Analytical model for multi agent - call admission in wireless networks
暂无分享,去创建一个
[1] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[2] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[3] Yuguang Fang,et al. Mobility-based call admission control schemes for wireless mobile networks , 2001, Wirel. Commun. Mob. Comput..
[4] S. Shanmugavel,et al. Supporting QoS in MANET by a Fuzzy Priority Scheduler and Performance Analysis with Multicast Routing Protocols , 2005, EURASIP J. Wirel. Commun. Netw..
[5] Raouf Boutaba,et al. Is It Worth Involving Several Cooperating Agents for Multimedia User's Admission in Cellular Networks? , 2001, MMNS.
[6] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[7] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[8] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[9] Raouf Boutaba,et al. Call Admission Control in Mobile Cellular Networks : A Comprehensive Survey , 2004 .
[10] Mineo Takai,et al. Parssec: A Parallel Simulation Environment for Complex Systems , 1998, Computer.
[11] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[12] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[13] K.F. Tsang,et al. 3G mobile network call admission control scheme using Markov chain , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..
[14] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[15] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[16] Ian F. Akyildiz,et al. A resource estimation and call admission algorithm for wireless multimedia networks using the shadow cluster concept , 1997, TNET.
[17] K. Sycara,et al. This Is a Publication of the American Association for Artificial Intelligence Multiagent Systems Multiagent System Issues and Challenges Individual Agent Reasoning Task Allocation Multiagent Planning Recognizing and Resolving Conflicts Managing Communication Modeling Other Agents Managing Resources , 2022 .
[18] K. P. Sycara. Multiagent systems : Special issue on agents , 1998 .
[19] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[20] Rittwik Jana,et al. iMobile EE – An Enterprise Mobile Service Platform , 2003, Wirel. Networks.
[21] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[22] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[23] Bo Li,et al. An enhanced distributed call admission control for wireless systems , 1998, Proceedings Third IEEE Symposium on Computers and Communications. ISCC'98. (Cat. No.98EX166).
[24] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[25] Raouf Boutaba,et al. Weight allocation in distributed admission control for wireless networks , 2005, Comput. Commun..
[26] Mischa Schwartz,et al. Distributed call admission control in mobile/wireless networks , 1996, IEEE J. Sel. Areas Commun..
[27] Gerhard Weiss,et al. Multiagent Systems , 1999 .
[28] Raouf Boutaba,et al. Resource management issues in future wireless multimedia networks , 2000, J. High Speed Networks.
[29] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[30] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[31] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[32] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[33] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[34] Yuguang Fang,et al. Call admission control schemes and performance analysis in wireless mobile networks , 2002, IEEE Trans. Veh. Technol..