-
1
-
-
33747142749
-
The capacity of wireless networks
-
Mar.
-
P. Gupta and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
2
-
-
2942637958
-
A deterministic approach to throughput scaling in wireless networks
-
Jun.
-
S. Kulkarni and P. Viswanath, "A deterministic approach to throughput scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 1041-1049, Jun. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.6
, pp. 1041-1049
-
-
Kulkarni, S.1
Viswanath, P.2
-
3
-
-
4143112460
-
Throughputdelay trade-off in wireless networks
-
Hong Kong, China, Mar.
-
A. E. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Throughputdelay trade-off in wireless networks," in Proc. IEEE INFOCOM , Hong Kong, China, Mar. 2004, vol. 1, pp. 464-475.
-
(2004)
Proc. IEEE INFOCOM
, vol.1
, pp. 464-475
-
-
Gamal, A.E.1
Mammen, J.2
Prabhakar, B.3
Shah, D.4
-
4
-
-
33947689700
-
Closing the gap in the capacity of wireless networks via percolation theory
-
DOI 10.1109/TIT.2006.890791
-
M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1009-1018, Mar. 2007. (Pubitemid 46487788)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.3
, pp. 1009-1018
-
-
Franceschetti, M.1
Dousse, O.2
Tse, D.N.C.3
Thiran, P.4
-
5
-
-
0042014445
-
Capacity, delay and mobility in wireless ad hoc networks
-
San Francisco, CA, Mar.
-
N. Bansal and Z. Liu, "Capacity, delay and mobility in wireless ad hoc networks," in Proc. IEEE INFOCOM, San Francisco, CA, Mar. 2003, vol. 2, pp. 1553-1563.
-
(2003)
Proc. IEEE INFOCOM
, vol.2
, pp. 1553-1563
-
-
Bansal, N.1
Liu, Z.2
-
6
-
-
77955775414
-
The fundamental capacity-delay tradeoff in large mobile ad hoc networks
-
Workshop, Bodrum, Turkey, Jun.
-
X. Lin and N. B. Shroff, "The fundamental capacity-delay tradeoff in large mobile ad hoc networks," presented at the 3rd Annu. Mediterr. Ad Hoc Netw. Workshop, Bodrum, Turkey, Jun. 2004.
-
(2004)
3rd Annu. Mediterr. Ad Hoc Netw.
-
-
Lin, X.1
Shroff, N.B.2
-
7
-
-
33745136745
-
Degenerate delay-capacity tradeoffs in Ad-Hoc networks with Brownian mobility
-
DOI 10.1109/TIT.2006.874544
-
X. Lin, G. Sharma, R. Mazumdar, and N. Shroff, "Degenerate delay-capacity trade-offs in ad hoc networks with brownian mobility," IEEE/ACM Trans. Netw., vol. 52, no. 3, pp. 2777-2784, Jun. 2006. (Pubitemid 43898925)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2777-2784
-
-
Lin, X.1
Sharma, G.2
Mazumdar, R.R.3
Shroff, N.B.4
-
8
-
-
2442421542
-
Large wireless networks under fading, mobility, and delay constraints
-
Hong Kong, China, Mar.
-
S. Toumpis and A. Goldsmith, "Large wireless networks under fading, mobility, and delay constraints," in Proc. IEEE INFOCOM, Hong Kong, China, Mar. 2004, vol. 1, pp. 609-619.
-
(2004)
Proc. IEEE INFOCOM
, vol.1
, pp. 609-619
-
-
Toumpis, S.1
Goldsmith, A.2
-
9
-
-
33745165887
-
Optimal throughput-delay scaling in wireless networks - Part I: The fluid model
-
DOI 10.1109/TIT.2006.874379
-
A. E. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Optimal throughput-delay scaling in wireless networks-Part I: The fluid model," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2568-2592, Jun. 2006. (Pubitemid 43898909)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.6
, pp. 2568-2592
-
-
El Gamal, A.1
Mammen, J.2
Prabhakar, B.3
Shah, D.4
-
10
-
-
33750576199
-
Optimal throughput-delay scaling in wireless networks - Part II: Constant-size packets
-
DOI 10.1109/TIT.2006.883548
-
A. E. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Optimal throughput-delay scaling in wireless networks-Part II: Constant-size packets," IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5111-5116, Nov. 2006. (Pubitemid 44680597)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.11
, pp. 5111-5116
-
-
El Gamal, A.1
Mammen, J.2
Prabhakar, B.3
Shah, D.4
-
11
-
-
39049148855
-
Delay and capacity trade-offs in mobile ad hoc networks: A global perspective
-
Barcelona, Spain, Apr.
-
G. Sharma, R. R. Mazumdar, and N. B. Shroff, "Delay and capacity trade-offs in mobile ad hoc networks: A global perspective," in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp. 1-12.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Sharma, G.1
Mazumdar, R.R.2
Shroff, N.B.3
-
12
-
-
20544449224
-
Capacity and delay tradeoffs for ad hoc mobile networks
-
DOI 10.1109/TIT.2005.847717
-
M. Neely and E. Modiano, "Capacity and delay tradeoffs for ad-hoc mobile networks," IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1917-1937, Jun. 2005. (Pubitemid 40843617)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.6
, pp. 1917-1937
-
-
Neely, M.J.1
Modiano, E.2
-
13
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
DOI 10.1109/TDSC.2006.58
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificateless public keys," IEEE Trans. Depend. Secure Comput., vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006. (Pubitemid 44837040)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
14
-
-
51349107952
-
Modeling secure connectivity of selforganized wireless ad hoc networks
-
Phoenix, AZ, Apr.
-
C. Zhang, Y. Song, and Y. Fang, "Modeling secure connectivity of selforganized wireless ad hoc networks," in Proc. INFOCOM, Phoenix, AZ, Apr. 2008, pp. 251-255.
-
(2008)
Proc. INFOCOM
, pp. 251-255
-
-
Zhang, C.1
Song, Y.2
Fang, Y.3
-
15
-
-
51049085143
-
Secure capacity of multi-hop wireless networks with random key pre-distribution
-
Phoenix, AZ, Apr.
-
V. Bhandari and N.Vaidya, "Secure capacity of multi-hop wireless networks with random key pre-distribution," in Proc. 2nd IEEE Workshop Mission-Critical Netw., Phoenix, AZ, Apr. 2008, pp. 1-6.
-
(2008)
Proc. 2nd IEEE Workshop Mission-Critical Netw.
, pp. 1-6
-
-
Bhandari, V.1
Vaidya, N.2
-
16
-
-
3142519532
-
On trust establishment in mobile ad-hoc networks
-
Cambridge, U.K., Apr.
-
L. Eschenauer, V. Gligor, and J. Baras, "On trust establishment in mobile ad-hoc networks," in Proc. Security Protocols Workshop, Cambridge, U.K., Apr. 2002, pp. 47-66.
-
(2002)
Proc. Security Protocols Workshop
, pp. 47-66
-
-
Eschenauer, L.1
Gligor, V.2
Baras, J.3
-
17
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washingtion, DC, Nov.
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. ACM CCS,Washingtion, DC, Nov. 2002, pp. 41-47.
-
(2002)
Proc. ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
18
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Berkeley, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. IEEE S& P, Berkeley, CA, May 2003, pp. 197-213.
-
(2003)
Proc. IEEE S& P
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
19
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA, Oct.
-
J. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. ACMMobiHoc, Long Beach, CA, Oct. 2001, pp. 146-155.
-
(2001)
Proc. ACMMobiHoc
, pp. 146-155
-
-
Hubaux, J.1
Buttyan, L.2
Capkun, S.3
-
20
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan.
-
S. Capkun, L. Buttyan, and J. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan. 2003.
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
22
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in Proc. ACM CCS, Washingtion, DC, Oct. 2003, pp. 42-51. (Pubitemid 40673787)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Han, Y.S.2
Deng, J.3
Varshney, P.K.4
-
23
-
-
34548391593
-
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
-
DOI 10.1109/TNET.2007.896259
-
D. Huang, M. Mehta, A. van de Liefvoort, and D. Medhi, "Modeling pairwise key establishment for random key predistribution in largescale sensor networks," IEEE/ACM Trans. Netw., vol. 15, no. 5, pp. 1204-1215, Oct. 2007. (Pubitemid 350111563)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.5
, pp. 1204-1215
-
-
Huang, D.1
Mehta, M.2
Van De Liefvoort, A.3
Medhi, D.4
-
24
-
-
37849033249
-
Capacity of multi-channel wireless networks with random (c,f) assignment
-
Montreal, QC, Canada, Sep.
-
V. Bhandari and N. Vaidya, "Capacity of multi-channel wireless networks with random (c,f) assignment," in Proc. ACM MobiHoc,Montreal, QC, Canada, Sep. 2007, pp. 229-238.
-
(2007)
Proc. ACM MobiHoc
, pp. 229-238
-
-
Bhandari, V.1
Vaidya, N.2
-
27
-
-
25644456139
-
Information theoretic bounds on the throughput scaling of wireless relay networks
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
O. Dousse, M. Franceschetti, and P. Thiran, "Information theoretic bounds on the throughput scaling of wireless relay networks," in Proc. IEEE INFOCOM, Miami, FL, Mar. 2005, vol. 4, pp. 2670-2678. (Pubitemid 41382380)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.4
, pp. 2670-2678
-
-
Dousse, O.1
Franceschetti, M.2
Thiran, P.3
-
28
-
-
85029421552
-
Block gossiping on grids and tori: Deterministic sorting and routing match the bisection bound
-
Honnef, Germany, Sep.
-
M. Kunde, "Block gossiping on grids and tori: Deterministic sorting and routing match the bisection bound," in Proc. 1st Eur. Symp. Algor., Honnef, Germany, Sep. 1993, pp. 272-283.
-
(1993)
Proc. 1st Eur. Symp. Algor.
, pp. 272-283
-
-
Kunde, M.1
-
29
-
-
0028263307
-
Derandomizing algorithms for routing and sorting on meshes
-
Arlington, VA, Jan.
-
M. Kaufmann, J. F. Sibeyn, and T. Suel, "Derandomizing algorithms for routing and sorting on meshes," in Proc. 5th ACM-SIAM SODA, Arlington, VA, Jan. 1994, pp. 669-679.
-
(1994)
Proc. 5th ACM-SIAM SODA
, pp. 669-679
-
-
Kaufmann, M.1
Sibeyn, J.F.2
Suel, T.3
-
30
-
-
85031727532
-
Percolation theory and computing with faulty arrays of processors
-
Orlando, FL, Jan.
-
T. R. Mathies, "Percolation theory and computing with faulty arrays of processors," in Proc. 3rd ACM-SIAM SODA, Orlando, FL, Jan. 1992, pp. 100-103.
-
(1992)
Proc. 3rd ACM-SIAM SODA
, pp. 100-103
-
-
Mathies, T.R.1
-
31
-
-
0001553129
-
Critical power for asymptotic connectivity in wireless networks
-
Boston, MA: Birkhauser
-
P. Gupta and P. R. Kumar, "Critical power for asymptotic connectivity in wireless networks," in Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming. Boston, MA: Birkhauser, 1998.
-
(1998)
Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming
-
-
Gupta, P.1
Kumar, P.R.2
-
32
-
-
0025383763
-
A guided tour of Chernoff bounds
-
Feb.
-
T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, no. 6, pp. 305-308, Feb. 1990.
-
(1990)
Inf. Process. Lett.
, vol.33
, Issue.6
, pp. 305-308
-
-
Hagerup, T.1
Rüb, C.2
|