Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             102 results found
no title author magazine year volume issue page(s) type
1 Access control in wireless sensor networks Zhou, Yun
2007
1 p. 3-13
11 p.
article
2 A consensus-based ℓ-Exclusion algorithm for mobile ad hoc networks Masum, Salahuddin Mohammad
2010
1 p. 30-45
16 p.
article
3 Active query forwarding in sensor networks Sadagopan, Narayanan
2005
1 p. 91-113
23 p.
article
4 A distributed laxity-based priority scheduling scheme for time-sensitive traffic in mobile ad hoc networks Karthigeyan, I.
2005
1 p. 27-50
24 p.
article
5 A framework for specification and performance evaluation of service discovery protocols in mobile ad-hoc networks Shenoi, Avinash
2006
1 p. 1-23
23 p.
article
6 A group-based channel assignment protocol for rate separation in IEEE 802.11-based multi-radio multi-rate ad hoc networks Kim, Sok-Hyong
2012
1 p. 95-110
16 p.
article
7 A hotspot mitigation protocol for ad hoc networks Lee, Seoung-Bum
2003
1 p. 87-106
20 p.
article
8 A localized certificate revocation scheme for mobile ad hoc networks Arboit, Geneviève
2008
1 p. 17-31
15 p.
article
9 An ant colony optimization routing based on robustness for ad hoc networks with GPSs Kadono, Daisuke
2010
1 p. 63-76
14 p.
article
10 An effective key management scheme for heterogeneous sensor networks Du, Xiaojiang
2007
1 p. 24-34
11 p.
article
11 An implementation framework for trajectory-based routing in ad hoc networks Yuksel, Murat
2006
1 p. 125-137
13 p.
article
12 An improved key distribution mechanism for large-scale hierarchical wireless sensor networks Cheng, Yi
2007
1 p. 35-48
14 p.
article
13 An Internet vision: the invisible global infrastructure Kleinrock, Leonard
2003
1 p. 3-11
9 p.
article
14 A review of routing protocols for mobile ad hoc networks Abolhasan, Mehran
2004
1 p. 1-22
22 p.
article
15 A routing framework for providing robustness to node failures in mobile ad hoc networks Ye, Zhenqiang
2004
1 p. 87-107
21 p.
article
16 A study of different types of attacks on multicast in mobile ad hoc networks Nguyen, Hoang Lan
2008
1 p. 32-46
15 p.
article
17 Attack-resilient time synchronization for wireless sensor networks Song, Hui
2007
1 p. 112-125
14 p.
article
18 Barter trade improves message delivery in opportunistic networks Buttyán, Levente
2010
1 p. 1-14
14 p.
article
19 Bounds and parameter optimization of medium access control coding for wireless ad hoc and sensor networks Rentel, Carlos H.
2012
1 p. 128-143
16 p.
article
20 Combining on-demand and opportunistic routing for intermittently connected networks Boice, J.
2009
1 p. 201-218
18 p.
article
21 Contents Continued 2009
1 p. 264-
1 p.
article
22 Design guidelines for wireless sensor networks: communication, clustering and aggregation Mhatre, Vivek
2004
1 p. 45-63
19 p.
article
23 Directional random access scheme for mobile ad hoc networking using beamforming antennas Hsu, Ju-Lan
2008
1 p. 127-153
27 p.
article
24 ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks Conti, Mauro
2007
1 p. 49-62
14 p.
article
25 Editorial Akyildiz, I.F.
2003
1 p. 1-2
2 p.
article
26 Editorial board 2003
1 p. ii-
1 p.
article
27 Editorial Board 2008
1 p. IFC-
1 p.
article
28 Editorial Board 2006
1 p. CO2-
1 p.
article
29 Editorial board 2004
1 p. ii-
1 p.
article
30 Editorial Board 2009
1 p. IFC-
1 p.
article
31 Editorial board 2005
1 p. IFC-
1 p.
article
32 Editorial Board 2007
1 p. CO2-
1 p.
article
33 Editorial for the Special Issue of Ad hoc networks “Security issues in sensor and Ad hoc networks” Mišić, Jelena
2007
1 p. 1-2
2 p.
article
34 Effectiveness of RTS/CTS handshake in IEEE 802.11 based ad hoc networks Xu, Kaixin
2003
1 p. 107-123
17 p.
article
35 Efficient clustering algorithms for self-organizing wireless sensor networks Krishnan, Rajesh
2006
1 p. 36-59
24 p.
article
36 Efficient rate adaptation with QoS support in wireless networks Shamy, Khoder
2010
1 p. 119-133
15 p.
article
37 Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping Panta, Rajesh Krishna
2009
1 p. 42-62
21 p.
article
38 Energy-efficient MAC in ad-hoc networks inspired by conflict resolution concepts Sagduyu, Yalin Evren
2003
1 p. 65-86
22 p.
article
39 Energy-efficient neighbor discovery protocol for mobile wireless sensor networks Kohvakka, Mikko
2009
1 p. 24-41
18 p.
article
40 Estimating the value of co-operation approaches for multi-hop ad hoc networks Lamparter, Bernd
2005
1 p. 17-26
10 p.
article
41 Evolution and future directions of the ad hoc on-demand distance-vector routing protocol Belding-Royer, Elizabeth M.
2003
1 p. 125-150
26 p.
article
42 Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring Chen, Xian
2012
1 p. 62-74
13 p.
article
43 Graph-based criteria for spectrum-aware clustering in cognitive radio networks Bradonjić, Milan
2012
1 p. 75-94
20 p.
article
44 Implementation of security policy for clinical information systems over wireless sensor networks Mišić, Jelena
2007
1 p. 134-144
11 p.
article
45 Improved ID-based security framework for ad hoc network Chien, Hung-Yu
2008
1 p. 47-60
14 p.
article
46 Information dissemination in VANETs based upon a tree topology Ruiz, Patricia
2012
1 p. 111-127
17 p.
article
47 Inside Front Cover - Editorial Board 2010
1 p. IFC-
1 p.
article
48 Inside Front Cover - Editorial Board 2012
1 p. IFC-
1 p.
article
49 Inside Front Cover - Editorial Board 2011
1 p. IFC-
1 p.
article
50 Interference aware cooperative routing for wireless ad hoc networks Mahmood, Hasan
2009
1 p. 248-263
16 p.
article
51 JAVeLEN – An ultra-low energy ad hoc wireless network Redi, J.
2008
1 p. 108-126
19 p.
article
52 Lattice routing: A 4D routing scheme for multiradio multichannel ad hoc networks Kakumanu, Sandeep
2011
1 p. 95-107
13 p.
article
53 LIDF: Layered intrusion detection framework for ad-hoc networks Komninos, Nikos
2009
1 p. 171-182
12 p.
article
54 Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks Cartigny, Julien
2005
1 p. 1-16
16 p.
article
55 Location and calculation-free node-scheduling schemes in large wireless sensor networks Tian, Di
2004
1 p. 65-85
21 p.
article
56 MARS: Link-layer rate selection for multicast transmissions in wireless mesh networks Acharya, Prashanth A.K.
2011
1 p. 48-60
13 p.
article
57 MC-LMAC: A multi-channel MAC protocol for wireless sensor networks Incel, Ozlem Durmaz
2011
1 p. 73-94
22 p.
article
58 Minimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks Song, Lubo
2009
1 p. 230-247
18 p.
article
59 Mobile ad hoc networking: imperatives and challenges Chlamtac, Imrich
2003
1 p. 13-64
52 p.
article
60 Mobile agent migration modeling and design for target tracking in wireless sensor networks Xu, Yingyue
2008
1 p. 1-16
16 p.
article
61 Multipath optimized link state routing for mobile ad hoc networks Yi, Jiazi
2011
1 p. 28-47
20 p.
article
62 Neighbor discovery in wireless networks with sectored antennas Murawski, R.
2012
1 p. 1-18
18 p.
article
63 Network configuration for optimal utilization efficiency of wireless sensor networks Chen, Yunxia
2008
1 p. 92-107
16 p.
article
64 On-demand power management for ad hoc networks Zheng, Rong
2005
1 p. 51-68
18 p.
article
65 On-demand routing and channel assignment in multi-channel mobile ad hoc networks Gong, Michelle X.
2009
1 p. 63-78
16 p.
article
66 On the impact of a more realistic physical layer on MANET simulations results Stepanov, Illya
2008
1 p. 61-78
18 p.
article
67 Optimal physical carrier sense in wireless networks Park, Kyung-Joon
2011
1 p. 16-27
12 p.
article
68 Optimal placement and channel assignment of relay stations in heterogeneous wireless mesh networks by modified Bender’s decomposition So, Aaron
2009
1 p. 118-135
18 p.
article
69 Partially controlled deployment strategies for wireless sensors Leoncini, Mauro
2009
1 p. 1-23
23 p.
article
70 Performance evaluation of distributed localization techniques for mobile underwater acoustic sensor networks Erol-Kantarci, Melike
2011
1 p. 61-72
12 p.
article
71 Performance of the beacon-less routing protocol in realistic scenarios Braun, Torsten
2010
1 p. 96-107
12 p.
article
72 Power-aware semi-beaconless 3D georouting algorithms using adjustable transmission ranges for wireless ad hoc and sensor networks Abdallah, A.E.
2010
1 p. 15-29
15 p.
article
73 Power-conserving routing of ad hoc mobile wireless networks based on entropy-constrained algorithms Karayiannis, Nicolaos B.
2006
1 p. 24-35
12 p.
article
74 Public key cryptography based privacy preserving multi-context RFID infrastructure Kaya, Selim Volkan
2009
1 p. 136-152
17 p.
article
75 Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions Reddy, T. Bheemarjuna
2006
1 p. 83-124
42 p.
article
76 Quantitative analysis of the hidden terminal problem in preamble sampling WSNs Cano, C.
2012
1 p. 19-36
18 p.
article
77 Queuing network models for delay analysis of multihop wireless ad hoc networks Bisnik, Nabhendra
2009
1 p. 79-97
19 p.
article
78 Radio range adjustment for energy efficient wireless sensor networks Gao, Q.
2006
1 p. 75-82
8 p.
article
79 Responsive on-line gateway load-balancing for wireless mesh networks Galvez, Juan J.
2012
1 p. 46-61
16 p.
article
80 Retransmission and backoff strategies for wireless broadcasting Arango, Jesus
2010
1 p. 77-95
19 p.
article
81 Robust and flexible Internet connectivity for mobile ad hoc networks Nordström, Erik
2011
1 p. 1-15
15 p.
article
82 Routing based on delivery distributions in predictable disruption tolerant networks François, Jean-Marc
2009
1 p. 219-229
11 p.
article
83 SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks Hu, Yih-Chun
2003
1 p. 175-192
18 p.
article
84 SecMR – a secure multipath routing protocol for ad hoc networks Mavropodi, Rosa
2007
1 p. 87-99
13 p.
article
85 Secure data aggregation without persistent cryptographic operations in wireless sensor networks Wu, Kui
2007
1 p. 100-111
12 p.
article
86 Secure emergency communication of cellular phones in ad hoc mode Durresi, Arjan
2007
1 p. 126-133
8 p.
article
87 Secure message transmission in mobile ad hoc networks Papadimitratos, Panagiotis
2003
1 p. 193-209
17 p.
article
88 Secure position-based routing protocol for mobile ad hoc networks Song, Joo-Han
2007
1 p. 76-86
11 p.
article
89 Secure routing in mobile wireless ad hoc networks Gupte, Siddhartha
2003
1 p. 151-174
24 p.
article
90 Security considerations in ad hoc sensor networks Hu, Fei
2005
1 p. 69-89
21 p.
article
91 Self-healing group key distribution with time-limited node revocation for wireless sensor networks Jiang, Yixin
2007
1 p. 14-23
10 p.
article
92 Service differentiation mechanisms for WLANs Cetinkaya, Coskun
2010
1 p. 46-62
17 p.
article
93 Service discovery in mobile ad hoc networks: an overall perspective on architectural choices and network layer support issues Kozat, Ulaş C.
2004
1 p. 23-44
22 p.
article
94 Smart antenna based broadcasting in wireless ad hoc networks Koubaa, Hend
2006
1 p. 138-146
9 p.
article
95 The polarized gossip protocol for path discovery in MANETs Beraldi, Roberto
2008
1 p. 79-91
13 p.
article
96 Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions Di Crescenzo, Giovanni
2007
1 p. 63-75
13 p.
article
97 Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach Wang, Fan
2009
1 p. 98-117
20 p.
article
98 Turning heterogeneity into an advantage in wireless ad-hoc network routing Le, Thang
2010
1 p. 108-118
11 p.
article
99 Urban pedestrian mobility for mobile wireless network simulation Maeda, Kumiko
2009
1 p. 153-170
18 p.
article
100 Using a new protocol to enhance path reliability and realize load balancing in mobile ad hoc networks Argyriou, Antonios
2006
1 p. 60-74
15 p.
article
101 WSNSec: A scalable data link layer security protocol for WSNs Bandirmali, Necla
2012
1 p. 37-45
9 p.
article
102 Zone-based virtual backbone formation in wireless ad hoc networks Han, Bo
2009
1 p. 183-200
18 p.
article
                             102 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands