-
1
-
-
79959216411
-
Customers angered as iphones overload at&t
-
J. Wortham, "Customers Angered as iPhones Overload AT&T," The New York Times, http://www.nytimes.com/2009/09/03/technology/companies/ 03att.html, Sept. 2009
-
(2009)
The New York Times
-
-
Wortham, J.1
-
2
-
-
0042660545
-
Stimulating cooperation in self- organizing mobile ad hoc networks
-
L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self- Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, pp. 579-592, 2003
-
(2003)
Mobile Networks and Applications
, vol.8
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
3
-
-
70450178800
-
An overlay architecture for vehicular networks
-
L. Liquori, D. Borsetti, C. Casetti, and C.-F. Chiasserini, "An Overlay Architecture for Vehicular Networks," Proc. Seventh Int'l IFIP-TC6 Networking Conf. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 2008
-
(2008)
Proc. Seventh Int'l IFIP-TC6 Networking Conf. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet
-
-
Liquori, L.1
Borsetti, D.2
Casetti, C.3
Chiasserini, C.-F.4
-
4
-
-
17144395121
-
An analytical approach to the study of cooperation in wireless ad hoc networks
-
DOI 10.1109/TWC.2004.842950
-
V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini, and R. Rao, "An Analytical Approach to the Study of Cooperation in Wireless Ad Hoc Networks," IEEE Trans. Wireless and Comm., vol. 4, no. 2, pp. 722-733, Mar. 2005 (Pubitemid 40519753)
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.2
, pp. 722-733
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.-F.3
Rao, R.R.4
-
5
-
-
33644643460
-
Node cooperation in hybrid ad hoc networks
-
DOI 10.1109/TMC.2006.1599405
-
N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "Node Cooperation in Hybrid Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376, Apr. 2006 (Pubitemid 43327123)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.4
, pp. 365-376
-
-
Salem, N.B.1
Buttyan, L.2
Hubaux, J.-P.3
Jakobsson, M.4
-
6
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
DOI 10.1007/s11276-006-6220-3
-
Y. Zhang, W. Lou, and Y. Fang, "A Secure Incentive Protocol for Mobile Ad Hoc Networks," ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, Oct. 2007 (Pubitemid 47185248)
-
(2007)
Wireless Networks
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
7
-
-
77953317183
-
Stimulating cooperation in multihop wireless networks using cheating detection system
-
M.E. Mahmoud and X. Shen, "Stimulating Cooperation in Multihop Wireless Networks Using Cheating Detection System," Proc. IEEE INFOCOM, 2010
-
(2010)
Proc. IEEE INFOCOM
-
-
Mahmoud, M.E.1
Shen, X.2
-
8
-
-
5044238739
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. Conf. Comm. and Multimedia Security, 2002
-
(2002)
Proc. Conf. Comm. and Multimedia Security
-
-
Michiardi, P.1
Molva, R.2
-
9
-
-
37749013560
-
Darwin: Distributed and adaptive reputation mechanism for wireless networks
-
J. Jaramillo and R. Srikant, "DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Networks," Proc. ACM MobiCom, 2007
-
(2007)
Proc. ACM MobiCom
-
-
Jaramillo, J.1
Srikant, R.2
-
10
-
-
41549123255
-
Message dropping attacks in overlay networks: Attack detection and attacker identification,"
-
Mar
-
L. Xie and S. Zhu, "Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification," ACM Trans. Information and System Security, vol. 11, no. 3, pp. 1-10, Mar. 2008
-
(2008)
ACM Trans. Information and System Security
, vol.11
, Issue.3
, pp. 1-10
-
-
Xie, L.1
Zhu, S.2
-
11
-
-
83355168470
-
Market sharing games applied to content distribution in ad-hoc networks
-
M.X. Goemans et al., "Market Sharing Games Applied to Content Distribution in Ad-Hoc Networks," Proc. ACM MobiHoc, 2004
-
(2004)
Proc. ACM MobiHoc
-
-
Goemans, M.X.1
-
12
-
-
76849107541
-
Fleanet: A virtual market place on vehicular networks
-
Jan
-
U. Lee, J. Lee, J.S. Park, and M. Gerla, "FleaNet: A Virtual Market Place on Vehicular Networks," IEEE Trans. Vehicular Technology, vol. 59, no. 1, pp. 344-355, Jan. 2010
-
(2010)
IEEE Trans. Vehicular Technology
, vol.59
, Issue.1
, pp. 344-355
-
-
Lee, U.1
Lee, J.2
Park, J.S.3
Gerla, M.4
-
13
-
-
84856150366
-
Roadcast: A popularity aware content sharing scheme in vanets,"
-
Y. Zhang, J. Zhao, and G. Cao, "Roadcast: A Popularity Aware Content Sharing Scheme in VANETs," ACM Mobile Computing and Comm. Rev., vol. 13, no. 4, pp. 1-14, 2010
-
(2010)
ACM Mobile Computing and Comm. Rev.
, vol.13
, Issue.4
, pp. 1-14
-
-
Zhang, Y.1
Zhao, J.2
Cao, G.3
-
14
-
-
85014176454
-
Adtorrent: Delivering location cognizant advertisements to car networks
-
Jan
-
A. Nandan, S. Tewari, S. Das, M. Gerla, and L. Kleinrock, "AdTorrent: Delivering Location Cognizant Advertisements to Car Networks," Proc. Third Int'l Conf. Wireless on Demand Network Systems and Services (WONS), Jan. 2006
-
(2006)
Proc. Third Int'l Conf. Wireless on Demand Network Systems and Services (WONS)
-
-
Nandan, A.1
Tewari, S.2
Das, S.3
Gerla, M.4
Kleinrock, L.5
-
15
-
-
63449110577
-
Contentplace: Social- aware data dissemination in opportunistic networks
-
C. Boldrini, M. Conti, and A. Passarella, "ContentPlace: Social- Aware Data Dissemination in Opportunistic Networks," Proc. ACM 11th Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2008
-
(2008)
Proc. ACM 11th Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
-
-
Boldrini, C.1
Conti, M.2
Passarella, A.3
-
16
-
-
60149093909
-
Ditto: A system for opportunistic caching in multi- hop wireless networks
-
F.R. Dogar, A. Phanishayee, H. Pucha, O. Ruwase, and D.G. Andersen, "Ditto: A System for Opportunistic Caching in Multi- Hop Wireless Networks," Proc. ACM MobiCom, 2008
-
(2008)
Proc. ACM MobiCom
-
-
Dogar, F.R.1
Phanishayee, A.2
Pucha, H.3
Ruwase, O.4
Andersen, D.G.5
-
17
-
-
36949037934
-
Bubblestorm: Resilient, probabilistic, and exhaustive peer-to- peer search
-
W.W. Terpstra, J. Kangasharju, C. Leng, and A.P. Buchmann, "BubbleStorm: Resilient, Probabilistic, and Exhaustive Peer-to- Peer Search," Proc. ACM SIGCOMM, 2007
-
(2007)
Proc. ACM SIGCOMM
-
-
Terpstra, W.W.1
Kangasharju, J.2
Leng, C.3
Buchmann, A.P.4
-
19
-
-
15244362024
-
Ad hoc networking with directional antennas: A complete system solution
-
DOI 10.1109/JSAC.2004.842556
-
R. Ramanathan, J. Redi, C. Santivanez, D. Wiggins, and S. Polit, "Ad Hoc Networking with Directional Antennas: A Complete System Solution," IEEE J. Selected Areas in Comm., vol. 23, no. 3, pp. 496-506, Mar. 2005 (Pubitemid 40384340)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 496-506
-
-
Ramanathan, R.1
Redi, J.2
Santivanez, C.3
Wiggins, D.4
Polit, S.5
-
21
-
-
4243538342
-
-
technical report, US Patent 6
-
M.D. Lillibridge, M. Adabi, K. Bharat, and A. Broder, "Method for Selectively Restricting Access to Computer Systems," technical report, US Patent 6,195,698, 2001
-
(2001)
Method for Selectively Restricting Access to Computer Systems
, vol.195
, pp. 698
-
-
Lillibridge, M.D.1
Adabi, M.2
Bharat, K.3
Broder, A.4
-
22
-
-
23444452364
-
Ieee 802.11 rate adaptation: A practical approach
-
Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
-
M. Lacage, M.H. Manshaei, and T. Turletti, "IEEE 802.11 Rate Adaptation: A Practical Approach," Proc. Seventh ACM Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2004
-
(2004)
Proc. Seventh ACM Int'l Symp. Modeling
-
-
Lacage, M.1
Manshaei, M.H.2
Turletti, T.3
|