-
1
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems
-
jul.
-
S. Buchegger and J.-Y. Le Boudee. Self-policing mobile ad hoc networks by reputation systems. Communications Magazine, IEEE, 43(7):101 - 107, jul. 2005.
-
(2005)
Communications Magazine, IEEE
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudee, J.-Y.2
-
2
-
-
70350534268
-
Crossing over the bounded domain: From exponential to power-law intermeeting time in mobile ad hoc networks
-
oct.
-
H. Cai and D. Y. Eun. Crossing over the bounded domain: From exponential to power-law intermeeting time in mobile ad hoc networks. Networking, IEEE/ACM Transactions on, 17(5):1578 -1591, oct. 2009.
-
(2009)
Networking, IEEE/ACM Transactions on
, vol.17
, Issue.5
, pp. 1578-1591
-
-
Cai, H.1
Eun, D.Y.2
-
3
-
-
34247596905
-
Impact of human mobility on opportunistic forwarding algorithms
-
Jun
-
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6:606-620, Jun 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, pp. 606-620
-
-
Chaintreau, A.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
Gass, R.5
Scott, J.6
-
4
-
-
70450161107
-
Multicasting in delay tolerant networks: A social network perspective
-
W. Gao, Q. Li, B. Zhao, and G. Cao. Multicasting in delay tolerant networks: a social network perspective. In Proceedings of MobiHoc '09, pages 299-308, 2009.
-
(2009)
Proceedings of MobiHoc '09
, pp. 299-308
-
-
Gao, W.1
Li, Q.2
Zhao, B.3
Cao, G.4
-
5
-
-
24144497473
-
The message delay in mobile ad hoc networks
-
October
-
R. Groenevelt, P. Nain, and G. Koole. The message delay in mobile ad hoc networks. Performance Evaluation, 62:210-228, October 2005.
-
(2005)
Performance Evaluation
, vol.62
, pp. 210-228
-
-
Groenevelt, R.1
Nain, P.2
Koole, G.3
-
6
-
-
84861188669
-
Improving selfish node detection in manets using a collaborative watchdog
-
E. Hernández-Orallo, M. D. Serrat, J.-C. Cano, C. M. T. Calafate, and P. Manzoni. Improving selfish node detection in manets using a collaborative watchdog. IEEE Communications Letters, 16(5):642-645, 2012.
-
(2012)
IEEE Communications Letters
, vol.16
, Issue.5
, pp. 642-645
-
-
Hernández-Orallo, E.1
Serrat, M.D.2
Cano, J.-C.3
Calafate, C.M.T.4
Manzoni, P.5
-
7
-
-
4143078294
-
On the effect of node misbehavior in ad hoc networks
-
M. Hollick, J. Schmitt, C. Seipl, and R. Steinmetz. On the effect of node misbehavior in ad hoc networks. In Proceedings of IEEE International Conference on Communications, ICC'04, pages 3759-3763, 2004.
-
(2004)
Proceedings of IEEE International Conference on Communications, ICC'04
, pp. 3759-3763
-
-
Hollick, M.1
Schmitt, J.2
Seipl, C.3
Steinmetz, R.4
-
8
-
-
84866347940
-
Black hole attacks in p2p mobile networks discovered through bayesian filters
-
J. Hortelano, J.-C. Cano, C. T. Calafate, M. de Leoni, P. Manzoni, and M. Mecella. Black hole attacks in p2p mobile networks discovered through bayesian filters. In In P2P Collaborative Distributed Virtual Environments (P2P CDVE 2010), 2010.
-
(2010)
P2P Collaborative Distributed Virtual Environments (P2P CDVE 2010)
-
-
Hortelano, J.1
Cano, J.-C.2
Calafate, C.T.3
De Leoni, M.4
Manzoni, P.5
Mecella, M.6
-
10
-
-
37749052702
-
Power law and exponential decay of inter contact times between mobile devices
-
ACM
-
T. Karagiannis, J.-Y. Le Boudec, and M. Vojnović. Power law and exponential decay of inter contact times between mobile devices. In Proceedings of MobiCom '07, pages 183-194. ACM, 2007.
-
(2007)
Proceedings of MobiCom '07
, pp. 183-194
-
-
Karagiannis, T.1
Le Boudec, J.-Y.2
Vojnović, M.3
-
11
-
-
73449145700
-
Assessing the vulnerability of dtn data relaying schemes to node selfishness
-
december
-
M. Karaliopoulos. Assessing the vulnerability of dtn data relaying schemes to node selfishness. Communications Letters, IEEE, 13(12):923 -925, december 2009.
-
(2009)
Communications Letters, IEEE
, vol.13
, Issue.12
, pp. 923-925
-
-
Karaliopoulos, M.1
-
12
-
-
23944483569
-
Advanced detection of selfish or malicious nodes in ad hoc networks
-
Springer Verlag
-
F. Kargl, A. Klenk, S. Schlott, and M. Weber. Advanced detection of selfish or malicious nodes in ad hoc networks. In In Proceedings of the 1st European on Security in Ad-Hoc and Sensor Networks, pages 152-165. Springer Verlag, 2004.
-
(2004)
Proceedings of the 1st European on Security in Ad-Hoc and Sensor Networks
, pp. 152-165
-
-
Kargl, F.1
Klenk, A.2
Schlott, S.3
Weber, M.4
-
13
-
-
79959276613
-
The impact of node selfishness on multicasting in delay tolerant networks
-
jun
-
Y. Li, G. Su, D. Wu, D. Jin, L. Su, and L. Zeng. The impact of node selfishness on multicasting in delay tolerant networks. Vehicular Technology, IEEE Transactions on, 60(5):2224 -2238, jun 2011.
-
(2011)
Vehicular Technology, IEEE Transactions on
, vol.60
, Issue.5
, pp. 2224-2238
-
-
Li, Y.1
Su, G.2
Wu, D.3
Jin, D.4
Su, L.5
Zeng, L.6
-
14
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MobiCom '00, pages 255-265, 2000.
-
(2000)
Proceedings of MobiCom '00
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
0036969459
-
Context aware detection of selfish nodes in dsr based ad-hoc networks
-
K. Paul and D. Westhoff. Context aware detection of selfish nodes in dsr based ad-hoc networks. In In Proceedings of IEEE Globecom, 2002.
-
(2002)
Proceedings of IEEE Globecom
-
-
Paul, K.1
Westhoff, D.2
-
17
-
-
77952514808
-
The controversy of selfish nodes in ad hoc networks
-
feb.
-
C. Toh, D. Kim, S. Oh, and H. Yoo. The controversy of selfish nodes in ad hoc networks. In Proceeding of Advanced Communication Technology (ICACT), 2010, volume 2, pages 1087 -1092, feb. 2010.
-
(2010)
Proceeding of Advanced Communication Technology (ICACT), 2010
, vol.2
, pp. 1087-1092
-
-
Toh, C.1
Kim, D.2
Oh, S.3
Yoo, H.4
-
18
-
-
24144447883
-
A credit-payment scheme for packet forwarding fairness in mobile ad hoc networks
-
may
-
Y. Yoo, S. Ahn, and D. Agrawal. A credit-payment scheme for packet forwarding fairness in mobile ad hoc networks. In Proceedings of IEEE ICC, volume 5, pages 3005 - 3009 Vol. 5, may 2005.
-
(2005)
Proceedings of IEEE ICC, Volume 5
, vol.5
, pp. 3005-3009
-
-
Yoo, Y.1
Ahn, S.2
Agrawal, D.3
-
19
-
-
77953309373
-
Recognizing exponential inter-contact time in vanets
-
H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, and L. M. Ni. Recognizing exponential inter-contact time in vanets. In Proceedings of INFOCOM'10, pages 101-105, 2010.
-
(2010)
Proceedings of INFOCOM'10
, pp. 101-105
-
-
Zhu, H.1
Fu, L.2
Xue, G.3
Zhu, Y.4
Li, M.5
Ni, L.M.6
|