|
Conferences in DBLP
Multihop wireless networks: capacity limits and how to approach them. [Citation Graph (, )][DBLP]
Optimal relay assignment for cooperative communications. [Citation Graph (, )][DBLP]
On exploiting diversity and spatial reuse in relay-enabled wireless networks. [Citation Graph (, )][DBLP]
Routing in outer space: fair traffic load in multi-hop wireless networks. [Citation Graph (, )][DBLP]
Complexity in wireless scheduling: impact and tradeoffs. [Citation Graph (, )][DBLP]
Analyzing DISH for multi-channel MAC protocols in wireless networks. [Citation Graph (, )][DBLP]
DW-MAC: a low latency, energy efficient demand-wakeup MAC protocol for wireless sensor networks. [Citation Graph (, )][DBLP]
Opportunistic and cooperative spatial multiplexing in MIMO ad hoc networks. [Citation Graph (, )][DBLP]
Dynamic packet fragmentation for wireless channels with failures. [Citation Graph (, )][DBLP]
Construction algorithms for k-connected m-dominating sets in wireless sensor networks. [Citation Graph (, )][DBLP]
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model. [Citation Graph (, )][DBLP]
Distributed construction of bounded-degree low-interference spanners of low weight. [Citation Graph (, )][DBLP]
A local greedy scheduling scheme with provable performance guarantee. [Citation Graph (, )][DBLP]
Connectivity in cooperative wireless ad hoc networks. [Citation Graph (, )][DBLP]
Improved asymptotic bounds on critical transmission radius for greedy forward routing in wireless ad hoc networks. [Citation Graph (, )][DBLP]
On the latency for information dissemination in mobile wireless networks. [Citation Graph (, )][DBLP]
Improving sensor network immunity under worm attacks: a software diversity approach. [Citation Graph (, )][DBLP]
Finding popular categories for RFID tags. [Citation Graph (, )][DBLP]
Towards energy efficient VoIP over wireless LANs. [Citation Graph (, )][DBLP]
The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception. [Citation Graph (, )][DBLP]
Multicast capacity for hybrid wireless networks. [Citation Graph (, )][DBLP]
On throughput in linear wireless networks. [Citation Graph (, )][DBLP]
Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks. [Citation Graph (, )][DBLP]
Energy efficient multi-path communication for time-critical applications in underwater sensor networks. [Citation Graph (, )][DBLP]
Rendezvous design algorithms for wireless sensor networks with a mobile base station. [Citation Graph (, )][DBLP]
Bubble rap: social-based forwarding in delay tolerant networks. [Citation Graph (, )][DBLP]
Delegation forwarding. [Citation Graph (, )][DBLP]
The networking shape of vehicular mobility. [Citation Graph (, )][DBLP]
Toward stochastic anatomy of inter-meeting time distribution under general mobility models. [Citation Graph (, )][DBLP]
Hidden information and actions in multi-hop wireless ad hoc networks. [Citation Graph (, )][DBLP]
Dice: a game theoretic framework for wireless multipath network coding. [Citation Graph (, )][DBLP]
A game approach for multi-channel allocation in multi-hop wireless networks. [Citation Graph (, )][DBLP]
Competitions and dynamics of duopoly wireless service providers in dynamic spectrum market. [Citation Graph (, )][DBLP]
Minimum-latency gossiping in multi-hop wireless networks. [Citation Graph (, )][DBLP]
An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks. [Citation Graph (, )][DBLP]
Delay-bounded routing in vehicular ad-hoc networks. [Citation Graph (, )][DBLP]
Routing in a cyclic mobispace. [Citation Graph (, )][DBLP]
Challenging benchmark for location discovery in ad hoc networks: foundations and applications. [Citation Graph (, )][DBLP]
Using persistent homology to recover spatial information from encounter traces. [Citation Graph (, )][DBLP]
Cooperative transmit-power estimation under wireless fading. [Citation Graph (, )][DBLP]
Fast and quality-guaranteed data streaming in resource-constrained sensor networks. [Citation Graph (, )][DBLP]
Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. [Citation Graph (, )][DBLP]
Strong barrier coverage of wireless sensor networks. [Citation Graph (, )][DBLP]
Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. [Citation Graph (, )][DBLP]
Self-monitoring for sensor networks. [Citation Graph (, )][DBLP]
Symmetric replication for efficient flooding in DHTs. [Citation Graph (, )][DBLP]
P2P-based routing and data management using the virtual cord protocol (VCP). [Citation Graph (, )][DBLP]
An approach to finding weak regions for wireless sensor networks with arbitrary sensing areas. [Citation Graph (, )][DBLP]
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks. [Citation Graph (, )][DBLP]
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. [Citation Graph (, )][DBLP]
Authentication for WiFi - WiBbro-based BWAN interworking. [Citation Graph (, )][DBLP]
Poster abstract: force-based geometric routing. [Citation Graph (, )][DBLP]
Poster abstract: an evaluation study of routing reliability in opportunistic networks. [Citation Graph (, )][DBLP]
A two-level social mobility model for trace generation. [Citation Graph (, )][DBLP]
Poster abstract: scalable and collaborative internet access for opportunistic people networks. [Citation Graph (, )][DBLP]
Mixed altruistic and selfish users in wireless mesh networks: a game theoretic model for multihop bandwidth sharing. [Citation Graph (, )][DBLP]
|