


default search action
9th MobiHoc 2008: Hong Kong, China
- Xiaohua Jia, Ness B. Shroff, Peng-Jun Wan:

Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30, 2008. ACM 2008, ISBN 978-1-60558-073-9 - Leandros Tassiulas:

Multihop wireless networks: capacity limits and how to approach them. 1-2
Routing and link scheduling I
- Yi Shi, Sushant Sharma, Y. Thomas Hou

, Sastry Kompella:
Optimal relay assignment for cooperative communications. 3-12 - Karthikeyan Sundaresan, Sampath Rangarajan:

On exploiting diversity and spatial reuse in relay-enabled wireless networks. 13-22 - Alessandro Mei

, Julinda Stefa
:
Routing in outer space: fair traffic load in multi-hop wireless networks. 23-32 - Yung Yi, Alexandre Proutière, Mung Chiang:

Complexity in wireless scheduling: impact and tradeoffs. 33-42
Link layer design and rescheduling
- Tie Luo

, Mehul Motani
, Vikram Srinivasan:
Analyzing DISH for multi-channel MAC protocols in wireless networks. 43-52 - Yanjun Sun, Shu Du, Omer Gurewitz, David B. Johnson:

DW-MAC: a low latency, energy efficient demand-wakeup MAC protocol for wireless sensor networks. 53-62 - Shan Chu, Xin Wang:

Opportunistic and cooperative spatial multiplexing in MIMO ad hoc networks. 63-72 - Predrag R. Jelenkovic, Jian Tan:

Dynamic packet fragmentation for wireless channels with failures. 73-82
Distributed algorithms
- Yiwei Wu, Yingshu Li

:
Construction algorithms for k-connected m-dominating sets in wireless sensor networks. 83-90 - Christian Scheideler, Andréa W. Richa, Paolo Santi:

An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model. 91-100 - Mirela Damian, Nagesh Javali:

Distributed construction of bounded-degree low-interference spanners of low weight. 101-110 - Changhee Joo

:
A local greedy scheduling scheme with provable performance guarantee. 111-120
Scaling laws and fundamental limits I
- Liaoruo Wang, Benyuan Liu, Dennis Goeckel, Donald F. Towsley

, Cédric Westphal:
Connectivity in cooperative wireless ad hoc networks. 121-130 - Lixin Wang, Chih-Wei Yi

, F. Frances Yao:
Improved asymptotic bounds on critical transmission radius for greedy forward routing in wireless ad hoc networks. 131-138 - Zhenning Kong, Edmund M. Yeh:

On the latency for information dissemination in mobile wireless networks. 139-148
System design and optimization
- Yi Yang, Sencun Zhu, Guohong Cao:

Improving sensor network immunity under worm attacks: a software diversity approach. 149-158 - Bo Sheng

, Chiu Chiang Tan, Qun Li
, Weizhen Mao:
Finding popular categories for RFID tags. 159-168 - Vinod Namboodiri, Lixin Gao:

Towards energy efficient VoIP over wireless LANs. 169-178
Scaling laws and fundamental limits II
- Zheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garcia-Luna-Aceves:

The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception. 179-188 - XuFei Mao, Xiang-Yang Li, Shaojie Tang:

Multicast capacity for hybrid wireless networks. 189-198 - Petar Momcilovic, Mark S. Squillante:

On throughput in linear wireless networks. 199-208
Routing and link scheduling II
- Wei Cheng, Kai Xing, Xiuzhen Cheng, Xicheng Lu, Zexin Lu, Jinshu Su

, Baosheng Wang, Yujun Liu:
Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks. 209-220 - Robert Zhong Zhou, Jun-Hong Cui:

Energy efficient multi-path communication for time-critical applications in underwater sensor networks. 221-230 - Guoliang Xing, Tian Wang, Weijia Jia

, Minming Li
:
Rendezvous design algorithms for wireless sensor networks with a mobile base station. 231-240
Mobile ad hoc networks
- Pan Hui, Jon Crowcroft, Eiko Yoneki:

Bubble rap: social-based forwarding in delay tolerant networks. 241-250 - Vijay Erramilli, Mark Crovella, Augustin Chaintreau

, Christophe Diot:
Delegation forwarding. 251-260 - Marco Fiore, Jérôme Härri

:
The networking shape of vehicular mobility. 261-272 - Han Cai, Do Young Eun

:
Toward stochastic anatomy of inter-meeting time distribution under general mobility models. 273-282
Game-theoretical aspects
- Xiang-Yang Li, Yanwei Wu, Ping Xu, Guihai Chen

, Mo Li
:
Hidden information and actions in multi-hop wireless ad hoc networks. 283-292 - Xinyu Zhang, Baochun Li:

Dice: a game theoretic framework for wireless multipath network coding. 293-302 - Lin Gao, Xinbing Wang:

A game approach for multi-channel allocation in multi-hop wireless networks. 303-312 - Juncheng Jia, Qian Zhang

:
Competitions and dynamics of duopoly wireless service providers in dynamic spectrum market. 313-322
Communication latency
- Scott C.-H. Huang, Hongwei Du, Eun K. Park:

Minimum-latency gossiping in multi-hop wireless networks. 323-330 - Reza Mahjourian, Feng Chen, Ravi Tiwari, My T. Thai, Hongqiang Zhai, Yuguang Fang

:
An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks. 331-340 - Antonios Skordylis, Niki Trigoni

:
Delay-bounded routing in vehicular ad-hoc networks. 341-350 - Cong Liu, Jie Wu:

Routing in a cyclic mobispace. 351-360
Information processing
- Davood Shamsi, Farinaz Koushanfar

, Miodrag Potkonjak:
Challenging benchmark for location discovery in ad hoc networks: foundations and applications. 361-370 - Brenton D. Walker:

Using persistent homology to recover spatial information from encounter traces. 371-380 - Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho

:
Cooperative transmit-power estimation under wireless fading. 381-390 - Emad Soroush, Kui Wu, Jian Pei

:
Fast and quality-guaranteed data streaming in resource-constrained sensor networks. 391-400
Sensor coverage and monitoring
- Xiaole Bai, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai, Weijia Jia:

Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. 401-410 - Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipulla:

Strong barrier coverage of wireless sensor networks. 411-420 - Ai Chen, Ten-Hwang Lai, Dong Xuan:

Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. 421-430 - Dezun Dong, Yunhao Liu, Xiangke Liao:

Self-monitoring for sensor networks. 431-440
Posters
- Salma Ktari, Mathieu Zoubert, Artur Hecker

, Houda Labiod:
Symmetric replication for efficient flooding in DHTs. 441-442 - Abdalkarim Awad

, Reinhard German, Falko Dressler:
P2P-based routing and data management using the virtual cord protocol (VCP). 443-444 - GaoJun Fan, Shiyao Jin, Wei Cheng:

An approach to finding weak regions for wireless sensor networks with arbitrary sensing areas. 445-446 - Jian (Andrew) Zhang:

BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks. 447-448 - Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo

:
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. 449-450 - Yong Lee, Goo Yeon Lee:

Authentication for WiFi - WiBbro-based BWAN interworking. 451-452 - Cong Liu, Jie Wu:

Poster abstract: force-based geometric routing. 453-454 - Che-Liang Chiou, Ling-Jyh Chen

:
Poster abstract: an evaluation study of routing reliability in opportunistic networks. 455-456 - Sabrina Gaito

, Giuliano Grossi
, Federico Pedersini
:
A two-level social mobility model for trace generation. 457-458 - Ling-Jyh Chen

, Ting-Kai Huang, Che-Liang Chiou:
Poster abstract: scalable and collaborative internet access for opportunistic people networks. 459-460 - Shih-Lung Chao, Guan-Yu Lin, Hung-Yu Wei

:
Mixed altruistic and selfish users in wireless mesh networks: a game theoretic model for multihop bandwidth sharing. 461-462

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














