-
1
-
-
33846911348
-
Cognitive networks: Adaptation and learning to achieve end-to-end performance objectives
-
R.W. Thomas, D.H. Friend, L.A. DaSilva, and A.B. MacKenzie Cognitive networks: adaptation and learning to achieve end-to-end performance objectives IEEE Communications Magazine, Topics in Radio Communications 44 12 2006 51 57
-
(2006)
IEEE Communications Magazine, Topics in Radio Communications
, vol.44
, Issue.12
, pp. 51-57
-
-
Thomas, R.W.1
Friend, D.H.2
Dasilva, L.A.3
Mackenzie, A.B.4
-
2
-
-
0034836562
-
Algorithms, Games, and the Internet
-
Crete, Greece, 6-8 July
-
C.H. Papadimitriou, Algorithms, Games, and the Internet, in: Proc. 33rd Annual ACM Symposium on Theory of Computing, Hersonissos, Crete, Greece, 6-8 July 2001, pp. 749-753.
-
(2001)
Proc. 33rd Annual ACM Symposium on Theory of Computing, Hersonissos
, pp. 749-753
-
-
Papadimitriou, C.H.1
-
9
-
-
33749336413
-
Access control in ad hoc networks with selfish nodes
-
D. Zhao Access control in ad hoc networks with selfish nodes Wireless Communications and Mobile Computing 6 6 2006 761 772
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.6
, pp. 761-772
-
-
Zhao, D.1
-
12
-
-
18144390158
-
Impact of selfish nodes on route discovery in mobile ad hoc networks
-
29 November-3 December
-
Q. Zhang, and D.P. Agrawal Impact of selfish nodes on route discovery in mobile ad hoc networks IEEE Global Telecommunications Conference 5 2004 2914 2918 29 November-3 December
-
(2004)
IEEE Global Telecommunications Conference
, vol.5
, pp. 2914-2918
-
-
Zhang, Q.1
Agrawal, D.P.2
-
13
-
-
33749513451
-
A Reputation-based mechanism for isolating selfish nodes in ad hoc networks
-
17-21 July
-
M.T. Refaei, S. Vivek, L. DaSilva, M. Eltoweissy, A Reputation-based mechanism for isolating selfish nodes in ad hoc networks, in: Proc. 2nd Annual Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services, 17-21 July 2005, pp. 3-11.
-
(2005)
Proc. 2nd Annual Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services
, pp. 3-11
-
-
Refaei, M.T.1
Vivek, S.2
Dasilva, L.3
Eltoweissy, M.4
-
14
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
-
Q. He, D. Wu, and P. Khosla SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks IEEE Wireless Communications and Networking Conference 2 2004 2004 825 830
-
(2004)
IEEE Wireless Communications and Networking Conference
, vol.2
, Issue.2004
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
15
-
-
21144452079
-
Collaborative trust-based secure routing in multi-hop ad hoc networks
-
Athens, Greece 9-14 May 2004
-
N. Pisinou, T. Ghosh, K. Makki, Collaborative trust-based secure routing in multi-hop ad hoc networks, in: Proc. 3rd Int'l IFIP-TC06 Networking Conf., Lecture Notes in Computer Science: Networking 2004, Athens, Greece, vol. 3042, 9-14 May 2004, pp. 1446-1451.
-
Proc. 3rd Int'l IFIP-TC06 Networking Conf., Lecture Notes in Computer Science: Networking 2004
, vol.3042
, pp. 1446-1451
-
-
Pisinou, N.1
Ghosh, T.2
Makki, K.3
-
16
-
-
47049106826
-
An efficient scheme to motivate cooperation in mobile ad hoc networks
-
Athens, Greece, 19-25 June
-
S. Soltanali, S. Pirahesh, S. Niksefat, M. Sabaei, An efficient scheme to motivate cooperation in mobile ad hoc networks, in: Int'l Conf. on Networking and Services, Athens, Greece, 19-25 June 2007, pp. 98-103.
-
(2007)
Int'l Conf. on Networking and Services
, pp. 98-103
-
-
Soltanali, S.1
Pirahesh, S.2
Niksefat, S.3
Sabaei, M.4
-
17
-
-
63449117720
-
TSR: Trust-based secure MANET routing using HMMs
-
Vancouver, British Columbia, Canada, 27-28 October 2008
-
M.E.G. Moe, B.E. Helvik, S.J. Knapskog, TSR: trust-based secure MANET routing using HMMs, in: Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, 27-28 October 2008, pp. 83-90.
-
Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks
, pp. 83-90
-
-
Moe, M.E.G.1
Helvik, B.E.2
Knapskog, S.J.3
-
18
-
-
28444452986
-
Calculating a node's reputation in a mobile ad hoc network
-
Phoenix, AX, 7-9 April
-
W.J. Adams, G.C. Hadjichristofi, N.J. Davis, Calculating a node's reputation in a mobile ad hoc network, in: Proc. 24th IEEE Int'l Performance Computing and Communications Conf., Phoenix, AX, 7-9 April 2005, pp. 303-307.
-
(2005)
Proc. 24th IEEE Int'l Performance Computing and Communications Conf.
, pp. 303-307
-
-
Adams, W.J.1
Hadjichristofi, G.C.2
Davis, N.J.3
-
19
-
-
77956353388
-
Trust management in mobile ad hoc networks using a scalable maturity-based model
-
P.B. Velloso, R.P. Laufer, D. Cunha, O.C.M.B. Duarte, and G. Pujolle Trust management in mobile ad hoc networks using a scalable maturity-based model IEEE Transactions on Network and Service Management 7 3 2010 172 185
-
(2010)
IEEE Transactions on Network and Service Management
, vol.7
, Issue.3
, pp. 172-185
-
-
Velloso, P.B.1
Laufer, R.P.2
Cunha, D.3
Duarte, O.C.M.B.4
Pujolle, G.5
-
20
-
-
70749147824
-
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
-
Vancouver, Canada, August
-
J.H. Cho, A. Swami, I.R. Chen, Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks, in: 2009 IEEE/IFIP Int'l Symposium on Trusted Computing and Communications, vol. 2, Vancouver, Canada, August 2009, pp. 641-650.
-
(2009)
2009 IEEE/IFIP Int'l Symposium on Trusted Computing and Communications
, vol.2
, pp. 641-650
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
21
-
-
29844445026
-
Cooperation in wireless ad hoc networks: A market-based approach
-
P. Marbach, and Y. Qiu Cooperation in wireless ad hoc networks: a market-based approach IEEE/ACM Transactions on Networking 13 6 2005 1325 1338
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.6
, pp. 1325-1338
-
-
Marbach, P.1
Qiu, Y.2
-
22
-
-
3543059320
-
Telecommunications demand and pricing structure: An economic analysis
-
M. Aldebert, M. Ivaldi, and C. Roucolle Telecommunications demand and pricing structure: an economic analysis Telecommunication Systems 25 1-2 Jan. 2004 89 115
-
(2004)
Telecommunication Systems
, vol.25
, Issue.12
, pp. 89-115
-
-
Aldebert, M.1
Ivaldi, M.2
Roucolle, C.3
-
23
-
-
58149488760
-
Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
-
O. Yilmaz, and I.R. Chen Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks Computer Communications 32 2 2009 317 323
-
(2009)
Computer Communications
, vol.32
, Issue.2
, pp. 317-323
-
-
Yilmaz, O.1
Chen, I.R.2
-
24
-
-
75449115811
-
Household demand for wireless telephony: An empirical analysis
-
Arlington, VA, September
-
P. Rappaport, J. Alleman, L.D. Taylor, Household demand for wireless telephony: an empirical analysis, in: Proc. 31st Annual Telecommunications Policy Research Conf., Arlington, VA, September 2003.
-
(2003)
Proc. 31st Annual Telecommunications Policy Research Conf.
-
-
Rappaport, P.1
Alleman, J.2
Taylor, L.D.3
-
25
-
-
66149110472
-
Pricing to stimulate node cooperation in wireless ad hoc networks
-
M. Li, E. Kamioka, and S. Yanada Pricing to stimulate node cooperation in wireless ad hoc networks IEICE Transactions on Communications E90-B 7 2007 1640 1650
-
(2007)
IEICE Transactions on Communications
, vol.90 E -B
, Issue.7
, pp. 1640-1650
-
-
Li, M.1
Kamioka, E.2
Yanada, S.3
-
26
-
-
51349109297
-
Pricing, competition, and routing for selfish and strategic nodes in multi-hop relay networks
-
13-18 April
-
Y. Xi, E.M. Yeh, Pricing, competition, and routing for selfish and strategic nodes in multi-hop relay networks, in: INFOCOM 2008, 27th Conf. on Computer Communications, 13-18 April 2008, pp. 1463-1471.
-
(2008)
INFOCOM 2008, 27th Conf. on Computer Communications
, pp. 1463-1471
-
-
Xi, Y.1
Yeh, E.M.2
-
27
-
-
33749514149
-
Market models and pricing mechanisms in a multihop wireless hotspot network
-
17-21 July
-
K. Chen, Z. Yang, C. Wagener, K. Nahrstedft, Market models and pricing mechanisms in a multihop wireless hotspot network, in: 2nd Annual Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services, 17-21 July 2005, pp. 73-82.
-
(2005)
2nd Annual Int'l Conf. on Mobile and Ubiquitous Systems: Networking and Services
, pp. 73-82
-
-
Chen, K.1
Yang, Z.2
Wagener, C.3
Nahrstedft, K.4
-
28
-
-
70749134483
-
Toward a human trust model for mobile ad-hoc networks
-
5-7 May 2004, Cambridge University, Cambridge, UK
-
L. Capra, Toward a human trust model for mobile ad-hoc networks, in: Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge, UK.
-
Proc. 2nd UK-UbiNet Workshop
-
-
Capra, L.1
-
29
-
-
33746348149
-
On sensor network lifetime and data distortion
-
Adelaide, South Australia, 4-9 September
-
A. Kansal, A. Ramamoorthy, M.B. Srivastava, G.J. Pottie, On sensor network lifetime and data distortion, in: Int'l Symposium on Information Theory, Adelaide, South Australia, 4-9 September 2005, pp. 6-10.
-
(2005)
Int'l Symposium on Information Theory
, pp. 6-10
-
-
Kansal, A.1
Ramamoorthy, A.2
Srivastava, M.B.3
Pottie, G.J.4
-
32
-
-
84885298406
-
Modeling and analysis of trust management protocols: Altruism versus selfishness in MANETs
-
M. Nishigaki, A. Jøsang, Y. Murayama, S. Marsh (Eds.) Morioka, Japan, 14-18 June 2010; Trust Management IV, IFIP Advances in Information and Communication Technology, Springer
-
J.H. Cho, A. Swami, I.R. Chen, Modeling and analysis of trust management protocols: altruism versus selfishness in MANETs, in: M. Nishigaki, A. Jøsang, Y. Murayama, S. Marsh (Eds.), 4th IFIP Int'l Conf. on Trust Management, Morioka, Japan, 14-18 June 2010; Trust Management IV, IFIP Advances in Information and Communication Technology, Springer, 2010, vol. 321, pp. 141-15.
-
(2010)
4th IFIP Int'l Conf. on Trust Management
, vol.321
, pp. 141-215
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
33
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, August
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. 6th Annual ACM/IEEE Mobile Computing and Networking, Boston, MA, August 2000, pp. 255-265.
-
(2000)
Proc. 6th Annual ACM/IEEE Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
34
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
F. Bao, I.R. Chen, M. Chang, and J.H. Cho Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection IEEE Transactions on Network and Service Management 9 2 2012 169 183
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
Chen, I.R.2
Chang, M.3
Cho, J.H.4
-
35
-
-
79958778609
-
Dirichlet-based trust management for effective collaborative intrusion detection networks
-
C.J. Fung, J. Zhang, I. Aib, and R. Boutaba Dirichlet-based trust management for effective collaborative intrusion detection networks IEEE Transactions on Networks and Service Management 8 2 2011 79 91
-
(2011)
IEEE Transactions on Networks and Service Management
, vol.8
, Issue.2
, pp. 79-91
-
-
Fung, C.J.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
37
-
-
0024908784
-
SPNP: Stochastic petri net package
-
G. Ciardo, J. Muppala, K. Trivedi, SPNP: stochastic petri net package, in: 3rd Int'l Workshop on Petri Nets and Performance Models, December 1989, pp. 142-151.
-
(1989)
3rd Int'l Workshop on Petri Nets and Performance Models, December
, pp. 142-151
-
-
Ciardo, G.1
Muppala, J.2
Trivedi, K.3
-
38
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
New Delhi, India, January
-
M. Steiner, G. Tsudik, M. Waidner, Diffie-Hellman key distribution extended to group communication, in: Proc. 3rd ACM Conf. on Computer and Communications Security, New Delhi, India, January 1996, pp. 31-37.
-
(1996)
Proc. 3rd ACM Conf. on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
39
-
-
0041878888
-
-
M.J. Skinner, P.A. Simpson, Workload Issues in Military Tactical Airlift, vol. 12, no. 1, 2002, pp. 79-93.
-
(2002)
Workload Issues in Military Tactical Airlift
, vol.12
, Issue.1
, pp. 79-93
-
-
Skinner, M.J.1
Simpson, P.A.2
-
40
-
-
84885314571
-
-
Military Missions: Strategic Concept, US Army Corps of Engineers, Department of the Army, January 2012
-
Military Missions: Strategic Concept, US Army Corps of Engineers, Department of the Army, January 2012.
-
-
-
-
41
-
-
84886599313
-
Two-fold pricing to guarantee individual profits and maximum social welfare in wireless access networks
-
A. Rad, V. Wong, V. Leung, Two-fold pricing to guarantee individual profits and maximum social welfare in wireless access networks, in: IEEE Global Telecommunications Conf., 2008, pp. 1-6.
-
(2008)
IEEE Global Telecommunications Conf.
, pp. 1-6
-
-
Rad, A.1
Wong, V.2
Leung, V.3
-
42
-
-
79957696830
-
Information and communications systems for control-by-price of distributed energy resources and flexible demand
-
P. Nyeung, and J. Ostergaard Information and communications systems for control-by-price of distributed energy resources and flexible demand IEEE Transactions on Smart Grid 2 2 2011 334 341
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.2
, pp. 334-341
-
-
Nyeung, P.1
Ostergaard, J.2
-
45
-
-
0037709592
-
CReliability of systems with fuzzy-failure criterion
-
Anaheim, CA, USA, January
-
F.B. Bastani, I.R. Chen, T. Tsao, Reliability of systems with fuzzy-failure criterion, in: Annual Reliability and Maintainability Symposium, Anaheim, CA, USA, January 1994, pp. 442-448.
-
(1994)
Annual Reliability and Maintainability Symposium
, pp. 442-448
-
-
Bastani, F.B.1
Chen, I.R.2
Tsao, T.3
-
46
-
-
17744373901
-
Simulation modeling requirements for determining soldier tactical mission system effectiveness
-
E.S. Tollefson, M.J. Kwinn, P.G. Martin, G.G. Boylan, B.L. Foote, Simulation modeling requirements for determining soldier tactical mission system effectiveness, in: Proc. 2004 Winter Simulation Conf., vol. 1, 2004.
-
(2004)
Proc. 2004 Winter Simulation Conf.
, vol.1
-
-
Tollefson, E.S.1
Kwinn, M.J.2
Martin, P.G.3
Boylan, G.G.4
Foote, B.L.5
-
47
-
-
77958543058
-
Secure health monitoring using medical wireless sensor networks
-
P. Kumar, Y.-D. Lee, H. Lee, Secure health monitoring using medical wireless sensor networks, in: 6th Int'l Conf. on Networked Computing and Advanced, Information Management, 2010, pp. 491-494.
-
(2010)
6th Int'l Conf. on Networked Computing and Advanced, Information Management
, pp. 491-494
-
-
Kumar, P.1
Lee, Y.-D.2
Lee, H.3
-
48
-
-
33646918131
-
Telos: Enabling ultra-low power wireless research
-
J. Polastre, R. Szewczyk, D.E. Culler, Telos: enabling ultra-low power wireless research, in: 4th Int'l Symposium on Information Processing in Sensor, Networks, 2005, pp. 364-369.
-
(2005)
4th Int'l Symposium on Information Processing in Sensor, Networks
, pp. 364-369
-
-
Polastre, J.1
Szewczyk, R.2
Culler, D.E.3
-
49
-
-
84857377326
-
ATmega and XBee-based wireless sensing
-
A.H. Kioumars, L. Tang, ATmega and XBee-based wireless sensing, in: 5th Int'l Conf. on Automation, Robotics and Applications, 2011, pp. 351-356.
-
(2011)
5th Int'l Conf. on Automation, Robotics and Applications
, pp. 351-356
-
-
Kioumars, A.H.1
Tang, L.2
-
50
-
-
84879899363
-
-
February 1997, HMAC: Keyed-Hashing for Message Authentication, Network Working Group
-
H. Krawczyk, M. Bellare, R. Canetti, Request for Comments (RFC)-2104, February 1997, HMAC: Keyed-Hashing for Message Authentication, Network Working Group.
-
Request for Comments (RFC)-2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
51
-
-
50249157184
-
-
Swiss Federal Institute of Technology (EPFL) School of Computer and Communication Sciences, Technical, Report IC/2003/20
-
F.C. Gärtner, "Byzantine Failures and Security: Arbitrary is Not (always) Random", Swiss Federal Institute of Technology (EPFL) School of Computer and Communication Sciences, Technical, Report IC/2003/20, 2003.
-
(2003)
Byzantine Failures and Security: Arbitrary Is Not (Always) Random
-
-
Gärtner, F.C.1
|