Minimum Frequencies for the Virtual Maximum MAC Capacity in a Multichannel Ad-Hoc Network
暂无分享,去创建一个
[1] J. A. Bondy,et al. Graph Theory with Applications , 1978 .
[2] Van Jacobson,et al. Random early detection gateways for congestion avoidance , 1993, TNET.
[3] J. A. Bondy,et al. Graph Theory with Applications , 1978 .
[4] Steven J. Templeton,et al. Detecting spoofed packets , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[5] C.C. Zou,et al. Adaptive Defense Against Various Network Attacks , 2005, IEEE Journal on Selected Areas in Communications.
[6] Yong Pei,et al. On the capacity improvement of ad hoc wireless networks using directional antennas , 2003, MobiHoc '03.
[7] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[8] Mark Handley,et al. Steps towards a DoS-resistant internet architecture , 2004, FDNA '04.
[9] V. Fineberg,et al. A practical architecture for implementing end-to-end QoS in an IP network , 2002, IEEE Commun. Mag..
[10] Tuomas Aura. DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion) , 2000, Security Protocols Workshop.
[11] David Tse,et al. Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.
[12] Danilo Bruschi,et al. Voice over IPsec: analysis and solutions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[13] Jesús Arturo Pérez Díaz,et al. Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).
[14] Panganamala Ramana Kumar,et al. The Number of Neighbors Needed for Connectivity of Wireless Networks , 2004, Wirel. Networks.
[15] Tzi-cker Chiueh,et al. Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[16] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[17] Klaus Wehrle,et al. An Open Architecture for Evaluating Arbitrary Quality of Service Mechanisms in Software Routers , 2001, ICN.
[18] Leandros Tassiulas,et al. Throughput capacity of random ad hoc networks with infrastructure support , 2003, MobiCom '03.
[19] Ratul Mahajan,et al. Controlling high bandwidth aggregates in the network , 2002, CCRV.
[20] Nitin H. Vaidya,et al. Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver , 2004, MobiHoc '04.
[21] Nitin H. Vaidya,et al. Capacity of multi-channel wireless networks: impact of number of channels and interfaces , 2005, MobiCom '05.
[22] Holly Xiao,et al. Quality effects of wireless VoIP using security solutions , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[23] Donald F. Towsley,et al. On the capacity of hybrid wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] Mohammad Zulkernine,et al. Detecting Flooding-Based DDoS Attacks , 2007, 2007 IEEE International Conference on Communications.
[25] Vincenzo Piuri,et al. A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems , 2005, CF '05.
[26] P. Bahl,et al. SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks , 2004, MobiCom '04.
[27] Jelena Mirkovic,et al. Alliance formation for DDoS defense , 2003, NSPW '03.
[28] Madhav V. Marathe,et al. The distance-2 matching problem and its relationship to the MAC-Layer capacity of ad hoc wireless networks , 2004, IEEE Journal on Selected Areas in Communications.
[29] Robert Tappan Morris,et al. Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.
[30] Wei Chen,et al. An active detecting method against SYN flooding attack , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[31] Kartik Gopalan,et al. Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic , 2005, SRUTI.