The SCEAS System
Navigation Menu

Journals in DBLP

Mobile Computing and Communications Review
2002, volume: 6, number: 3

  1. Brian D. Noble
    Scanning the literature. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:1-2 [Journal]
  2. James C. Lin
    Health aspects of wireless communication: health and safety associated with exposure to wireless radiation from personal telecommunication base stations. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:3-6 [Journal]
  3. David B. Johnson, Jean-Pierre Hubaux
    Report on the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002). [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:7-9 [Journal]
  4. Junbiao Zhang, Jun Li, Stephen B. Weinstein, Nan Tu
    Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:10-21 [Journal]
  5. Swades De, Sajal K. Das, Hongyi Wu, Chunming Qiao
    Trigger-based distributed QoS routing in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:22-35 [Journal]
  6. Byung-Gon Chun, Mary Baker
    Evaluation of packet scheduling algorithms in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:36-49 [Journal]
  7. Sheetalkumar Doshi, Shweta Bhandare, Timothy X. Brown
    An on-demand minimum energy routing protocol for a wireless ad hoc network. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:50-66 [Journal]
  8. Sasha Slijepcevic, Seapahn Megerian, Miodrag Potkonjak
    Location errors in wireless embedded sensor networks: sources, models, and effects on applications. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:67-78 [Journal]
  9. Liang Qin, Thomas Kunz
    Pro-active route maintenance in DSR. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:79-89 [Journal]
  10. Charles E. Perkins, Elizabeth M. Belding-Royer
    Introduction to the special feature on the first AODV next generation (AODVng) workshop. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:90-91 [Journal]
  11. Mahesh K. Marina, Samir Ranjan Das
    Ad hoc on-demand multipath distance vector routing. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:92-93 [Journal]
  12. Sung-Ju Lee, Elizabeth M. Belding-Royer, Charles E. Perkins
    Ad hoc on-demand distance-vector routing scalability. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:94-95 [Journal]
  13. Christian Schwingenschlogl, Timothy Kosch
    Geocast enhancements of AODV for vehicular networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:96-97 [Journal]
  14. Yunjung Yi, Mario Gerla
    Scalable AODV with efficient flooding based on on-demand clustering. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:98-99 [Journal]
  15. Ian D. Chakeres, Luke Klein-Berndt
    AODVjr, AODV simplified. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:100-101 [Journal]
  16. Anders Nilsson, Charles E. Perkins, Antti J. Tuominen, Ryuji Wakikawa, Jari T. Malinen
    AODV and IPv6 internet access for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:102-103 [Journal]
  17. Henrik Lundgren, Erik Nordström, Christian F. Tschudin
    The gray zone problem in IEEE 802.11b based ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:104-105 [Journal]
  18. Manel Guerrero Zapata
    Secure ad hoc on-demand distance vector routing. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:106-107 [Journal]
  19. Claude Castelluccia, Gabriel Montenegro
    Protecting AODV against impersonation attacks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:108-109 [Journal]
  20. Gabriel Montenegro, Benjamin Gaidioz, Pascale Primet, Bernard Tourancheau
    Equivalent differentiated services for AODVng. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:110-111 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002