nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A MAC layer protocol for wireless networks with asymmetric links
|
Wang, Guoqiang |
|
2008 |
6 |
3 |
p. 424-440 17 p. |
artikel |
2 |
A self-organization structure for hybrid networks
|
Theoleyre, Fabrice |
|
2008 |
6 |
3 |
p. 393-407 15 p. |
artikel |
3 |
Asymptotic uniform data-rate guarantees in large wireless networks
|
Liu, Xin |
|
2008 |
6 |
3 |
p. 325-343 19 p. |
artikel |
4 |
Data aggregated maximum lifetime routing for wireless sensor networks
|
Hua, Cunqing |
|
2008 |
6 |
3 |
p. 380-392 13 p. |
artikel |
5 |
Defending against cache consistency attacks in wireless ad hoc networks
|
Zhang, Wensheng |
|
2008 |
6 |
3 |
p. 363-379 17 p. |
artikel |
6 |
Editorial Board
|
|
|
2008 |
6 |
3 |
p. IFC- 1 p. |
artikel |
7 |
Increasing fairness and efficiency using the MadMac protocol in ad hoc networks
|
Razafindralambo, Tahiry |
|
2008 |
6 |
3 |
p. 408-423 16 p. |
artikel |
8 |
MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks
|
Khalil, Issa |
|
2008 |
6 |
3 |
p. 344-362 19 p. |
artikel |
9 |
Performance analysis of IEEE 802.11 ad hoc networks in the presence of exposed terminals
|
Vassis, Dimitris |
|
2008 |
6 |
3 |
p. 474-482 9 p. |
artikel |
10 |
Self-configurable fault monitoring in ad-hoc networks
|
Badonnel, Remi |
|
2008 |
6 |
3 |
p. 458-473 16 p. |
artikel |
11 |
Trust model for certificate revocation in ad hoc networks
|
Chinni, Sudha |
|
2008 |
6 |
3 |
p. 441-457 17 p. |
artikel |