-
2
-
-
17744374622
-
TCP in wireless environments: Problems and solutions
-
DOI 10.1109/MCOM.2005.1404595
-
Y. Tian, K. Xu, and N. Ansari, "TCP in Wireless Environments: Problems and Solutions," IEEE Commun. Mag., vol. 43, no. 3, pp. S27-S32, Mar. 2005. (Pubitemid 40573656)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.3
-
-
Tian, Y.1
Xu, K.2
Ansari, N.3
-
3
-
-
0035363918
-
Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks?
-
DOI 10.1109/35.925681
-
T. Saadawi and S. Xu, "Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks?" IEEE Commun. Mag., vol. 36, no. 6, June 2001, pp. 130-37. (Pubitemid 32583320)
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.6
, pp. 130-137
-
-
Xu, S.1
Saadawi, T.2
-
4
-
-
62149134527
-
Distributed cooperative mac for multihop wireless networks
-
Feb.
-
H. Shan, W. Zhuang, and Z. Wang, "Distributed Cooperative MAC for Multihop Wireless Networks," IEEE Commun. Mag., vol. 47, no. 2, Feb. 2009, pp. 126-33.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.2
, pp. 126-33
-
-
Shan, H.1
Zhuang, W.2
Wang, Z.3
-
5
-
-
77249101729
-
Bandwidth allocation in wireless ad hoc networks: Challenges and prospects
-
Jan
-
X. Su, S. Chan, and J. H. Manton, "Bandwidth Allocation in Wireless Ad Hoc Networks: Challenges and Prospects," IEEE Commun. Mag., vol. 48, no. 1, Jan. 2010, pp. 80-85.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.1
, pp. 80-85
-
-
Su, X.1
Chan, S.2
Manton, J.H.3
-
6
-
-
17744366837
-
Design guidelines for routing protocols in ad hoc and sensor networks with a realistic physical layer
-
DOI 10.1109/MCOM.2005.1404603
-
I. Stojmenovic, A. Nayak, and J. Kuruvila, "Design Guidelines for Routing Protocols in Ad Hoc and Sensor Networks wth A Realistic Physical Layer," IEEE Commun. Mag., vol. 43, no. 3, Mar. 2005, pp. 101-06. (Pubitemid 40573663)
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.3
, pp. 101-106
-
-
Stojmenovic, I.1
Nayak, A.2
Kuruvila, J.3
-
7
-
-
67349253018
-
SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
X. Lin et al., "SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems," IEEE JSAC, vol. 27, no. 4, 2009, pp. 365-78.
-
(2009)
IEEE Jsac
, vol.27
, Issue.4
, pp. 365-78
-
-
Lin, X.1
-
8
-
-
82555186894
-
BECAN: A bandwidth- efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks
-
to appear
-
R. Lu et al., "BECAN: A Bandwidth- Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks," IEEE Trans. Parallel and Distrib. Sys., to appear, 2011.
-
(2011)
IEEE Trans. Parallel and Distrib. Sys
-
-
Lu, R.1
-
9
-
-
80052176023
-
Side channel monitoring: Packet drop attack detection in wireless ad hoc networks
-
X. Li et al., "Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks," Proc. IEEE ICC '11, 2011.
-
(2011)
Proc. IEEE ICC '11
-
-
Li, X.1
-
10
-
-
85032752189
-
Multitarget tracking in distributed sensor networks
-
DOI 10.1109/MSP.2007.361600
-
J. Liu, M. Chu, and J. E. Reich, "Multitarget Tracking in Distributed Sensor Networks," IEEE Sig. Proc. Mag., vol. 24, no. 3, 2007, pp. 36-46. (Pubitemid 46844642)
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.3
, pp. 36-46
-
-
Liu, J.1
Chu, M.2
Reich, J.E.3
-
11
-
-
77952732822
-
Multihypothesis viterbi data association: Algorithm development and assessment
-
G.W. Pulford and B.F. La Scala, "Multihypothesis Viterbi Data Association: Algorithm Development and Assessment," IEEE Trans. Aerospace and Elect. Sys., vol. 46, no. 2, 2010, pp. 583-609.
-
(2010)
IEEE Trans. Aerospace and Elect. Sys.
, vol.46
, Issue.2
, pp. 583-609
-
-
Pulford, G.W.1
La Scala, B.F.2
-
12
-
-
77956034116
-
Decentralized variational filtering for target tracking in binary sensor networks
-
J. Teng, H. Snoussi, and C. Richard, "Decentralized Variational Filtering for Target Tracking in Binary Sensor Networks," IEEE Trans. Mobile Computing, vol. 9, no. 10, 2010, pp. 1465-77.
-
(2010)
IEEE Trans. Mobile Computing
, vol.9
, Issue.10
, pp. 1465-77
-
-
Teng, J.1
Snoussi, H.2
Richard, C.3
-
13
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
Feb
-
M. Li, W. Lou, and K. Ren, "Data Security and Privacy in Wireless Body Area Networks," IEEE Wireless Commun., vol. 17, no. 1, Feb. 2010, pp. 51-58.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
14
-
-
65249161101
-
Recent developments in network intrusion detection
-
Jan./Feb.
-
T. Chen et al., "Recent Developments in Network Intrusion Detection," IEEE Network, vol. 23, no. 1, Jan./Feb. 2009, pp. 4-5.
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 4-5
-
-
Chen, T.1
|