-
2
-
-
85032668813
-
Macaw: A Media Access Protocol for Wireless Lans
-
Sept.
-
V. Bhargavan, A. Demers, S. Shenker, and L. Zhang, “Macaw: A Media Access Protocol for Wireless Lans,” Proc. ACM SigComm, Sept. 1994.
-
(1994)
Proc. ACM SigComm
-
-
Bhargavan, V.1
Demers, A.2
Shenker, S.3
Zhang, L.4
-
3
-
-
0037885580
-
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
-
Jan.
-
S. Buchegger and J. Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks,” Proc. 10th Euromicro Workshop Parallel, Distributed and Network-Based Processing, pp. 403–410, Jan. 2002.
-
(2002)
Proc. 10th Euromicro Workshop Parallel, Distributed and Network-Based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.2
-
6
-
-
3042520226
-
Report on a Working Session on Security in Wireless Ad Hoc Networks
-
L. Buttyan and J. H, eds. Nov.
-
“Report on a Working Session on Security in Wireless Ad Hoc Networks,” Mobile Computing and Comm. Rev., L. Buttyan and J. H, eds., vol. 6, no. 4, Nov. 2002.
-
(2002)
Mobile Computing and Comm. Rev
, vol.6
, Issue.4
-
-
-
9
-
-
0035701586
-
Robust Congestion Signaling
-
Nov.
-
D. Ely, N. Spring, D. Wetherall, S. Savage, and T. Anderson, “Robust Congestion Signaling,” Proc. 2001 Int'l Conf. Network Protocols, Nov. 2001.
-
(2001)
Proc. 2001 Int'l Conf. Network Protocols
-
-
Ely, D.1
Spring, N.2
Wetherall, D.3
Savage, S.4
Anderson, T.5
-
10
-
-
0004194997
-
Ns Notes and Documentation
-
LBL, USC/ISI, Xerox PARC
-
K. Fall and K. Varadhan, “Ns Notes and Documentation,” technical report, Univ. of California at Berkley, LBL, USC/ISI, Xerox PARC, 2002.
-
(2002)
technical report, Univ. of California at Berkley
-
-
Fall, K.1
Varadhan, K.2
-
11
-
-
84964425047
-
Characterizing Intrusion Tolerant Systems Using a State Transition Model
-
K. Goseva-Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K. Trivedi, and B. Muthusamy, “Characterizing Intrusion Tolerant Systems Using a State Transition Model,” Proc. DARPA Information Survivability Conf. and Exposition II, 2001.
-
(2001)
Proc. DARPA Information Survivability Conf. and Exposition II
-
-
Goseva-Popstojanova, K.1
Wang, F.2
Wang, R.3
Gong, F.4
Vaidyanathan, K.5
Trivedi, K.6
Muthusamy, B.7
-
14
-
-
0003531689
-
-
Technical Report ATM_Forum/96-1173, ATM Forum Document Aug.
-
R. Jain, G. Babic, B. Nagendra, and C. Lam, “Fairness, Call Establishment Latency and Other Performance Metrics,” Technical Report ATM_Forum/96-1173, ATM Forum Document, Aug. 1996.
-
(1996)
Fairness, Call Establishment Latency and Other Performance Metrics
-
-
Jain, R.1
Babic, G.2
Nagendra, B.3
Lam, C.4
-
16
-
-
0003294665
-
-
third ed. chapter 3 Addison-Wesley
-
D.E. Knuth, The Art of Computer Programming, third ed., vol. 2, chapter 3, pp. 10–17. Addison-Wesley, 2000.
-
(2000)
The Art of Computer Programming
, vol.2
, pp. 10-17
-
-
Knuth, D.E.1
-
18
-
-
1542328495
-
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
-
J. Konorski, “Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations,” Proc. Networking Conf, 2002.
-
(2002)
Proc. Networking Conf
-
-
Konorski, J.1
-
19
-
-
85008029715
-
Selfish Misbehavior at Medium Access Control Layer in Wireless Networks
-
master's thesis, Univ. of Illinois at Urbana-Champaign Dec.
-
P. Kyasanur, “Selfish Misbehavior at Medium Access Control Layer in Wireless Networks,” master's thesis, Univ. of Illinois at Urbana-Champaign, Dec. 2003.
-
(2003)
-
-
Kyasanur, P.1
-
21
-
-
0035508757
-
Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks
-
A.B. MacKenzie and S.B. Wicker, “Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks,” IEEE Comm. Magazine, vol. 39, no. 11, pp. 126–131, 2000.
-
(2000)
IEEE Comm. Magazine
, vol.39
, Issue.11
, pp. 126-131
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
22
-
-
0042474409
-
Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information
-
A.B. MacKenzie and S.B. Wicker, “Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information,” Proc. Infocom, 2003.
-
(2003)
Proc. Infocom
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
23
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. Mobile Computing and Networking Conf, pp. 255–265, 2000.
-
(2000)
Proc. Mobile Computing and Networking Conf
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
28
-
-
4243931532
-
Probabilistic Validation of Intrusion Tolerance
-
June
-
W.H. Sanders, M. Cukier, F. Webber, P. Pal, and R. Watro, “Probabilistic Validation of Intrusion Tolerance,” Digest of Fast Abstracts: The Int'l Conf. Dependable Systems and Networks, June 2002.
-
(2002)
Digest of Fast Abstracts: The Int'l Conf. Dependable Systems and Networks
-
-
Sanders, W.H.1
Cukier, M.2
Webber, F.3
Pal, P.4
Watro, R.5
-
29
-
-
0002098559
-
TCP Congestion Control with a Misbehaving Receiver
-
Oct.
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Congestion Control with a Misbehaving Receiver,” ACM Computer Comm. Rev., pp. 71–78, Oct. 1999.
-
(1999)
ACM Computer Comm. Rev.
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
32
-
-
4544324338
-
DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots
-
M. Raya, J.-P. Hubaux, and I. Aad, “DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots,” Proc. ACM Int'l Conf. Mobile Systems, Applications, and Services (MobiSys), 2004.
-
(2004)
Proc. ACM Int'l Conf. Mobile Systems, Applications, and Services (MobiSys)
-
-
Raya, M.1
Hubaux, J.-P.2
Aad, I.3
|