-
4
-
-
0141446307
-
Algorithmic aspects of clique-transversal and clique-independent sets
-
V. Guruswami and C.P. Rangan, "Algorithmic Aspects of Clique-Transversal and Clique-Independent Sets," Discrete Applied Math., vol. 100, pp. 183-202, 2000.
-
(2000)
Discrete Applied Math.
, vol.100
, pp. 183-202
-
-
Guruswami, V.1
Rangan, C.P.2
-
5
-
-
47349115740
-
Performance of dsss against repeater jamming
-
W. Hang, W. Zanji, and G. Jingbo, "Performance of DSSS Against Repeater Jamming," Proc. IEEE 13th Int'l Conf. Electronics, Circuits and Systems (ICECS), 2006.
-
(2006)
Proc. IEEE 13th Int'l Conf. Electronics, Circuits and Systems (ICECS)
-
-
Hang, W.1
Zanji, W.2
Jingbo, G.3
-
6
-
-
79951947094
-
Jamming-aware traffic allocation for multiple-path routing using
-
Feb.
-
P. Tague, S. Nabar, J.A. Ritcey, and R. Poovendran, "Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection," IEEE/ACM Trans. Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
-
(2011)
Portfolio Selection IEEE/ACM Trans. Networking
, vol.19
, Issue.1
, pp. 184-194
-
-
Tague, P.1
Nabar, S.2
Ritcey, J.A.3
Poovendran, R.4
-
7
-
-
70450202571
-
Reactive jamming attacks in multi-radio wireless sensor networks: An efficient mitigating measure by identifying trigger nodes
-
conjunction with MobiHoc
-
I. Shin, Y. Shen, Y. Xuan, M.T. Thai, and T. Znati, "Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: An Efficient Mitigating Measure by Identifying Trigger Nodes," Proc. Second ACM Int'l Workshop Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC), in conjunction with MobiHoc, 2009.
-
(2009)
Proc. Second ACM Int'l Workshop Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC)
-
-
Shin, I.1
Shen, Y.2
Xuan, Y.3
Thai, M.T.4
Znati, T.5
-
8
-
-
50649091976
-
Reed solomon coding for frequency hopping spread spectrum in jamming environment
-
O. Sidek and A. Yahya, "Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment," Am. J. Applied Sciences, vol. 5, no. 10, pp. 1281-1284, 2008.
-
(2008)
Am. J. Applied Sciences
, vol.5
, Issue.10
, pp. 1281-1284
-
-
Sidek, O.1
Yahya, A.2
-
9
-
-
77956561765
-
Detection of reactive jamming in sensor networks
-
M. Strasser, B. Danev, and S. Capkun, "Detection of Reactive Jamming in Sensor Networks," ACM Trans. Sensor Networks, vol. 7, pp. 1-29, 2010.
-
(2010)
ACM Trans. Sensor Networks
, vol.7
, pp. 1-29
-
-
Strasser, M.1
Danev, B.2
Capkun, S.3
-
12
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
DOI 10.1109/MNET.2006.1637931
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming Sensor Networks: Attack and Defense Strategies," IEEE Network, vol. 20, no. 3, pp. 41-47, May/June 2006. (Pubitemid 43885286)
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
13
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service," Proc. ACM Workshop Wireless Security, pp. 80-89, 2004. (Pubitemid 40062798)
-
(2004)
Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
14
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
16
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
18
-
-
33845635202
-
Wormhole-based antijamming techniques in sensor networks
-
DOI 10.1109/TMC.2007.250674
-
M. Cagalj, S. Capkun, and J.P. Hubaux, "Wormhole-Based Antijamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007. (Pubitemid 44955817)
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.1
, pp. 100-114
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.-P.3
-
19
-
-
40049103916
-
New constructions of one- and two-stage pooling designs
-
DOI 10.1089/cmb.2007.0195
-
Y.-X. Chen and D.-Z. Du, "New Constructions of One-and Two-Stage Pooling Designs," J. Computational Biology, vol. 15, pp. 195-205, 2008. (Pubitemid 351323142)
-
(2008)
Journal of Computational Biology
, vol.15
, Issue.2
, pp. 195-205
-
-
Cheng, Y.1
Du, D.-Z.2
-
20
-
-
0000727336
-
The rectilinear steiner tree problem is np-complete
-
M.G. Garey and D.S. Johnson, "The Rectilinear Steiner Tree Problem is NP-Complete," SIAM J. Applied Math., vol. 32, pp. 826-834, 1977.
-
(1977)
SIAM J. Applied Math.
, vol.32
, pp. 826-834
-
-
Garey, M.G.1
Johnson, D.S.2
-
21
-
-
0019532794
-
Universality considerations in vlsi circuits
-
Feb.
-
L.G. Valiant, "Universality Considerations in VLSI Circuits," IEEE Trans. Computers, vol. 30, no. 2, pp. 135-140, Feb. 1981.
-
(1981)
IEEE Trans. Computers
, vol.30
, Issue.2
, pp. 135-140
-
-
Valiant, L.G.1
-
22
-
-
77951563736
-
Lightweight jammer localization in wireless networks: System design and implementation
-
K. Pelechrinis, I. Koutsopoulos, I. Broustis, and S.V. Krishnamurthy, "Lightweight Jammer Localization in Wireless Networks: System Design and Implementation," Proc. IEEE 28th Conf. Global Telecomm. (GlobeCom '09), 2009.
-
(2009)
Proc. IEEE 28th Conf. Global Telecomm. (GlobeCom '09)
-
-
Pelechrinis, K.1
Koutsopoulos, I.2
Broustis, I.3
Krishnamurthy, S.V.4
-
23
-
-
70349334200
-
Localizing jammers in wireless networks
-
H. Liu, W. Xu, Y. Chen, and Z. Liu, "Localizing Jammers in Wireless Networks," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PWN), 2009.
-
(2009)
Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PWN)
-
-
Liu, H.1
Xu, W.2
Chen, Y.3
Liu, Z.4
-
24
-
-
80051872854
-
Wireless jamming localization by exploiting nodes' hearing ranges
-
Z. Liu, H. Liu, W. Xu, and Y. Chen, "Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges," Proc. Int'l Conf. Distributed Computing in Sensor Systems (DCOSS), 2010.
-
(2010)
Proc. Int'l Conf. Distributed Computing in Sensor Systems (DCOSS)
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
25
-
-
79954538882
-
Optimal cover of points by disks in a simple polygon
-
H. Kaplan, M. Katz, G. Morgenstern, and M. Sharir, "Optimal Cover of Points by Disks in a Simple Polygon," Proc. 18th Ann. European Symp. Algorithms, 2010.
-
(2010)
Proc. 18th Ann. European Symp. Algorithms
-
-
Kaplan, H.1
Katz, M.2
Morgenstern, G.3
Sharir, M.4
|