


default search action
Ad Hoc Networks, Volume 6
Volume 6, Number 1, January 2008
- Yingyue Xu, Hairong Qi:

Mobile agent migration modeling and design for target tracking in wireless sensor networks. 1-16 - Geneviève Arboit, Claude Crépeau, Carlton R. Davis, Muthucumaru Maheswaran:

A localized certificate revocation scheme for mobile ad hoc networks. 17-31 - Hoang Lan Nguyen, Uyen Trang Nguyen:

A study of different types of attacks on multicast in mobile ad hoc networks. 32-46 - Hung-Yu Chien, Ru-Yu Lin:

Improved ID-based security framework for ad hoc network. 47-60 - Illya Stepanov, Kurt Rothermel:

On the impact of a more realistic physical layer on MANET simulations results. 61-78 - Roberto Beraldi

:
The polarized gossip protocol for path discovery in MANETs. 79-91 - Yunxia Chen, Chen-Nee Chuah

, Qing Zhao:
Network configuration for optimal utilization efficiency of wireless sensor networks. 92-107 - Jason Redi, S. Kolek, K. Manning, Craig Partridge, Regina Rosales-Hain, Ram Ramanathan, Isidro Castiñeyra:

JAVeLEN - An ultra-low energy ad hoc wireless network. 108-126 - Ju-Lan Hsu, Izhak Rubin:

Directional random access scheme for mobile ad hoc networking using beamforming antennas. 127-153
Volume 6, Number 2, April 2008
- Adarsh Sridhar, Anthony Ephremides:

Energy optimization in wireless broadcasting through power control. 155-167 - Lyes Dekar, Hamamache Kheddouci:

A cluster based mobility prediction scheme for ad hoc networks. 168-194 - Eylem Ekici

, Serdar Vural, Janise McNair
, Dawood Al-Abri
:
Secure probabilistic location verification in randomly deployed wireless sensor networks. 195-209 - Matthew J. Miller, Nitin H. Vaidya:

Ad hoc routing for multilevel power save protocols. 210-225 - Xiaolong Huang, Izhak Rubin:

Hybrid mobile backbone network routing with flow control and distance awareness (MBNR-FC/DA). 226-244 - Orestis Tsigkas, Fotini-Niovi Pavlidou:

An adaptive medium access control protocol using m-ary tree algorithms for quality-of-service support in single-cell ad hoc networks. 245-259 - Björn Scheuermann, Christian Lochert, Martin Mauve:

Implicit hop-by-hop congestion control in wireless multihop networks. 260-286 - Vinod Namboodiri, Lixin Gao, Ramakrishna Janaswamy

:
Power-efficient topology control for static wireless networks with switched beam directional antennas. 287-306 - Pejman Khadivi, Terence D. Todd, Shadrokh Samavi, Hossein Saidi

, Dongmei Zhao:
Mobile ad hoc relaying for upward vertical handoff in hybrid WLAN/cellular systems. 307-324
Volume 6, Number 3, May 2008
- Xin Liu, R. Srikant:

Asymptotic uniform data-rate guarantees in large wireless networks. 325-343 - Issa M. Khalil

, Saurabh Bagchi, Ness B. Shroff:
MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks. 344-362 - Wensheng Zhang, Guohong Cao:

Defending against cache consistency attacks in wireless ad hoc networks. 363-379 - Cunqing Hua, Tak-Shing Peter Yum:

Data aggregated maximum lifetime routing for wireless sensor networks. 380-392 - Fabrice Theoleyre

, Fabrice Valois:
A self-organization structure for hybrid networks. 393-407 - Tahiry Razafindralambo

, Isabelle Guérin Lassous:
Increasing fairness and efficiency using the MadMac protocol in ad hoc networks. 408-423 - Guoqiang Wang, Damla Turgut, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu:

A MAC layer protocol for wireless networks with asymmetric links. 424-440 - Sudha Chinni, Johnson P. Thomas, Gheorghita Ghinea, Zhengming Shen:

Trust model for certificate revocation in ad hoc networks. 441-457 - Remi Badonnel, Radu State, Olivier Festor

:
Self-configurable fault monitoring in ad-hoc networks. 458-473 - Dimitris Vassis, George Kormentzas:

Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals. 474-482
Volume 6, Number 4, June 2008
- Ian F. Akyildiz:

Editorial. 483-484 - Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansley Post, Amit Kumar Saha, Peter Druschel, David B. Johnson, Rudolf H. Riedi:

Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking. 485-507 - Ningrinla Marchang

, Raja Datta
:
Collaborative techniques for intrusion detection in mobile ad-hoc networks. 508-523 - Daniel W. McClary, Violet R. Syrotiuk, Vincent Lecuire:

Adaptive audio streaming in mobile ad hoc networks using neural networks. 524-538 - Gustav J. Jordt, Rusty O. Baldwin, John F. Raquet, Barry E. Mullins:

Energy cost and error performance of range-aware, anchor-free localization algorithms. 539-559 - Dijiang Huang

, Deep Medhi:
A secure group key management scheme for hierarchical mobile ad hoc networks. 560-577 - Anand Patwardhan, Jim Parker, Michaela Iorga, Anupam Joshi

, Tom Karygiannis, Yelena Yesha:
Threshold-based intrusion detection in ad hoc networks and secure AODV. 578-599 - Brendan Burns, Oliver Brock, Brian Neil Levine:

MORA routing and capacity building in disruption-tolerant networks. 600-620 - Mohamed F. Younis

, Kemal Akkaya:
Strategies and techniques for node placement in wireless sensor networks: A survey. 621-655
Volume 6, Number 5, July 2008
- Zhao Cheng, Wendi B. Heinzelman

:
Discovering long lifetime routes in mobile ad hoc networks. 661-674 - Avinash Chiganmi, Mehmet Baysan

, Kamil Saraç, Ravi Prakash
:
Variable power broadcast using local information in ad hoc networks. 675-695 - Di Yuan, Joanna Bauer, Dag Haugland

:
Minimum-energy broadcast and multicast in wireless networks: An integer programming approach and improved heuristic algorithms. 696-717 - Aline Baggio, Koen Langendoen

:
Monte Carlo localization for mobile wireless sensor networks. 718-733 - Natarajan Meghanathan

, Andras Farago:
On the stability of paths, Steiner trees and connected dominating sets in mobile ad hoc networks. 744-769 - Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Ephremides:

A "Group-Division Multiple Access" framework for channel access to multiple destinations. 770-790 - Jun Liu:

Scalable synchronization of clocks in wireless sensor networks. 791-804 - Shweta Jain

, Samir R. Das:
Exploiting path diversity in the link layer in wireless ad hoc networks. 805-825
Volume 6, Number 6, August 2008
- Laura Rosati, Matteo Berioli, Gianluca Reali:

On ant routing algorithms in ad hoc networks with critical connectivity. 827-859 - Coskun Cetinkaya, Mehmet Bayram Yildirim

:
A short-term fair MAC protocol for WLANs. 860-877 - Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charlie Hu:

High-throughput multicast routing metrics in wireless mesh networks. 878-899 - Zvi Lotker, Alfredo Navarra

:
Grid emulation for managing random sensor networks. 900-908 - Mauri Kuorilehto, Marko Hännikäinen, Timo D. Hämäläinen:

Rapid design and evaluation framework for wireless sensor networks. 909-935 - Antonio Capone

, Fabio Martignon, Luigi Fratta:
Directional MAC and routing schemes for power controlled Wireless Mesh Networks with adaptive antennas. 936-952 - Ioannis Gragopoulos, Ioannis Tsetsinas, Eirini D. Karapistoli, Fotini-Niovi Pavlidou:

FP-MAC: A distributed MAC algorithm for 802.15.4-like wireless sensor networks. 953-969 - Xudong Wang, Azman Osman Lim:

IEEE 802.11s wireless mesh networks: Framework and challenges. 970-984
Volume 6, Number 7, September 2008
- Fei Hu, Meng Jiang, Laura Celentano, Yang Xiao

:
Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining. 986-1012 - Abdelouahid Derhab, Nadjib Badache:

Balancing the tradeoffs between scalability and availability in mobile ad hoc networks with a flat hashing-based location service. 1013-1030 - Joengmin Hwang, Tian He, Yongdae Kim

:
Secure localization with phantom node detection. 1031-1050 - Jorge Crichigno

, Min-You Wu, Wei Shu:
Protocols and architectures for channel assignment in wireless mesh networks. 1051-1077 - Ossama Younis, Marwan Krunz, Srinivasan Ramasubramanian:

Location-unaware coverage in wireless sensor networks. 1078-1097 - Jiwei Chen, Mario Gerla, Yeng-Zhong Lee, M. Y. Sanadidi:

TCP with delayed ack for wireless networks. 1098-1116 - Jae-Joon Lee, Bhaskar Krishnamachari, C.-C. Jay Kuo

:
Aging analysis in large-scale wireless sensor networks. 1117-1133 - Rehan Akbani, Turgay Korkmaz, G. V. S. Raju:

HEAP: A packet authentication scheme for mobile ad hoc networks. 1134-1150 - Shukor Abd Razak

, Steven Furnell
, Nathan L. Clarke
, Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. 1151-1167 - Jing Deng, Sergei A. Zuyev

:
On search sets of expanding ring search in wireless networks. 1168-1181
Volume 6, Number 8, November 2008
- Mark D. Yarvis, Michele Zorzi:

Ad hoc networks: Special issue on energy efficient design in wireless ad hoc and sensor networks. 1183-1184 - Joel Koshy, Ingwar Wirjawan, Raju Pandey, Yann Ramin:

Balancing computation and communication costs: The case for hybrid execution in sensor networks. 1185-1200 - Anthony Rowe, Rahul Mangharam, Raj Rajkumar:

RT-Link: A global time-synchronized link protocol for sensor networks. 1201-1220 - Chuang-Wen You, Polly Huang, Hao-Hua Chu, Yi-Chao Chen, Ji-Rung Chiang, Seng-Yong Lau:

Impact of sensor-enhanced mobility prediction on the design of energy-efficient localization. 1221-1237 - Antonio G. Ruzzelli, Gregory M. P. O'Hare

, Raja Jurdak
:
MERLIN: Cross-layer integration of MAC and routing for low duty-cycle sensor networks. 1238-1257 - Patrick J. Vincent, Murali Tummala, John C. McEachen:

A new method for distributing power usage across a sensor network. 1258-1280 - Limin Wang, Sandeep S. Kulkarni:

Sacrificing a little coverage can substantially increase network lifetime. 1281-1300 - Yuan Li, Wei Ye, John S. Heidemann

, Rohit Kulkarni:
Design and evaluation of network reconfiguration protocols for mostly-off sensor networks. 1301-1315

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














