-
1
-
-
0003293531
-
Free riding on gnutella
-
Oct
-
E. Adar and B. A. Huberman. Free riding on gnutella. First Monday, 5(10), Oct. 2000.
-
(2000)
First Monday
, vol.5
, Issue.10
-
-
Adar, E.1
Huberman, B. A.2
-
2
-
-
11244338718
-
-
Technical Report MSR-TR-2003-41, Microsoft, June
-
A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou. A multi-radio unification protocol for IEEE 802.11 wireless networks. Technical Report MSR-TR-2003-41, Microsoft, June 2003.
-
(2003)
A multi-radio unification protocol for IEEE 802.11 wireless networks
-
-
Adya, A.1
Bahl, P.2
Padhye, J.3
Wolman, A.4
Zhou, L.5
-
3
-
-
32144457279
-
A measurement study of a rooftop 802.11b mesh network
-
Aug
-
D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris. A measurement study of a rooftop 802.11b mesh network. In ACM SIGCOMM, Aug. 2004.
-
(2004)
ACM SIGCOMM
-
-
Aguayo, D.1
Bicket, J.2
Biswas, S.3
Judd, G.4
Morris, R.5
-
4
-
-
0042626755
-
Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP
-
Aug
-
A. Akella, R. Karp, C. Papadimitrou, S. Seshan, and S. Shenker. Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP. In ACM SIGCOMM, Aug. 2002.
-
(2002)
ACM SIGCOMM
-
-
Akella, A.1
Karp, R.2
Papadimitrou, C.3
Seshan, S.4
Shenker, S.5
-
5
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
Mar
-
P. Bahl and V. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In IEEE INFOCOM, Mar. 2000.
-
(2000)
IEEE INFOCOM
-
-
Bahl, P.1
Padmanabhan, V.2
-
6
-
-
0035014942
-
Cheat-proof playout for centralized and distributed online games
-
Apr
-
N. Baughman and B. N. Levine. Cheat-proof playout for centralized and distributed online games. In IEEE INFOCOM, Apr. 2001.
-
(2001)
IEEE INFOCOM
-
-
Baughman, N.1
Levine, B. N.2
-
7
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
Aug
-
J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX Security Symposium, Aug. 2003.
-
(2003)
USENIX Security Symposium
-
-
Bellardo, J.1
Savage, S.2
-
9
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
May
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson. Detecting disruptive routers: A distributed network monitoring approach. In IEEE Symposium on Security and Privacy, May 1998.
-
(1998)
IEEE Symposium on Security and Privacy
-
-
Bradley, K. A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R. A.5
-
10
-
-
2442597363
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks
-
June
-
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks. In MobiHOC, June 2002.
-
(2002)
MobiHOC
-
-
Buchegger, S.1
Boudec, J.-Y. L.2
-
14
-
-
1542359009
-
A high-throughput path metric for multi-hop wireless routing
-
Sept
-
D. De Couto, D. Aguayo, J. Bicket, and R. Morris. A high-throughput path metric for multi-hop wireless routing. In MobiCom, Sept. 2003.
-
(2003)
MobiCom
-
-
De Couto, D.1
Aguayo, D.2
Bicket, J.3
Morris, R.4
-
15
-
-
3042648248
-
Performance of multihop wireless networks: Shortest path is not enough
-
Oct
-
D. De Couto, D. Aguayo, B. A. Chambers, and R. Morris. Performance of multihop wireless networks: Shortest path is not enough. In HotNets-I, Oct. 2002.
-
(2002)
HotNets-I
-
-
De Couto, D.1
Aguayo, D.2
Chambers, B. A.3
Morris, R.4
-
16
-
-
0003674088
-
Congestion control principles
-
Sept
-
S. Floyd. Congestion control principles. IETF RFC 2914, Sept. 2000.
-
(2000)
IETF RFC 2914
-
-
Floyd, S.1
-
17
-
-
0032594135
-
Promoting the use of end-to-end congestion control in the Internet
-
Aug
-
S. Floyd and K. Fall. Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Transactions on Networking, 7(4), Aug. 1999.
-
(1999)
IEEE/ACM Transactions on Networking
, vol.7
, Issue.4
-
-
Floyd, S.1
Fall, K.2
-
21
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Sept
-
Y.-C. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In MobiCom, Sept. 2002.
-
(2002)
MobiCom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
23
-
-
0032027247
-
Rate control in communication networks: shadow prices, proportional fairness and stability
-
F. Kelly, A. Maulloo, and D. Tan. Rate control in communication networks: shadow prices, proportional fairness and stability. Journal of the Operational Research Society, 49:237-252, 1998.
-
(1998)
Journal of the Operational Research Society
, vol.49
, pp. 237-252
-
-
Kelly, F.1
Maulloo, A.2
Tan, D.3
-
27
-
-
1542358969
-
UCAN: A unified cellular and ad-hoc network architecture
-
Sept
-
H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu. UCAN: A unified cellular and ad-hoc network architecture. In MobiCom, Sept. 2003.
-
(2003)
MobiCom
-
-
Luo, H.1
Ramjee, R.2
Sinha, P.3
Li, L.4
Lu, S.5
-
29
-
-
0034541756
-
Mitigating router misbehavior in mobile ad-hoc networks
-
Sept
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating router misbehavior in mobile ad-hoc networks. In MobiCom, Sept. 2000.
-
(2000)
MobiCom
-
-
Marti, S.1
Giuli, T. J.2
Lai, K.3
Baker, M.4
-
30
-
-
0004211853
-
-
Macmillan Publishing Company, 6th edition
-
J. McClave and F. Dietrich. Statistics. Macmillan Publishing Company, 6th edition, 1994.
-
(1994)
Statistics
-
-
McClave, J.1
Dietrich, F.2
-
31
-
-
0038440906
-
Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol
-
Feb
-
S. Narayanaswamy, V. Kawadia, R. Sreenivas, and P. R. Kumar. Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol. In European Wireless Conference, Feb. 2002.
-
(2002)
European Wireless Conference
-
-
Narayanaswamy, S.1
Kawadia, V.2
Sreenivas, R.3
Kumar, P. R.4
-
32
-
-
33646067650
-
Enforcing fair sharing of peer-to-peer resources
-
Feb
-
T.-W. Ngan, D. Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In IPTPS, Feb. 2003.
-
(2003)
IPTPS
-
-
Ngan, T.-W.1
Wallach, D.2
Druschel, P.3
-
34
-
-
84885484110
-
Priority forwarding in ad hoc networks with self-interested parties
-
June
-
B. Raghavan and A. C. Snoeren. Priority forwarding in ad hoc networks with self-interested parties. In IPTPS, June 2003.
-
(2003)
IPTPS
-
-
Raghavan, B.1
Snoeren, A. C.2
-
35
-
-
85094637420
-
-
MIT Roofnet
-
MIT Roofnet. http://www.pdos.lcs.mit.edu/roofnet/.
-
-
-
-
37
-
-
0029533860
-
Making greed work in networks: a game-theoretic analysis of switch service disciplines
-
Dec
-
S. Shenker. Making greed work in networks: a game-theoretic analysis of switch service disciplines. IEEE/ACM Transactions on Networking, 3(6):819-831, Dec. 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.6
, pp. 819-831
-
-
Shenker, S.1
-
42
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
Nov
-
A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. In SenSys, Nov. 2003.
-
(2003)
SenSys
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
43
-
-
18844411823
-
Understanding packet delivery performance in dense wireless sensor networks
-
Nov
-
J. Zhao and R. Govindan. Understanding packet delivery performance in dense wireless sensor networks. In SenSys, Nov. 2003.
-
(2003)
SenSys
-
-
Zhao, J.1
Govindan, R.2
-
44
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
-
Mar
-
S. Zhong, Y. Yang, and J. Chen. Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks. In IEEE INFOCOM, Mar. 2003.
-
(2003)
IEEE INFOCOM
-
-
Zhong, S.1
Yang, Y.2
Chen, J.3
|