology for the Internet: A survey
-
Klusch, M. "Information agent technology for the Internet: A survey", Data and Knowledge Engineering, Vol. 36, 2001, pp. 337-372.
-
(2001)
Data and Knowledge Engineering
, vol.36
, pp. 337-372
-
-
Klusch, M.1
-
16
-
-
51249123237
-
Group management for mobile Ad Hoc networks: Design, implementation and experiment
-
Liu, J., Sacchetti, D., Sailhan, F., and Issarny, V. "Group management for mobile Ad Hoc networks: design, implementation and experiment", Proceedings of the 6th conference on Mobile Data Management, 2005, pp. 47-54.
-
(2005)
Proceedings of the 6th conference on Mobile Data Management
, pp. 47-54
-
-
Liu, J.1
Sacchetti, D.2
Sailhan, F.3
Issarny, V.4
-
17
-
-
63449126936
-
Achieving cooperation in multihop wireless networks of selfish nodes
-
Pisa, Italy
-
Milan, F., Jaramillo, J. J., and Srikant, R. "Achieving cooperation in multihop wireless networks of selfish nodes", Proceeding of workshop on game theory for communications and networks, Pisa, Italy, 2006.
-
(2006)
Proceeding of workshop on game theory for communications and networks
-
-
Milan, F.1
Jaramillo, J.J.2
Srikant, R.3
-
18
-
-
63449088850
-
A secured hierarchical trust management framework for public computing utilities
-
Mitra, A., Udupa, R., and Maheswaran, M. "A secured hierarchical trust management framework for public computing utilities", Proceedings of the conference of the Centre for Advanced Studies on Collaborative research, 2005, pp. 185-199.
-
(2005)
Proceedings of the conference of the Centre for Advanced Studies on Collaborative research
, pp. 185-199
-
-
Mitra, A.1
Udupa, R.2
Maheswaran, M.3
-
19
-
-
63449099259
-
-
NS-2, Information Sciences Institute, University of Southern California, available at
-
NS-2, Information Sciences Institute, University of Southern California, available at http://www.isi.edu/nsnam/ns/.
-
-
-
-
22
-
-
34247349996
-
A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks
-
Santi, P., Eidenbenz, S., and Resta, G. "A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks", Proceedings of the workshop on dependability issues in wireless ad hoc networks and sensor networks, 2006, pp. 9-18.
-
(2006)
Proceedings of the workshop on dependability issues in wireless ad hoc networks and sensor networks
, pp. 9-18
-
-
Santi, P.1
Eidenbenz, S.2
Resta, G.3
-
23
-
-
3042714261
-
Disseminating Trust Information in Wearable Communities
-
Schneider, J., Kortuem, G., Jager, J., Fickas, S., and Segall, Z. "Disseminating Trust Information in Wearable Communities", Personal and Ubiquitous Computing, Vol. 4, 2000, pp. 245-248.
-
(2000)
Personal and Ubiquitous Computing
, vol.4
, pp. 245-248
-
-
Schneider, J.1
Kortuem, G.2
Jager, J.3
Fickas, S.4
Segall, Z.5
-
24
-
-
4544372572
-
A reputationbased trust management system for P2P networks
-
[24] Selcuk, A. A., Uzun, E., and Pariente, M. R. "A reputationbased trust management system for P2P networks", Proceedings of International Symposium on Cluster Computing and the Grid, 2004, pp. 251-258.
-
(2004)
Proceedings of International Symposium on Cluster Computing and the Grid
, pp. 251-258
-
-
Selcuk, A.A.1
Uzun, E.2
Pariente, M.R.3
-
26
-
-
63449122248
-
Mobile ad-hoc network
-
Wikipedia contributors
-
Wikipedia contributors, "Mobile ad-hoc network", Wikipedia, The Free Encyclopedia, 2008.
-
(2008)
Wikipedia, The Free Encyclopedia
-
-
-
27
-
-
34547477757
-
SIGF: A family of configurable, secure routing protocols for wireless sensor networks
-
Wood, A. D., Fang, L., Stankovic, J. A., and He, T. "SIGF: a family of configurable, secure routing protocols for wireless sensor networks", Proceedings of ACM workshop on Security of Ad Hoc and Sensor Networks, 2006, pp. 35-48.
-
(2006)
Proceedings of ACM workshop on Security of Ad Hoc and Sensor Networks
, pp. 35-48
-
-
Wood, A.D.1
Fang, L.2
Stankovic, J.A.3
He, T.4
-
28
-
-
0042933944
-
Sprite: A simple, cheatproof, credit-based system for mobile ad-hoc networks
-
Zhong, S., Chen, J., and Yang, Y. R. "Sprite: a simple, cheatproof, credit-based system for mobile ad-hoc networks", Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, 2003, pp. 1987-1997.
-
(2003)
Proceedings of 22nd Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
|