暂无分享,去创建一个
[1] Paulo Mendes,et al. Cooperative relaying in user-centric networking under interference conditions , 2014, IEEE Communications Magazine.
[2] André Zúquete,et al. RelaySpot: A Framework for Opportunistic Cooperative Relaying , 2011 .
[3] André Zúquete,et al. Analysis of hybrid relaying in cooperative WLAN , 2013, 2013 IFIP Wireless Days (WD).
[4] Tauseef Jamal,et al. Cooperative Relaying in User-Centric Wireless Networks , 2014 .
[5] Yang Du,et al. Cooperative MAC for Wireless Networks: Cooperative MAC for Wireless Networks , 2011 .
[6] André Zúquete,et al. Interference-aware opportunistic relay selection , 2011, CoNEXT '11 Student.
[7] André Zúquete,et al. Wireless Cooperative Relaying Based on Opportunistic Relay Selection , 2012 .
[8] Tauseef Jamal. Design and performance of wireless cooperative relaying , 2013 .
[9] André Zúquete,et al. Opportunistic Relay Selection for Wireless Cooperative Network , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[10] Tauseef Jamal,et al. Cooperative Cloudlet for Pervasive Networks , 2017 .
[11] Paulo Mendes,et al. Relay selection approaches for wireless cooperative networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[12] Namusale Chama,et al. UPNs: User-provided Networks, Technical Report: Living-examples, challenges, advantages , 2011 .
[13] Paulo Mendes,et al. Cooperative Relaying for Wireless Local Area Networks , 2014, Wireless Networking for Moving Objects.
[14] Tauseef Jamal,et al. Analysis of Interference in Wireless Networks , 2018, ArXiv.
[15] Tauseef Jamal,et al. Frequent Change Request From User to Handle Cost on Project in Agile Model , 2017 .
[16] Tauseef Jamal,et al. Study of Black Hole Attack in AODV , 2017 .
[17] Waldir Moreira,et al. Cooperative Networking In User-Centric Wireless Networks , 2014 .
[18] Muhammad Alam,et al. Detection and prevention against RTS attacks in wireless LANs , 2017, 2017 International Conference on Communication, Computing and Digital Systems (C-CODE).
[19] Tauseef Jamal,et al. Malicious node analysis in MANETS , 2019 .