-
1
-
-
13844296355
-
Wireless mesh networks: A survey
-
DOI 10.1016/j.comnet.2004.12.001, PII S1389128604003457
-
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: A survey," Comput. Netw., vol. 47, no. 4, pp. 445-487, Mar. 2005. (Pubitemid 40242422)
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
2
-
-
0033882824
-
Underwater acoustic networks
-
DOI 10.1109/48.820738
-
E. M. Sozer, M. Stojanovic, and J. G. Proakis, "Underwater acoustic networks," IEEE J. Ocean. Eng., vol. 25, no. 1, pp. 72-83, Jan. 2000. (Pubitemid 30553477)
-
(2000)
IEEE Journal of Oceanic Engineering
, vol.25
, Issue.1
, pp. 72-83
-
-
Sozer, E.M.1
Stojanovic, M.2
Proakis, J.G.3
-
4
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Washington DC Aug.
-
J. Bellardo and S. Savage, "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions," in Proc. USENIX Security Symp., Washington, DC, Aug. 2003, pp. 15-28.
-
(2003)
Proc. USENIX Security Symp.
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
5
-
-
51949113065
-
Intelligent jamming in wireless networks with applications to 802.11 b and other networks
-
Washington, DC Oct.
-
D. J. Thuente and M. Acharya, "Intelligent jamming in wireless networks with applications to 802.11 b and other networks," in Proc. 25th IEEE MILCOM, Washington, DC, Oct. 2006, pp. 1-7.
-
(2006)
Proc. 25th IEEE MILCOM
, pp. 1-7
-
-
Thuente, D.J.1
Acharya, M.2
-
6
-
-
0036793924
-
Denial of service insensor networks
-
Oct.
-
A. D. Wood andJ. A.Stankovic, "Denial of service insensor networks," Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.2
-
7
-
-
18844450713
-
On link layer denial of service in data wireless LANs
-
DOI 10.1002/wcm.221
-
G. Lin and G. Noubir, "On link layer denial of service in data wireless LANs," Wireless Commun. Mobile Comput., vol. 5, no. 3, pp. 273-284, May 2005. (Pubitemid 40683562)
-
(2005)
Wireless Communications and Mobile Computing
, vol.5
, Issue.3
, pp. 273-284
-
-
Lin, G.1
Noubir, G.2
-
8
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
DOI 10.1109/MNET.2006.1637931
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: Attack and defense strategies," IEEE Netw., vol. 20, no. 3, pp. 41-47, May/Jun. 2006. (Pubitemid 43885286)
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
9
-
-
11244327295
-
-
Reading MA: Addison-Wesley ch. 5
-
D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Reading, MA: Addison-Wesley, 2001, ch. 5, pp. 139-172.
-
(2001)
DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
10
-
-
34347349933
-
Ad hoc on-demand distance vector routing
-
New Orleans, LA Feb.
-
E. M. Royer and C. E. Perkins, "Ad hoc on-demand distance vector routing," in Proc. 2nd IEEE WMCSA, New Orleans, LA, Feb. 1999, pp. 90-100.
-
(1999)
Proc. 2nd IEEE WMCSA
, pp. 90-100
-
-
Royer, E.M.1
Perkins, C.E.2
-
11
-
-
0035209078
-
MP-DSR: A QoS-aware multi-path dynamic source routing protocol for wireless ad-hoc networks
-
R. Leung, J. Liu, E. Poon, A.-L. C. Chan, and B. Li, "MP-DSR: A QoS-aware multi-path dynamic source routing protocol for wireless ad-hoc networks," in Proc. 26th Ann. IEEE LCN, Tampa, FL, Nov. 2001, pp. 132-141. (Pubitemid 33148858)
-
(2001)
Conference on Local Computer Networks
, pp. 132-141
-
-
Leung, R.1
Liu, J.2
Poon, E.3
Chan, A.-L.C.4
Li, B.5
-
12
-
-
84995186518
-
Portfolio selection
-
Mar.
-
H. Markowitz, "Portfolio selection," J. Finance, vol. 7, no. 1, pp. 77-92, Mar. 1952.
-
(1952)
J. Finance
, vol.7
, Issue.1
, pp. 77-92
-
-
Markowitz, H.1
-
14
-
-
33747308413
-
A tutorial on decomposition methods for network utility maximization
-
Aug.
-
D. P. Palomar and M. Chiang, "A tutorial on decomposition methods for network utility maximization," IEEE J. Sel. Areas Commun., vol. 24, no. 8, pp. 1439-1451, Aug. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.8
, pp. 1439-1451
-
-
Palomar, D.P.1
Chiang, M.2
-
16
-
-
0033903394
-
Control chart tests based on geometric moving averages
-
S. W. Roberts, "Control chart tests based on geometric moving averages," Technometrics, vol. 42, no. 1, pp. 97-101, Feb. 2000. (Pubitemid 30553348)
-
(2000)
Technometrics
, vol.42
, Issue.1
, pp. 97-101
-
-
Roberts, S.W.1
-
17
-
-
0003273441
-
Computing TCP's retransmission timer
-
Nov. [Online]
-
V. Paxson and M. Allman, "Computing TCP's retransmission timer," RFC 2988, Nov. 2000 [Online]. Available: http://www.ietf.org/rfc/ rfc2988.txt
-
(2000)
RFC
, vol.2988
-
-
Paxson, V.1
Allman, M.2
-
18
-
-
33747203615
-
Products of independent beta variables with applications to Connor and Mosimann's generalized dirichlet distribution
-
Dec.
-
I. R. James, "Products of independent beta variables with applications to Connor and Mosimann's generalized dirichlet distribution," J. Amer. Stat. Assoc., vol. 67, no. 340, pp. 910-912, Dec. 1972.
-
(1972)
J. Amer. Stat. Assoc.
, vol.67
, Issue.340
, pp. 910-912
-
-
James, I.R.1
|