-
1
-
-
80053019313
-
Comparative performance evaluation of routing algorithms in IEEE 802.15.4 and IEEE 802.11 with different ad hoc routing protocol
-
DOI: 10.3844/jcssp.2011.731.73
-
Anitha, P. and C. Chandrasekar, 2011. Comparative performance evaluation of routing algorithms in IEEE 802.15.4 and IEEE 802.11 with different ad hoc routing protocol. J. Comput. Sci., 7: 731-735. DOI: 10.3844/jcssp.2011.731.73
-
(2011)
J. Comput. Sci.
, vol.7
, pp. 731-735
-
-
Anitha, P.1
Chandrasekar, C.2
-
5
-
-
84890392533
-
-
(TC'13)
-
Gardner-Stephen, P., A. Bettison, D. Gardner-Stephen, R. Challans and J. Lakeman et al., 2013. Proceedings of the IEEE Global Human-Itarian Technology Conference, (TC'13).
-
(2013)
Proceedings of the IEEE Global Human-Itarian Technology Conference
-
-
Gardner-Stephen, P.1
Bettison, A.2
Gardner-Stephen, D.3
Challans, R.4
Lakeman, J.5
-
6
-
-
84890396568
-
MeshMS: Ad Hoc data transfer within mesh network
-
DOI: 10.4236/ijcns.2012.58060
-
Gardner-Stephen, P., J. Lakeman, R. Challans, C. Wallis and A. Stulman et al., 2012. MeshMS: Ad Hoc data transfer within mesh network. Int. J. Commun. Network Syst. Sci., 5: 498-504. DOI: 10.4236/ijcns.2012.58060
-
(2012)
Int. J. Commun. Network Syst. Sci.
, vol.5
, pp. 498-504
-
-
Gardner-Stephen, P.1
Lakeman, J.2
Challans, R.3
Wallis, C.4
Stulman, A.5
-
10
-
-
84864273340
-
Ron was wrong, Whit is right
-
Report 2012/064
-
Lenstra, A., J. Hughes, M. Augier, J. Bos and T. Kleinjung et al., 2012. Ron was wrong, Whit is right. Cryptology ePrint Archive, Report 2012/064.
-
(2012)
Cryptology ePrint Archive
-
-
Lenstra, A.1
Hughes, J.2
Augier, M.3
Bos, J.4
Kleinjung, T.5
-
11
-
-
37849034361
-
Quantifying the cost of context switch
-
Jun. 13-14, ACM New York, USA
-
Li, C., C. Ding and K. Shen, 2007. Quantifying the cost of context switch. Proceedings of the Workshop on Experimental Computer Science, Jun. 13-14, ACM New York, USA.
-
(2007)
Proceedings of the Workshop on Experimental Computer Science
-
-
Li, C.1
Ding, C.2
Shen, K.3
-
12
-
-
84880119189
-
Trust based node replication attack detection protocol for wireless sensor networks
-
DOI: 10.3844/jcssp.2012.1880.1888
-
Manjula, V. and C. Chellappan, 2012. Trust based node replication attack detection protocol for wireless sensor networks. J. Comput. Sci., 8: 1880-1888. DOI: 10.3844/jcssp.2012.1880.1888
-
(2012)
J. Comput. Sci.
, vol.8
, pp. 1880-1888
-
-
Manjula, V.1
Chellappan, C.2
-
14
-
-
79951946016
-
Network coding meets TCP: Theory and Implementation
-
DOI: 10.1109/JPROC.2010.2093850
-
Sundararajan, J.K., D. Shah, M. Medard, S. Jakubczak and M. Mitzenmacher et al., 2011. Network coding meets TCP: Theory and Implementation. Proc. IEEE 99: 490-512. DOI: 10.1109/JPROC.2010.2093850
-
(2011)
Proc. IEEE
, vol.99
, pp. 490-512
-
-
Sundararajan, J.K.1
Shah, D.2
Medard, M.3
Jakubczak, S.4
Mitzenmacher, M.5
|