1 | -- | 18 | Bugra Gedik, Ling Liu. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms |
19 | -- | 33 | Stephan Eidenbenz, Giovanni Resta, Paolo Santi. The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes |
34 | -- | 49 | Li Bin Jiang, Soung Chang Liew. Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks |
50 | -- | 65 | Jeonghoon Mo, Hoi-sheung Wilson So, Jean C. Walrand. Comparison of Multichannel MAC Protocols |
66 | -- | 80 | Andrew Ka Ho Leung, Yu-Kwong Kwok. On Localized Application-Driven Topology Control for Energy-Efficient Wireless Peer-to-Peer File Sharing |
81 | -- | 94 | Kiran Yedavalli, Bhaskar Krishnamachari. Sequence-Based Localization in Wireless Sensor Networks |
95 | -- | 112 | Stylianos Chatziperis, Polychronis Koutsakis, Michael Paterakis. A New Call Admission Control Mechanism for Multimedia Traffic over Next-Generation Wireless Cellular Networks |
113 | -- | 126 | Vladimir Vishnevsky, Andrey Lyakhov, Alexander Safonov, Shaomin S. Mo, Alexander D. Gelman. Study of Beaconing in Multihop Wireless PAN with Distributed Control |
127 | -- | 139 | Colin Lemmon, Phillip Musumeci. Boundary Mapping and Boundary-State Routing (BSR) in Ad Hoc Networks |