-
1
-
-
84860886202
-
Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges
-
M. Khabbaz, C. Assi and W. Fawaz, "Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges," IEEE Communications Surveys & Tutorials, 14(2):607-640, 2012.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.2
, pp. 607-640
-
-
Khabbaz, M.1
Assi, C.2
Fawaz, W.3
-
2
-
-
84872146396
-
From delay-tolerant networks to vehicular delay-tolerant networks
-
Fourth Quarter
-
P. Pereira, A. Casaca, J. Rodrigues, V. Soares, J. Triay, C. Cervello-Pastor, "From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks," IEEE Communications Surveys & Tutorials, vol.14, no.4, pp.1166-1182, Fourth Quarter 2012.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.4
, pp. 1166-1182
-
-
Pereira, P.1
Casaca, A.2
Rodrigues, J.3
Soares, V.4
Triay, J.5
Cervello-Pastor, C.6
-
3
-
-
77956540791
-
A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks
-
Jun
-
G. Dini and A. Lo Duca, "A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks," In Proc. IEEE Symposium on Computers and Communications (ISCC), pp.772-777, Jun. 2010.
-
(2010)
Proc. IEEE Symposium on Computers and Communications (ISCC)
, pp. 772-777
-
-
Dini, G.1
Lo Duca, A.2
-
4
-
-
70349684505
-
Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets
-
Apr
-
F. Li, J. Wu and A. Srinivasan, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets," In Proc. IEEE INFOCOM, pp.2428-2436, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM
, pp. 2428-2436
-
-
Li, F.1
Wu, J.2
Srinivasan, A.3
-
5
-
-
70849094080
-
Controlling resource hogs in mobile delaytolerant networks
-
Jan
-
J. Solis, N. Asokan, K. Kostiainen, P. Ginzboorg, and J. Ott., "Controlling resource hogs in mobile delaytolerant networks," Computer Communications, vol. 33, pp. 2-10, Jan. 2010.
-
(2010)
Computer Communications
, vol.33
, pp. 2-10
-
-
Solis, J.1
Asokan, N.2
Kostiainen, K.3
Ginzboorg, P.4
Ott, J.5
-
8
-
-
0003902865
-
Epidemic routing for partially connected ad hoc networks
-
Duke University, Apr
-
A. Vahdat and D. Becker, "Epidemic routing for partially connected ad hoc networks," Technical Report CS-200006, Duke University, Apr. 2000.
-
(2000)
Technical Report CS-200006
-
-
Vahdat, A.1
Becker, D.2
-
10
-
-
21244498280
-
The case for technology in developing regions
-
Jun
-
Eric Brewer, et al., "The Case for Technology in Developing Regions," IEEE Computer, vol. 38, no. 6, pp. 25-38, Jun. 2005
-
(2005)
IEEE Computer
, vol.38
, Issue.6
, pp. 25-38
-
-
Brewer, E.1
-
16
-
-
80052765349
-
Effect of non-cooperative nodes in mobile DTNs
-
Jun
-
A. Keranen, M. Pitkanen, M. Vuori and J. Ott, "Effect of non-cooperative nodes in mobile DTNs," In Proc. 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp.1-7, Jun. 2011.
-
(2011)
Proc. 2011 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
, pp. 1-7
-
-
Keranen, A.1
Pitkanen, M.2
Vuori, M.3
Ott, J.4
-
17
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Jan.-Mar
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Transactions on Dependable and Secure Computing, vol 1, no. 1, pp. 11-33, Jan.-Mar. 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
|