-
1
-
-
4344588928
-
Pipage rounding: A new method of constructing algorithms with proven performance guarantee
-
Ageev, A.A. and Sviridenko, M.I. (2004) 'Pipage rounding: a new method of constructing algorithms with proven performance guarantee', Journal of Combinatorial Optimization, Vol. 8, No. 3, pp.307-328.
-
(2004)
Journal of Combinatorial Optimization
, vol.8
, Issue.3
, pp. 307-328
-
-
Ageev, A.A.1
Sviridenko, M.I.2
-
2
-
-
84948677324
-
Faulttolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks
-
14-16 October
-
Bahramgiri, M., Hajiaghayi, M.T. and Mirrokni, V.S. (2002) 'Faulttolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks', Proceedings of the11th International Conference on Computer Communications (ICCCN), 14-16 October, pp.392-397.
-
(2002)
Proceedings of the11th International Conference on Computer Communications (ICCCN)
, pp. 392-397
-
-
Bahramgiri, M.1
Hajiaghayi, M.T.2
Mirrokni, V.S.3
-
3
-
-
25844504705
-
Energy-efficient target coverage in wireless sensor networks
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
Cardei, M., Thai, M.T., Li, Y. and Wu, W. (2005) 'Energyefficient target coverage in wireless sensor networks', Proceedings of the InfoCom, Vol. 3, pp.1976-1984. (Pubitemid 41390709)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 1976-1984
-
-
Cardei, M.1
Thai, My.T.2
Li, Y.3
Wu, W.4
-
4
-
-
35048858805
-
Maximum coverage problem with group budget constraints and applications
-
Chekuri, C. and Kumar, A. (2004) 'Maximum coverage problem with group budget constraints and applications', Proceedings of Approximation, Randomization, and Combinatorial Optimization, pp.72-83.
-
(2004)
Proceedings of Approximation, Randomization, and Combinatorial Optimization
, pp. 72-83
-
-
Chekuri, C.1
Kumar, A.2
-
5
-
-
0032108328
-
A Threshold of ln n for Approximating Set Cover
-
Feige, U. (1998) 'A threshold of ln n for approximating set cover', Journal of the ACM, Vol. 45, No. 4, pp.634-652. (Pubitemid 128488790)
-
(1998)
Journal of the ACM
, vol.45
, Issue.4
, pp. 634-652
-
-
Feige, U.1
-
6
-
-
85035363269
-
Adaptive protocols for information dissemination in wireless sensor networks
-
Heinzelman, W.R., Kulik, J. and Balakrishnan, H. (1999) 'Adaptive protocols for information dissemination in wireless sensor networks', Proceedings of the MobiCom, pp.174-185.
-
(1999)
Proceedings of the MobiCom
, pp. 174-185
-
-
Heinzelman, W.R.1
Kulik, J.2
Balakrishnan, H.3
-
8
-
-
42149094136
-
Energy-efficient connected coverage in wireless sensor networks
-
Jaggi, N. and Abouzeid, A.A. (2006) 'Energy-efficient connected coverage in wireless sensor networks', AMOC, pp.85-100.
-
(2006)
AMOC
, pp. 85-100
-
-
Jaggi, N.1
Abouzeid, A.A.2
-
9
-
-
1542360013
-
Detection and handling of MAC layer misbehavior in wireless networks
-
Kyasanur, P. and Vaidya, N. (2003) 'Detection and handling of MAC layer misbehavior in wireless networks', Proceeding of IEEE DSN, pp.173-182.
-
(2003)
Proceeding of IEEE DSN
, pp. 173-182
-
-
Kyasanur, P.1
Vaidya, N.2
-
10
-
-
38149007120
-
Algorithms for the m-coverage problem and k-connected m-coverage problem in wireless sensor networks
-
Li, D., Cao, J., Liu, D., Yu, Y. and Sun, H. (2007a) 'Algorithms for the m-coverage problem and k-connected m-coverage problem in wireless sensor networks', Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing (NPC2007), pp.250-259.
-
(2007)
Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing (NPC2007)
, pp. 250-259
-
-
Li, D.1
Cao, J.2
Liu, D.3
Yu, Y.4
Sun, H.5
-
11
-
-
38149067564
-
K-connected target coverage problem in wireless sensor networks
-
Li, D., Cao, J., Liu, M. and Zhang, Y. (2007b) 'K-connected target coverage problem in wireless sensor networks', Proceedings of the 1st International Conference on Combinatorial Optimization and Applications (LNCS4616), pp.20-31.
-
(2007)
Proceedings of the 1st International Conference on Combinatorial Optimization and Applications (LNCS4616)
, pp. 20-31
-
-
Li, D.1
Cao, J.2
Liu, M.3
Zhang, Y.4
-
12
-
-
11244250585
-
FLSS: A fault-tolerant topology control algorithm for wireless networks
-
Li, N. and Hou, J.C. (2005) 'FLSS: a fault-tolerant topology control algorithm for wireless networks', Proceedings of the MobiCom, pp.275-286.
-
(2005)
Proceedings of the MobiCom
, pp. 275-286
-
-
Li, N.1
Hou, J.C.2
-
13
-
-
0242696181
-
Fault tolerant deployment and topology control in wireless networks
-
Li, X., Wan, P., Wang, Y. and Yi, C. (2003) 'Fault tolerant deployment and topology control in wireless networks', Proceedings of the MobiHoc, pp.117-128.
-
(2003)
Proceedings of the MobiHoc
, pp. 117-128
-
-
Li, X.1
Wan, P.2
Wang, Y.3
Yi, C.4
-
14
-
-
33646706570
-
Securing wireless mesh networks
-
DOI 10.1109/MWC.2006.1632480
-
Salem, N.B. and Hubaux, J-P. (2006) 'Securing wireless mesh networks', IEEE Wireless Communications, Vol. 13, No. 2, pp.50-55. (Pubitemid 43742768)
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.2
, pp. 50-55
-
-
Salem, N.B.1
Hubaux, J.-P.2
-
16
-
-
33144490460
-
A framework for misuse detection in ad hoc networks - Part I
-
DOI 10.1109/JSAC.2005.861387
-
Subhadrabandhu, D., Sarkar, S. and Anjum, F. (2006) 'A framework for misuse detection in ad hoc networks-Part I', IEEE JSAC, Vol. 24, No. 2, pp.274-289. (Pubitemid 43269749)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 274-289
-
-
Subhadrabandhu, D.1
Anjum, F.2
|