메뉴 건너뛰기




Volumn , Issue , 2005, Pages 231-244

Sustaining cooperation in multi-hop wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

IEEE STANDARDS; ROUTING PROTOCOLS; SYSTEMS ANALYSIS;

EID: 80051768284     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (96)

References (44)
  • 1
    • 0003293531 scopus 로고    scopus 로고
    • Free riding on gnutella
    • Oct
    • E. Adar and B. A. Huberman. Free riding on gnutella. First Monday, 5(10), Oct. 2000.
    • (2000) First Monday , vol.5 , Issue.10
    • Adar, E.1    Huberman, B. A.2
  • 4
    • 0042626755 scopus 로고    scopus 로고
    • Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP
    • Aug
    • A. Akella, R. Karp, C. Papadimitrou, S. Seshan, and S. Shenker. Selfish behavior and stability of the Internet: A game-theoretic analysis of TCP. In ACM SIGCOMM, Aug. 2002.
    • (2002) ACM SIGCOMM
    • Akella, A.1    Karp, R.2    Papadimitrou, C.3    Seshan, S.4    Shenker, S.5
  • 5
    • 0033872896 scopus 로고    scopus 로고
    • RADAR: An in-building RF-based user location and tracking system
    • Mar
    • P. Bahl and V. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In IEEE INFOCOM, Mar. 2000.
    • (2000) IEEE INFOCOM
    • Bahl, P.1    Padmanabhan, V.2
  • 6
    • 0035014942 scopus 로고    scopus 로고
    • Cheat-proof playout for centralized and distributed online games
    • Apr
    • N. Baughman and B. N. Levine. Cheat-proof playout for centralized and distributed online games. In IEEE INFOCOM, Apr. 2001.
    • (2001) IEEE INFOCOM
    • Baughman, N.1    Levine, B. N.2
  • 7
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Aug
    • J. Bellardo and S. Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX Security Symposium, Aug. 2003.
    • (2003) USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 10
    • 2442597363 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks
    • June
    • S. Buchegger and J.-Y. L. Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks. In MobiHOC, June 2002.
    • (2002) MobiHOC
    • Buchegger, S.1    Boudec, J.-Y. L.2
  • 11
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Oct
    • L. Buttyan and J. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications, 8(5), Oct. 2003.
    • (2003) ACM/Kluwer Mobile Networks and Applications , vol.8 , Issue.5
    • Buttyan, L.1    Hubaux, J.2
  • 14
    • 1542359009 scopus 로고    scopus 로고
    • A high-throughput path metric for multi-hop wireless routing
    • Sept
    • D. De Couto, D. Aguayo, J. Bicket, and R. Morris. A high-throughput path metric for multi-hop wireless routing. In MobiCom, Sept. 2003.
    • (2003) MobiCom
    • De Couto, D.1    Aguayo, D.2    Bicket, J.3    Morris, R.4
  • 15
    • 3042648248 scopus 로고    scopus 로고
    • Performance of multihop wireless networks: Shortest path is not enough
    • Oct
    • D. De Couto, D. Aguayo, B. A. Chambers, and R. Morris. Performance of multihop wireless networks: Shortest path is not enough. In HotNets-I, Oct. 2002.
    • (2002) HotNets-I
    • De Couto, D.1    Aguayo, D.2    Chambers, B. A.3    Morris, R.4
  • 16
    • 0003674088 scopus 로고    scopus 로고
    • Congestion control principles
    • Sept
    • S. Floyd. Congestion control principles. IETF RFC 2914, Sept. 2000.
    • (2000) IETF RFC 2914
    • Floyd, S.1
  • 17
    • 0032594135 scopus 로고    scopus 로고
    • Promoting the use of end-to-end congestion control in the Internet
    • Aug
    • S. Floyd and K. Fall. Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Transactions on Networking, 7(4), Aug. 1999.
    • (1999) IEEE/ACM Transactions on Networking , vol.7 , Issue.4
    • Floyd, S.1    Fall, K.2
  • 21
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Sept
    • Y.-C. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In MobiCom, Sept. 2002.
    • (2002) MobiCom
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 22
  • 23
    • 0032027247 scopus 로고    scopus 로고
    • Rate control in communication networks: shadow prices, proportional fairness and stability
    • F. Kelly, A. Maulloo, and D. Tan. Rate control in communication networks: shadow prices, proportional fairness and stability. Journal of the Operational Research Society, 49:237-252, 1998.
    • (1998) Journal of the Operational Research Society , vol.49 , pp. 237-252
    • Kelly, F.1    Maulloo, A.2    Tan, D.3
  • 27
    • 1542358969 scopus 로고    scopus 로고
    • UCAN: A unified cellular and ad-hoc network architecture
    • Sept
    • H. Luo, R. Ramjee, P. Sinha, L. Li, and S. Lu. UCAN: A unified cellular and ad-hoc network architecture. In MobiCom, Sept. 2003.
    • (2003) MobiCom
    • Luo, H.1    Ramjee, R.2    Sinha, P.3    Li, L.4    Lu, S.5
  • 29
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating router misbehavior in mobile ad-hoc networks
    • Sept
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating router misbehavior in mobile ad-hoc networks. In MobiCom, Sept. 2000.
    • (2000) MobiCom
    • Marti, S.1    Giuli, T. J.2    Lai, K.3    Baker, M.4
  • 30
    • 0004211853 scopus 로고
    • Macmillan Publishing Company, 6th edition
    • J. McClave and F. Dietrich. Statistics. Macmillan Publishing Company, 6th edition, 1994.
    • (1994) Statistics
    • McClave, J.1    Dietrich, F.2
  • 31
    • 0038440906 scopus 로고    scopus 로고
    • Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol
    • Feb
    • S. Narayanaswamy, V. Kawadia, R. Sreenivas, and P. R. Kumar. Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol. In European Wireless Conference, Feb. 2002.
    • (2002) European Wireless Conference
    • Narayanaswamy, S.1    Kawadia, V.2    Sreenivas, R.3    Kumar, P. R.4
  • 32
    • 33646067650 scopus 로고    scopus 로고
    • Enforcing fair sharing of peer-to-peer resources
    • Feb
    • T.-W. Ngan, D. Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In IPTPS, Feb. 2003.
    • (2003) IPTPS
    • Ngan, T.-W.1    Wallach, D.2    Druschel, P.3
  • 34
    • 84885484110 scopus 로고    scopus 로고
    • Priority forwarding in ad hoc networks with self-interested parties
    • June
    • B. Raghavan and A. C. Snoeren. Priority forwarding in ad hoc networks with self-interested parties. In IPTPS, June 2003.
    • (2003) IPTPS
    • Raghavan, B.1    Snoeren, A. C.2
  • 35
    • 85094637420 scopus 로고    scopus 로고
    • MIT Roofnet
    • MIT Roofnet. http://www.pdos.lcs.mit.edu/roofnet/.
  • 37
    • 0029533860 scopus 로고    scopus 로고
    • Making greed work in networks: a game-theoretic analysis of switch service disciplines
    • Dec
    • S. Shenker. Making greed work in networks: a game-theoretic analysis of switch service disciplines. IEEE/ACM Transactions on Networking, 3(6):819-831, Dec. 2003.
    • (2003) IEEE/ACM Transactions on Networking , vol.3 , Issue.6 , pp. 819-831
    • Shenker, S.1
  • 40
  • 42
    • 18844378578 scopus 로고    scopus 로고
    • Taming the underlying challenges of reliable multihop routing in sensor networks
    • Nov
    • A. Woo, T. Tong, and D. Culler. Taming the underlying challenges of reliable multihop routing in sensor networks. In SenSys, Nov. 2003.
    • (2003) SenSys
    • Woo, A.1    Tong, T.2    Culler, D.3
  • 43
    • 18844411823 scopus 로고    scopus 로고
    • Understanding packet delivery performance in dense wireless sensor networks
    • Nov
    • J. Zhao and R. Govindan. Understanding packet delivery performance in dense wireless sensor networks. In SenSys, Nov. 2003.
    • (2003) SenSys
    • Zhao, J.1    Govindan, R.2
  • 44
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
    • Mar
    • S. Zhong, Y. Yang, and J. Chen. Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks. In IEEE INFOCOM, Mar. 2003.
    • (2003) IEEE INFOCOM
    • Zhong, S.1    Yang, Y.2    Chen, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.