Sustaining cooperation in multi-hop wireless networks
暂无分享,去创建一个
Ratul Mahajan | David Wetherall | John Zahorjan | Maya Rodrig | Ratul Mahajan | D. Wetherall | J. Zahorjan | Maya Rodrig | Ratul Mahajan
[1] Calvin Newport,et al. The mistaken axioms of wireless-network research , 2003 .
[2] Hector Garcia-Molina,et al. SLIC: a selfish link-based incentive mechanism for unstructured peer-to-peer networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[3] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[4] Ion Stoica,et al. Characterizing selfishly constructed overlay routing networks , 2004, IEEE INFOCOM 2004.
[5] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[6] Scott Shenker,et al. Making greed work in networks: a game-theoretic analysis of switch service disciplines , 1994 .
[7] Alex C. Snoeren,et al. Priority Forwarding in Ad Hoc Networks with Self-Interested Parties , 2003 .
[8] Ratul Mahajan,et al. Controlling high-bandwidth flows at the congested router , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[9] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Sally Floyd,et al. Promoting the use of end-to-end congestion control in the Internet , 1999, TNET.
[11] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[12] Sally Floyd,et al. Congestion Control Principles , 2000, RFC.
[13] Srinivasan Seshan,et al. Selfish behavior and stability of the internet:: a game-theoretic analysis of TCP , 2002, SIGCOMM '02.
[14] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[15] Brian Neil Levine,et al. Cheat-proof playout for centralized and distributed online games , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[16] Alec Wolman,et al. A multi-radio unification protocol for IEEE 802.11 wireless networks , 2004, First International Conference on Broadband Networks.
[17] Robert Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM 2004.
[18] Ramesh Govindan,et al. Understanding packet delivery performance in dense wireless sensor networks , 2003, SenSys '03.
[19] Ion Stoica,et al. Incentives for Cooperation in Peer-to-Peer Networks , 2003 .
[20] Jon Crowcroft,et al. Rethinking incentives for mobile ad hoc networks , 2004, PINS '04.
[21] Ratul Mahajan,et al. Colt ? ? ? ? ? ? ◦ DTAG ? ◦ • ◦ ? ? ? ? ! ◦ ? ? ? ◦ ◦ ? ? Eqip ? ? ? ? ? ? , 2003 .
[22] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[23] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[24] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[25] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[26] Robert Tappan Morris,et al. Performance of multihop wireless networks: shortest path is not enough , 2003, CCRV.
[27] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[28] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[29] Biswanath Mukherjee,et al. Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[30] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[31] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[32] Ratul Mahajan,et al. The causes of path inflation , 2003, SIGCOMM '03.
[33] Stefan Saroiu,et al. A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .
[34] Fernando Paganini,et al. Internet congestion control , 2002 .
[35] Frank Kelly,et al. Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..
[36] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[37] Bhaskaran Raman,et al. Turning 802.11 inside-out , 2004, Comput. Commun. Rev..
[38] David E. Culler,et al. Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.
[39] Haiyun Luo,et al. UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.
[40] Frank Stajano,et al. The Cocaine Auction Protocol: On the Power of Anonymous Broadcast , 1999, Information Hiding.
[41] Dan S. Wallach,et al. Enforcing Fair Sharing of Peer-to-Peer Resources , 2003, IPTPS.
[42] P. R. Kumar,et al. Power Control in Ad-Hoc Networks: Theory, Architecture, Algorithm and Implementation of the COMPOW Protocol , 2002 .