Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems
暂无分享,去创建一个
[1] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[2] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[3] Djamel Djenouri,et al. Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks , 2005, IPOM.
[4] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[5] Djamel Djenouri,et al. New power-aware routing protocol for mobile ad hoc networks , 2006, Int. J. Ad Hoc Ubiquitous Comput..
[6] Xiang-Yang Li,et al. Low-cost routing in selfish and rational wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[7] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[8] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[9] Marco Conti,et al. Improving the performability of data transfer in mobile ad hoc networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..
[10] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[11] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[12] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[13] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[14] Mario Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[17] D. Djenouri,et al. A novel approach for sel sh nodes detection in MANETs: proposal and Petri nets based modeling , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..
[18] Djamel Djenouri,et al. Simulation Performance Evaluation of an Energy Efficient Routing Protocol for Mobile Ad Hoc Networks , 2004, The IEEE/ACS International Conference on Pervasive Services.
[19] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[20] Sheng Zhong,et al. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques , 2005, MobiCom '05.
[21] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[22] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[23] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[24] Timothy X. Brown,et al. Minimum Energy Routing Schemes for a Wireless Ad Hoc Network , 2002 .
[25] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[26] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[27] M. Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).