Mobile ad hoc networks

被引:0
|
作者
Campbell, AT [1 ]
Conti, M
Giordano, S
机构
[1] Columbia Univ, Dept Elect Engn, New York, NY 10027 USA
[2] CNR, Inst Informat & Telemat, I-00185 Rome, Italy
[3] EPFL, CH-1015 Lausanne, Switzerland
来源
MOBILE NETWORKS & APPLICATIONS | 2003年 / 8卷 / 05期
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
下载
收藏
页码:483 / 484
页数:2
相关论文
共 50 条
  • [31] Securing Ad Hoc networks by mobile firewall
    Yi, Ping
    Wu, Yue
    Li, Jianhua
    Journal of Information and Computational Science, 2007, 4 (02): : 839 - 850
  • [32] A Multipath Routing for Mobile Ad Hoc Networks
    Zheng Sihai
    Li Layuan
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 355 - 358
  • [33] Multimedia in wireless/mobile ad hoc networks
    Zahariadis, Theodore B.
    Doshi, Bharat T.
    IEEE WIRELESS COMMUNICATIONS, 2006, 13 (05) : 58 - 59
  • [34] On optimal performance in mobile ad hoc networks
    Patra, T. K.
    Kuri, J.
    Nuggehalli, P.
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 404 - +
  • [35] Stability of hierarchical mobile ad hoc networks
    Xu, Yi
    Wang, Wenye
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1232 - 1236
  • [36] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [37] A survey of Attacks in Mobile Ad hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jemili, Arah
    Korbaa, Ouajdi
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [38] Explicit Multicasting for Mobile Ad Hoc Networks
    Lusheng Ji
    M. Scott Corson
    Mobile Networks and Applications, 2003, 8 : 535 - 549
  • [39] Source delay in mobile ad hoc networks
    Gao, Juntao
    Shen, Yulong
    Jiang, Xiaohong
    Li, Jie
    AD HOC NETWORKS, 2015, 24 : 109 - 120
  • [40] A Friend Mechanism for Mobile Ad Hoc Networks
    Razak, Shukor Abd
    Samian, Normalia
    Ma'arof, Mohd. Aizaini
    Furnell, S. M.
    Clarke, N. L.
    Brooke, P. J.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 440 - 448