You are here

Bibliography

Export 31 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is ad-hoc networks  [Clear All Filters]
2009
Malarkodi B, Rakesh P, Venkataramani B. Performance Evaluation of On-Demand Multipath Distance Vector Routing Protocol under Different Traffic Models. In: International Conference on Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. ; 2009. pp. 77-80.
2008
Bauer K, McCoy D, Grunwald D, Sicker D. BitBlender: Light-Weight Anonymity for BitTorrent. In: Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Istanbul, Turkey: ACM; 2008. Available from: http://portal.acm.org/citation.cfm?id=1461465
Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. [Internet]. 2008 ;10:1–35. Available from: http://portal.acm.org/citation.cfm?id=1284680.1341892#
Moe MEG. Quantification of Anonymity for Mobile Ad Hoc Networks. In: Proceedings of the 4th International Workshop on Security and Trust Management (STM 08). Proceedings of the 4th International Workshop on Security and Trust Management (STM 08). Trondheim, Norway: Elsevier Science Publishers B. V. Amsterdam, The Netherlands, The Netherlands; 2008. pp. 25–36. Available from: http://portal.acm.org/citation.cfm?id=1619033
2006
Cramer C, Fuhrmann T. Bootstrapping Chord in Ad hoc Networks: Not Going Anywhere for a While. In: Proceedings of the 3rd IEEE International Workshop on Mobile Peer-to-Peer Computing. Proceedings of the 3rd IEEE International Workshop on Mobile Peer-to-Peer Computing. Pisa, Italy; 2006. Available from: http://i30www.ira.uka.de/research/publications/p2p/
Campo C, García-Rubio C. DNS-Based Service Discovery in Ad Hoc Networks: Evaluation and Improvements. Springer Berlin / Heidelberg; 2006. Available from: http://www.springerlink.com/content/m8322m1006416270/
Rahman SMM, Inomata A, Okamoto T, Mambo M. E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. In: In: Proceedings of the First International Conference on Ubiquitous Convergence Technology. In: Proceedings of the First International Conference on Ubiquitous Convergence Technology. Springer; 2006. pp. 131–140. Available from: http://www.springerlink.com/content/g6334148068w1254/
Anon. Scalable Routing in Sensor Actuator Networks with Churn. In: Sensor and Ad Hoc Communications and Networks, 2006. SECON '06. 2006 3rd Annual IEEE Communications Society on . Sensor and Ad Hoc Communications and Networks, 2006. SECON '06. 2006 3rd Annual IEEE Communications Society on . ; 2006. Available from: http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4068086%2F4068087%2F04068105.pdf%3Farnumber%3D4068105&authDecision=-203
Sun YL, Han Z, Yu W, Liu RKJ. A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. In: INFOCOM. INFOCOM. IEEE; 2006. Available from: http://dblp.uni-trier.de/db/conf/infocom/infocom2006.html#SunHYL06
2005
Widmer J. ABSTRACT Network Coding for Efficient Communication in Extreme Networks. [Internet]. 2005 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.5368
Bicket J, Aguayo D, Biswas S, Morris R. Architecture and evaluation of an unplanned 802.11b mesh network. In: MobiCom '05: Proceedings of the 11th annual international conference on Mobile computing and networking. MobiCom '05: Proceedings of the 11th annual international conference on Mobile computing and networking. New York, NY, USA: ACM; 2005. pp. 31–42. Available from: http://portal.acm.org/citation.cfm?id=1080833#
Aspelund T. Retrivability of data in ad-hoc backup. [Internet]. 2005 ;Master. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.141
Sailhan F, Issarny V. Scalable Service Discovery for MANET. In: PERCOM '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. PERCOM '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. Washington, DC, USA: IEEE Computer Society; 2005. pp. 235–244. Available from: http://portal.acm.org/citation.cfm?id=1049775#
Fuhrmann T. A Self-Organizing Routing Scheme for Random Networks. In: Proceedings of the 4th IFIP-TC6 Networking Conference. Proceedings of the 4th IFIP-TC6 Networking Conference. Waterloo, Canada: Springer Berlin / Heidelberg; 2005. pp. 1366–1370. Available from: http://i30www.ira.uka.de/research/publications/p2p/
Cramer C, Fuhrmann T. Self-Stabilizing Ring Networks on Connected Graphs. In: University of Karlsruhe (TH), Fakultaet fuer Informatik, Technical Report 2005-5; 2005. Available from: http://i30www.ira.uka.de/research/publications/p2p/
2003
Anderegg L, Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom '03: Proceedings of the 9th annual international conference on Mobile computing and networking. MobiCom '03: Proceedings of the 9th annual international conference on Mobile computing and networking. New York, NY, USA: ACM; 2003. pp. 245–259. Available from: http://portal.acm.org/citation.cfm?id=939011#
Salem NB, Buttyán L, Hubaux J-P, Jakobsson M. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. In: MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM; 2003. pp. 13–24. Available from: http://portal.acm.org/citation.cfm?id=778418#
Buchegger S, Boudec J-YL. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks. In: In Proceedings of WiOpt ‘03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks”, Sophia-Antipolis. In Proceedings of WiOpt ‘03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks”, Sophia-Antipolis. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9006
Anon. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing [Internet]. 2003 ;2:52–64. Available from: http://portal.acm.org/citation.cfm?id=766655.766661#
Klemm A, Klemm E, Lindemann C, Waldhorst OP. A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks. In: ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9634
Buttyán L, Hubaux J-P. Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. [Internet]. 2003 ;8(5):579–592. Available from: http://portal.acm.org/citation.cfm?id=942421#

Pages