The SCEAS System
Navigation Menu

Conferences in DBLP

Mobile Ad Hoc Networking and Computing (mobihoc)
2008 (conf/mobihoc/2008)


  1. Multihop wireless networks: capacity limits and how to approach them. [Citation Graph (, )][DBLP]


  2. Optimal relay assignment for cooperative communications. [Citation Graph (, )][DBLP]


  3. On exploiting diversity and spatial reuse in relay-enabled wireless networks. [Citation Graph (, )][DBLP]


  4. Routing in outer space: fair traffic load in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  5. Complexity in wireless scheduling: impact and tradeoffs. [Citation Graph (, )][DBLP]


  6. Analyzing DISH for multi-channel MAC protocols in wireless networks. [Citation Graph (, )][DBLP]


  7. DW-MAC: a low latency, energy efficient demand-wakeup MAC protocol for wireless sensor networks. [Citation Graph (, )][DBLP]


  8. Opportunistic and cooperative spatial multiplexing in MIMO ad hoc networks. [Citation Graph (, )][DBLP]


  9. Dynamic packet fragmentation for wireless channels with failures. [Citation Graph (, )][DBLP]


  10. Construction algorithms for k-connected m-dominating sets in wireless sensor networks. [Citation Graph (, )][DBLP]


  11. An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model. [Citation Graph (, )][DBLP]


  12. Distributed construction of bounded-degree low-interference spanners of low weight. [Citation Graph (, )][DBLP]


  13. A local greedy scheduling scheme with provable performance guarantee. [Citation Graph (, )][DBLP]


  14. Connectivity in cooperative wireless ad hoc networks. [Citation Graph (, )][DBLP]


  15. Improved asymptotic bounds on critical transmission radius for greedy forward routing in wireless ad hoc networks. [Citation Graph (, )][DBLP]


  16. On the latency for information dissemination in mobile wireless networks. [Citation Graph (, )][DBLP]


  17. Improving sensor network immunity under worm attacks: a software diversity approach. [Citation Graph (, )][DBLP]


  18. Finding popular categories for RFID tags. [Citation Graph (, )][DBLP]


  19. Towards energy efficient VoIP over wireless LANs. [Citation Graph (, )][DBLP]


  20. The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception. [Citation Graph (, )][DBLP]


  21. Multicast capacity for hybrid wireless networks. [Citation Graph (, )][DBLP]


  22. On throughput in linear wireless networks. [Citation Graph (, )][DBLP]


  23. Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks. [Citation Graph (, )][DBLP]


  24. Energy efficient multi-path communication for time-critical applications in underwater sensor networks. [Citation Graph (, )][DBLP]


  25. Rendezvous design algorithms for wireless sensor networks with a mobile base station. [Citation Graph (, )][DBLP]


  26. Bubble rap: social-based forwarding in delay tolerant networks. [Citation Graph (, )][DBLP]


  27. Delegation forwarding. [Citation Graph (, )][DBLP]


  28. The networking shape of vehicular mobility. [Citation Graph (, )][DBLP]


  29. Toward stochastic anatomy of inter-meeting time distribution under general mobility models. [Citation Graph (, )][DBLP]


  30. Hidden information and actions in multi-hop wireless ad hoc networks. [Citation Graph (, )][DBLP]


  31. Dice: a game theoretic framework for wireless multipath network coding. [Citation Graph (, )][DBLP]


  32. A game approach for multi-channel allocation in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  33. Competitions and dynamics of duopoly wireless service providers in dynamic spectrum market. [Citation Graph (, )][DBLP]


  34. Minimum-latency gossiping in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  35. An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks. [Citation Graph (, )][DBLP]


  36. Delay-bounded routing in vehicular ad-hoc networks. [Citation Graph (, )][DBLP]


  37. Routing in a cyclic mobispace. [Citation Graph (, )][DBLP]


  38. Challenging benchmark for location discovery in ad hoc networks: foundations and applications. [Citation Graph (, )][DBLP]


  39. Using persistent homology to recover spatial information from encounter traces. [Citation Graph (, )][DBLP]


  40. Cooperative transmit-power estimation under wireless fading. [Citation Graph (, )][DBLP]


  41. Fast and quality-guaranteed data streaming in resource-constrained sensor networks. [Citation Graph (, )][DBLP]


  42. Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. [Citation Graph (, )][DBLP]


  43. Strong barrier coverage of wireless sensor networks. [Citation Graph (, )][DBLP]


  44. Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. [Citation Graph (, )][DBLP]


  45. Self-monitoring for sensor networks. [Citation Graph (, )][DBLP]


  46. Symmetric replication for efficient flooding in DHTs. [Citation Graph (, )][DBLP]


  47. P2P-based routing and data management using the virtual cord protocol (VCP). [Citation Graph (, )][DBLP]


  48. An approach to finding weak regions for wireless sensor networks with arbitrary sensing areas. [Citation Graph (, )][DBLP]


  49. BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks. [Citation Graph (, )][DBLP]


  50. A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. [Citation Graph (, )][DBLP]


  51. Authentication for WiFi - WiBbro-based BWAN interworking. [Citation Graph (, )][DBLP]


  52. Poster abstract: force-based geometric routing. [Citation Graph (, )][DBLP]


  53. Poster abstract: an evaluation study of routing reliability in opportunistic networks. [Citation Graph (, )][DBLP]


  54. A two-level social mobility model for trace generation. [Citation Graph (, )][DBLP]


  55. Poster abstract: scalable and collaborative internet access for opportunistic people networks. [Citation Graph (, )][DBLP]


  56. Mixed altruistic and selfish users in wireless mesh networks: a game theoretic model for multihop bandwidth sharing. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002