Abstract is missing.
- Simulations in wireless sensor and ad hoc networksIvan Stojmenovic. 1-2 [doi]
- Distinguishing between connectivity, intermittent connectivity, and intermittent disconnectivityKevin C. Almeroth. 1-2 [doi]
- The geometry of mobilityLeonidas J. Guibas. 1 [doi]
- Scheduling algorithms for multi-carrier wireless data systemsMatthew Andrews, Lisa Zhang. 3-14 [doi]
- Superimposed code based channel assignment in multi-radio multi-channel wireless mesh networksKai Xing, Xiuzhen Cheng, Liran Ma, Qilian Liang. 15-26 [doi]
- Optimal channel probing and transmission scheduling for opportunistic spectrum accessNicholas B. Chang, Mingyan Liu. 27-38 [doi]
- Trade-offs between mobility and density for coverage in wireless sensor networksWei Wang 0002, Vikram Srinivasan, Kee Chaing Chua. 39-50 [doi]
- Rendered path: range-free localization in anisotropic sensor networks with holesMo Li, Yunhao Liu. 51-62 [doi]
- Designing localized algorithms for barrier coverageAi Chen, Santosh Kumar, Ten-Hwang Lai. 63-74 [doi]
- Reliable density estimates for coverage and connectivity in thin strips of finite lengthPaul Balister, Béla Bollobás, Amites Sarkar, Santosh Kumar. 75-86 [doi]
- DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networksJuan José Jaramillo, R. Srikant. 87-98 [doi]
- 802.11 user fingerprintingJeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, David Wetherall. 99-110 [doi]
- Robust location distinction using temporal link signaturesNeal Patwari, Sneha Kumar Kasera. 111-122 [doi]
- Mining call and mobility data to improve paging efficiency in cellular networksHui Zang, Jean Bolot. 123-134 [doi]
- Adaptive network coding and scheduling for maximizing throughput in wireless networksPrasanna Chaporkar, Alexandre Proutiere. 135-146 [doi]
- Beyond the bits: cooperative packet recovery using physical layer informationGrace R. Woo, Pouya Kheradpour, Dawei Shen, Dina Katabi. 147-158 [doi]
- Crossing over the bounded domain: from exponential to power-law inter-meeting time in manetHan Cai, Do Young Eun. 159-170 [doi]
- A general model of wireless interferenceLili Qiu, Yin Zhang, Feng Wang, Mi Kyung Han, Ratul Mahajan. 171-182 [doi]
- Power law and exponential decay of inter contact times between mobile devicesThomas Karagiannis, Jean-Yves Le Boudec, Milan Vojnovic. 183-194 [doi]
- Study of a bus-based disruption-tolerant network: mobility modeling and impact on routingXiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley, Honggang Zhang. 195-206 [doi]
- Challenges: towards truly scalable ad hoc networksJ. J. Garcia-Luna-Aceves, Hamid R. Sadjadpour, Zheng Wang. 207-214 [doi]
- Challenge: peers on wheels - a road to new traffic information systemsJedrzej Rybicki, Björn Scheuermann, Wolfgang Kieß, Christian Lochert, Pezhman Fallahi, Martin Mauve. 215-221 [doi]
- Challenges: device-free passive localization for wireless environmentsMoustafa Youssef, Matthew Mah, Ashok K. Agrawala. 222-229 [doi]
- Adaptive contact probing mechanisms for delay tolerant applicationsWei Wang 0002, Vikram Srinivasan, Mehul Motani. 230-241 [doi]
- A measurement-based approach to modeling link capacity in 802.11-based wireless networksAnand Kashyap, Samrat Ganguly, Samir R. Das. 242-253 [doi]
- MDG: measurement-driven guidelines for 802.11 wlan designIoannis Broustis, Konstantina Papagiannaki, Srikanth V. Krishnamurthy, Michalis Faloutsos, Vivek Mhatre. 254-265 [doi]
- Multicast capacity for large scale wireless ad hoc networksXiangyang Li, ShaoJie Tang, Ophir Frieder. 266-277 [doi]
- On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networksSheng Zhong, Fan Wu. 278-289 [doi]
- Weak state routing for large scale dynamic networksUtku Gunay Acer, Shivkumar Kalyanaraman, Alhussein A. Abouzeid. 290-301 [doi]
- Revisiting minimum cost reliable routing in wireless mesh networksGentian Jakllari, Stephan Eidenbenz, Nicolas W. Hengartner, Srikanth V. Krishnamurthy, Michalis Faloutsos. 302-305 [doi]
- Practical network coding in wireless networksQunfeng Dong, Jianming Wu, Wenjun Hu, Jon Crowcroft. 306-309 [doi]
- SecNav: secure broadcast localization and time synchronization in wireless networksKasper Bonne Rasmussen, Srdjan Capkun, Mario Cagalj. 310-313 [doi]
- Real-time implications of multiple transmission rates in wireless networksVartika Bhandari, Vivek Raghunathan, Bach Duy Bui, Marco Caccamo. 314-317 [doi]
- Towards context-aware wireless spectrum agilityAshwini Kumar, Kang Shin. 318-321 [doi]
- Altruistic cooperation for energy-efficient multi-channel MAC protocolsTie Luo, Mehul Motani, Vikram Srinivasan. 322-325 [doi]
- Self-healing multi-radio wireless mesh networksKyu-Han Kim, Kang G. Shin. 326-329 [doi]
- Superposition coding for wireless mesh networksLi (Erran) Li, Richard Alimi, Ramachandran Ramjee, Jingpu Shi, Yanjun Sun, Harish Viswanathan, Yang Richard Yang. 330-333 [doi]
- Authentication on the edge: distributed authentication for a global open wi-fi networkNathanael Thompson, Petros Zerfos, Haiyun Luo, Jatinder Pal Singh, Zuoning Yin. 334-337 [doi]
- Mining behavioral groups in large wireless LANsWei-jen Hsu, Debojyoti Dutta, Ahmed Helmy. 338-341 [doi]
- Interference mitigation in enterprise wlans through speculative schedulingNabeel Ahmed, Vivek Shrivastava, Arunesh Mishra, Suman Banerjee, Srinivasan Keshav, Konstantina Papagiannaki. 342-345 [doi]
- Cross-layer jamming detection and mitigation in wireless broadcast networksJerry T. Chiang, Yih-Chun Hu. 346-349 [doi]
- Understanding the effect of access point density on wireless LAN performanceMesut Ali Ergin, Kishore Ramachandran, Marco Gruteser. 350-353 [doi]
- Low-overhead channel-aware rate adaptationGlenn Judd, Xiaohui Wang, Peter Steenkiste. 354-357 [doi]