nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A carrier sense multiple access protocol with power backoff (CSMA/PB)
|
Colbourn, Charles J. |
|
2007 |
|
8 |
p. 1233-1250 18 p. |
artikel |
2 |
A coverage-preserving scheme for wireless sensor network with irregular sensing range
|
Boukerche, Azzedine |
|
2007 |
|
8 |
p. 1303-1316 14 p. |
artikel |
3 |
A cross-layer framework for multiobjective performance evaluation of wireless ad hoc networks
|
Jaffrès-Runser, Katia |
|
2013 |
|
8 |
p. 2147-2171 25 p. |
artikel |
4 |
Ad hoc networks: Special issue on energy efficient design in wireless ad hoc and sensor networks
|
Yarvis, Mark |
|
2008 |
|
8 |
p. 1183-1184 2 p. |
artikel |
5 |
Admission control on multipath routing in 802.11-based wireless mesh networks
|
Zhao, Peng |
|
2013 |
|
8 |
p. 2235-2251 17 p. |
artikel |
6 |
A dual-mode energy efficient encryption protocol for wireless sensor networks
|
Moh’d, Abidalrahman |
|
2013 |
|
8 |
p. 2588-2604 17 p. |
artikel |
7 |
A framework for route configurability in power-constrained wireless mesh networks
|
Shillingford, Nadine |
|
2010 |
|
8 |
p. 857-871 15 p. |
artikel |
8 |
AGREE: exploiting energy harvesting to support data-centric access control in WSNs
|
Bianchi, Giuseppe |
|
2013 |
|
8 |
p. 2625-2636 12 p. |
artikel |
9 |
An efficient and robust name resolution protocol for dynamic MANETs
|
Nazeeruddin, M. |
|
2010 |
|
8 |
p. 842-856 15 p. |
artikel |
10 |
A new method for distributing power usage across a sensor network
|
Vincent, Patrick |
|
2008 |
|
8 |
p. 1258-1280 23 p. |
artikel |
11 |
An exploration of aggregation convergecast scheduling
|
de Souza, Evandro |
|
2013 |
|
8 |
p. 2391-2407 17 p. |
artikel |
12 |
A novel batch-based group key management protocol applied to the Internet of Things
|
Veltri, Luca |
|
2013 |
|
8 |
p. 2724-2737 14 p. |
artikel |
13 |
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks
|
Dong, Ying |
|
2009 |
|
8 |
p. 1536-1550 15 p. |
artikel |
14 |
A routing protocol for socially selfish delay tolerant networks
|
Li, Qinghua |
|
2012 |
|
8 |
p. 1619-1632 14 p. |
artikel |
15 |
ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks
|
Huang, Dijiang |
|
2009 |
|
8 |
p. 1526-1535 10 p. |
artikel |
16 |
Automated design algorithms for tactical wireless networks
|
Younis, Ossama |
|
2013 |
|
8 |
p. 2461-2469 9 p. |
artikel |
17 |
Balancing computation and communication costs: The case for hybrid execution in sensor networks
|
Koshy, Joel |
|
2008 |
|
8 |
p. 1185-1200 16 p. |
artikel |
18 |
Building trees based on aggregation efficiency in sensor networks
|
Harris III, Albert F. |
|
2007 |
|
8 |
p. 1317-1328 12 p. |
artikel |
19 |
Channelization for dynamic multi-frequency, multi-hop wireless cellular networks
|
Shin, JaeSheung |
|
2007 |
|
8 |
p. 1284-1302 19 p. |
artikel |
20 |
Context information prediction for social-based routing in opportunistic networks
|
Nguyen, Hoang Anh |
|
2012 |
|
8 |
p. 1557-1569 13 p. |
artikel |
21 |
Cooperative schemes for path establishment in mobile ad-hoc networks under shadow-fading
|
Dimitriou, Nikos |
|
2013 |
|
8 |
p. 2556-2566 11 p. |
artikel |
22 |
CSI: A paradigm for behavior-oriented profile-cast services in mobile networks
|
Hsu, Wei-jen |
|
2012 |
|
8 |
p. 1586-1602 17 p. |
artikel |
23 |
Dealing with dishonest recommendation: The trials in reputation management court
|
Chen, Shenlong |
|
2012 |
|
8 |
p. 1603-1618 16 p. |
artikel |
24 |
Decentralised detection of periodic encounter communities in opportunistic networks
|
Williams, M.J. |
|
2012 |
|
8 |
p. 1544-1556 13 p. |
artikel |
25 |
Defense against misbehavior in anonymous vehicular ad hoc networks
|
Sun, Jinyuan |
|
2009 |
|
8 |
p. 1515-1525 11 p. |
artikel |
26 |
Design and evaluation of network reconfiguration protocols for mostly-off sensor networks
|
Li, Yuan |
|
2008 |
|
8 |
p. 1301-1315 15 p. |
artikel |
27 |
Design and implementation of CLASS: A Cross-Layer ASSociation scheme for wireless mesh networks
|
He, Yan |
|
2011 |
|
8 |
p. 1476-1488 13 p. |
artikel |
28 |
Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach
|
Adelantado, Ferran |
|
2013 |
|
8 |
p. 2367-2380 14 p. |
artikel |
29 |
DistressNet: A disaster response system providing constant availability cloud-like services
|
Chenji, Harsha |
|
2013 |
|
8 |
p. 2440-2460 21 p. |
artikel |
30 |
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
|
Ho, Jun-Won |
|
2009 |
|
8 |
p. 1476-1488 13 p. |
artikel |
31 |
DTLS based security and two-way authentication for the Internet of Things
|
Kothmayr, Thomas |
|
2013 |
|
8 |
p. 2710-2723 14 p. |
artikel |
32 |
DTN routing in body sensor networks with dynamic postural partitioning
|
Quwaider, Muhannad |
|
2010 |
|
8 |
p. 824-841 18 p. |
artikel |
33 |
Editorial Board
|
|
|
2008 |
|
8 |
p. IFC- 1 p. |
artikel |
34 |
Editorial Board
|
|
|
2007 |
|
8 |
p. IFC- 1 p. |
artikel |
35 |
Editorial for special issue on privacy and security in wireless sensorand ad hoc networks
|
Zhang, Wensheng |
|
2009 |
|
8 |
p. 1431-1433 3 p. |
artikel |
36 |
Editorial for special issue on social-based routing in mobile and delay-tolerant networks
|
Haahr, Mads |
|
2012 |
|
8 |
p. 1517-1519 3 p. |
artikel |
37 |
Energy and spectrum-aware MAC protocol for perpetual wireless nanosensor networks in the Terahertz Band
|
Wang, Pu |
|
2013 |
|
8 |
p. 2541-2555 15 p. |
artikel |
38 |
Energy constraint clustering algorithms for wireless sensor networks
|
Albath, Julia |
|
2013 |
|
8 |
p. 2512-2525 14 p. |
artikel |
39 |
Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems
|
Tulone, Daniela |
|
2007 |
|
8 |
p. 1251-1271 21 p. |
artikel |
40 |
Erratum to “On the feasibility of UMTS-based Traffic Information Systems” [Ad Hoc Networks 8 (5) (2010) 506–517]
|
Sommer, Christoph |
|
2010 |
|
8 |
p. 904- 1 p. |
artikel |
41 |
Fair content dissemination in participatory DTNs
|
Mashhadi, Afra J. |
|
2012 |
|
8 |
p. 1633-1645 13 p. |
artikel |
42 |
Fast distributed multi-hop relative time synchronization protocol and estimators for wireless sensor networks
|
Djenouri, Djamel |
|
2013 |
|
8 |
p. 2329-2344 16 p. |
artikel |
43 |
Heuristic optimization techniques for self-orientation of directional antennas in long-distance point-to-point broadband networks
|
Min, Byung-Cheol |
|
2013 |
|
8 |
p. 2252-2263 12 p. |
artikel |
44 |
Human-mobility enabled networks in urban environments: Is there any (mobile wireless) small world out there?
|
Cacciapuoti, Angela Sara |
|
2012 |
|
8 |
p. 1520-1531 12 p. |
artikel |
45 |
Impact of node distance on selfish replica allocation in a mobile ad-hoc network
|
Ryu, Byung-Gul |
|
2013 |
|
8 |
p. 2187-2202 16 p. |
artikel |
46 |
Impact of sensor-enhanced mobility prediction on the design of energy-efficient localization
|
You, Chuang-Wen |
|
2008 |
|
8 |
p. 1221-1237 17 p. |
artikel |
47 |
Impacts of user-selfishness on cooperative content caching in social wireless networks
|
Taghizadeh, Mahmoud |
|
2013 |
|
8 |
p. 2423-2439 17 p. |
artikel |
48 |
Improved network resilience of wireless mesh networks using MPLS and Fast Re-Routing techniques
|
Bisti, L. |
|
2011 |
|
8 |
p. 1448-1460 13 p. |
artikel |
49 |
Improving scalability in vehicular communication using one-way hash chain method
|
Sulaiman, Ashraph |
|
2013 |
|
8 |
p. 2526-2540 15 p. |
artikel |
50 |
Improving the transport performance in delay tolerant networks by random linear network coding and global acknowledgments
|
Ali, Arshad |
|
2013 |
|
8 |
p. 2567-2587 21 p. |
artikel |
51 |
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network
|
Ghandour, Ali J. |
|
2013 |
|
8 |
p. 2408-2422 15 p. |
artikel |
52 |
Increasing base-station anonymity in wireless sensor networks
|
Acharya, Uday |
|
2010 |
|
8 |
p. 791-809 19 p. |
artikel |
53 |
Indoor deployment of IEEE 802.11s mesh networks: Lessons and guidelines
|
Lin, Ying-Dar |
|
2011 |
|
8 |
p. 1404-1413 10 p. |
artikel |
54 |
Inside Front Cover - Editorial Board
|
|
|
2010 |
|
8 |
p. IFC- 1 p. |
artikel |
55 |
Inside Front Cover - Editorial Board
|
|
|
2009 |
|
8 |
p. IFC- 1 p. |
artikel |
56 |
Inside Front Cover - Editorial Board
|
|
|
2013 |
|
8 |
p. IFC- 1 p. |
artikel |
57 |
Inside Front Cover - Editorial Board
|
|
|
2011 |
|
8 |
p. IFC- 1 p. |
artikel |
58 |
Inside Front Cover - Editorial Board
|
|
|
2012 |
|
8 |
p. IFC- 1 p. |
artikel |
59 |
Instant collision resolution for tag identification in RFID networks
|
Bonuccelli, Maurizio A. |
|
2007 |
|
8 |
p. 1220-1232 13 p. |
artikel |
60 |
Interactions between the physical layer and upper layers in wireless networks
|
Tobagi, Fouad A. |
|
2007 |
|
8 |
p. 1208-1219 12 p. |
artikel |
61 |
Interconnection of geographically distributed wireless mesh testbeds: Resource sharing on a large scale
|
Di Stasi, Giovanni |
|
2011 |
|
8 |
p. 1389-1403 15 p. |
artikel |
62 |
It measures like me: An IoTs algorithm in WSNs based on heuristics behavior and clustering methods
|
Di Stefano, Alessandro |
|
2013 |
|
8 |
p. 2637-2647 11 p. |
artikel |
63 |
Joint route selection and resource allocation in multihop wireless networks based on a game theoretic approach
|
Ortín, Jorge |
|
2013 |
|
8 |
p. 2203-2216 14 p. |
artikel |
64 |
Lightweight routing with dynamic interests in wireless sensor and actor networks
|
Akbaş, Mustafa İlhan |
|
2013 |
|
8 |
p. 2313-2328 16 p. |
artikel |
65 |
Link quality analysis and measurement in wireless mesh networks
|
Kolar, Vinay |
|
2011 |
|
8 |
p. 1430-1447 18 p. |
artikel |
66 |
Load balancing techniques for lifetime maximizing in wireless sensor networks
|
Kacimi, Rahim |
|
2013 |
|
8 |
p. 2172-2186 15 p. |
artikel |
67 |
Location safety protection in ad hoc networks
|
Xu, Toby |
|
2009 |
|
8 |
p. 1551-1562 12 p. |
artikel |
68 |
LORD: Tracking mobile clients in a real mesh
|
Bezahaf, Mehdi |
|
2011 |
|
8 |
p. 1461-1475 15 p. |
artikel |
69 |
Making a mesh router/gateway from a smartphone: Is that a practical solution?
|
Iera, Antonio |
|
2011 |
|
8 |
p. 1414-1429 16 p. |
artikel |
70 |
MERLIN: Cross-layer integration of MAC and routing for low duty-cycle sensor networks
|
Ruzzelli, Antonio G. |
|
2008 |
|
8 |
p. 1238-1257 20 p. |
artikel |
71 |
Multiple point of interest discovery and coverage with mobile wireless sensors
|
Erdelj, Milan |
|
2013 |
|
8 |
p. 2288-2300 13 p. |
artikel |
72 |
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
|
Wang, Qiuhua |
|
2013 |
|
8 |
p. 2500-2511 12 p. |
artikel |
73 |
On the dynamics of human proximity for data diffusion in ad-hoc networks
|
Panisson, André |
|
2012 |
|
8 |
p. 1532-1543 12 p. |
artikel |
74 |
On the tradeoff between altruism and selfishness in MANET trust management
|
Cho, Jin-Hee |
|
2013 |
|
8 |
p. 2217-2234 18 p. |
artikel |
75 |
Onto scalable wireless ad hoc networks: Adaptive and location-aware clustering
|
Conceição, Luís |
|
2013 |
|
8 |
p. 2484-2499 16 p. |
artikel |
76 |
Opportunistic social dissemination of micro-blogs
|
Allen, S.M. |
|
2012 |
|
8 |
p. 1570-1585 16 p. |
artikel |
77 |
Optimum node placement in wireless opportunistic routing networks
|
Cerdà-Alabern, Llorenç |
|
2013 |
|
8 |
p. 2273-2287 15 p. |
artikel |
78 |
Passive wake-up radios: From devices to applications
|
Ba, He |
|
2013 |
|
8 |
p. 2605-2621 17 p. |
artikel |
79 |
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
|
Di Pietro, Roberto |
|
2009 |
|
8 |
p. 1463-1475 13 p. |
artikel |
80 |
Privacy preservation in wireless sensor networks: A state-of-the-art survey
|
Li, Na |
|
2009 |
|
8 |
p. 1501-1514 14 p. |
artikel |
81 |
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations
|
González-Tablas, A.I. |
|
2013 |
|
8 |
p. 2693-2709 17 p. |
artikel |
82 |
Recent advances on practical aspects of Wireless Mesh Networks
|
Avallone, Stefano |
|
2011 |
|
8 |
p. 1371-1373 3 p. |
artikel |
83 |
Recent research directions in wireless ad hoc networking
|
Basagni, Stefano |
|
2007 |
|
8 |
p. 1205-1207 3 p. |
artikel |
84 |
Reliable data approximation in wireless sensor network
|
Kamal, Abu Raihan M. |
|
2013 |
|
8 |
p. 2470-2483 14 p. |
artikel |
85 |
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
|
Cardenas, Alvaro A. |
|
2009 |
|
8 |
p. 1434-1447 14 p. |
artikel |
86 |
RFID-based localization with Non-Blocking tag scanning
|
Kashkouli Nejad, Keyvan |
|
2013 |
|
8 |
p. 2264-2272 9 p. |
artikel |
87 |
RT-Link: A global time-synchronized link protocol for sensor networks
|
Rowe, Anthony |
|
2008 |
|
8 |
p. 1201-1220 20 p. |
artikel |
88 |
Sacrificing a little coverage can substantially increase network lifetime
|
Wang, Limin |
|
2008 |
|
8 |
p. 1281-1300 20 p. |
artikel |
89 |
Scalable location estimation using smart antennas in wireless sensor networks
|
Kucuk, Kerem |
|
2010 |
|
8 |
p. 889-903 15 p. |
artikel |
90 |
Secure group communication in wireless mesh networks
|
Dong, Jing |
|
2009 |
|
8 |
p. 1563-1576 14 p. |
artikel |
91 |
Secure median computation in wireless sensor networks
|
Roy, Sankardas |
|
2009 |
|
8 |
p. 1448-1462 15 p. |
artikel |
92 |
Security, privacy and trust management in the internet of things era – SePriT
|
Sicari, Sabrina |
|
2013 |
|
8 |
p. 2623-2624 2 p. |
artikel |
93 |
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
|
Sun, Bo |
|
2009 |
|
8 |
p. 1489-1500 12 p. |
artikel |
94 |
Sensing clouds: A distributed cooperative target tracking with tiny binary noisy sensors
|
Marian, Tal |
|
2013 |
|
8 |
p. 2356-2366 11 p. |
artikel |
95 |
Service capacity in vehicular networks: A resource dissemination analysis
|
Galluccio, L. |
|
2007 |
|
8 |
p. 1272-1283 12 p. |
artikel |
96 |
Simple ant routing algorithm strategies for a (Multipurpose) MANET model
|
Correia, Fernando |
|
2010 |
|
8 |
p. 810-823 14 p. |
artikel |
97 |
Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure
|
Stajano, Frank |
|
2010 |
|
8 |
p. 872-888 17 p. |
artikel |
98 |
Spoofing detection in IEEE 802.15.4 networks based on received signal strength
|
Jokar, Paria |
|
2013 |
|
8 |
p. 2648-2660 13 p. |
artikel |
99 |
SVELTE: Real-time intrusion detection in the Internet of Things
|
Raza, Shahid |
|
2013 |
|
8 |
p. 2661-2674 14 p. |
artikel |
100 |
TC-BAC: A trust and centrality degree based access control model in wireless sensor networks
|
Duan, Junqi |
|
2013 |
|
8 |
p. 2675-2692 18 p. |
artikel |
101 |
Threshold-related throughput – A new criterion for evaluation of sensor network performance
|
Ledvich, Ilya |
|
2007 |
|
8 |
p. 1329-1348 20 p. |
artikel |
102 |
Towards benchmarking routing protocols in wireless mesh networks
|
Friginal, Jesús |
|
2011 |
|
8 |
p. 1374-1388 15 p. |
artikel |
103 |
Towards efficient dynamic surface gateway deployment for underwater network
|
Ibrahim, Saleh |
|
2013 |
|
8 |
p. 2301-2312 12 p. |
artikel |
104 |
VANET-based secure taxi service
|
Chim, T.W. |
|
2013 |
|
8 |
p. 2381-2390 10 p. |
artikel |
105 |
Void traversal for efficient non-planar geometric routing
|
Clouser, Thomas |
|
2013 |
|
8 |
p. 2345-2355 11 p. |
artikel |