Abstract is missing.
- Multihop wireless networks: capacity limits and how to approach themLeandros Tassiulas. 1-2 [doi]
- Optimal relay assignment for cooperative communicationsYi Shi, Sushant Sharma, Y. Thomas Hou, Sastry Kompella. 3-12 [doi]
- On exploiting diversity and spatial reuse in relay-enabled wireless networksKarthikeyan Sundaresan, Sampath Rangarajan. 13-22 [doi]
- Routing in outer space: fair traffic load in multi-hop wireless networksAlessandro Mei, Julinda Stefa. 23-32 [doi]
- Complexity in wireless scheduling: impact and tradeoffsYung Yi, Alexandre Proutiere, Mung Chiang. 33-42 [doi]
- Analyzing DISH for multi-channel MAC protocols in wireless networksTie Luo, Mehul Motani, Vikram Srinivasan. 43-52 [doi]
- DW-MAC: a low latency, energy efficient demand-wakeup MAC protocol for wireless sensor networksYanjun Sun, Shu Du, Omer Gurewitz, David B. Johnson. 53-62 [doi]
- Opportunistic and cooperative spatial multiplexing in MIMO ad hoc networksShan Chu, Xin Wang. 63-72 [doi]
- Dynamic packet fragmentation for wireless channels with failuresPredrag R. Jelenkovic, Jian Tan. 73-82 [doi]
- Construction algorithms for k-connected m-dominating sets in wireless sensor networksYiwei Wu, Yingshu Li. 83-90 [doi]
- An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference modelChristian Scheideler, Andréa W. Richa, Paolo Santi. 91-100 [doi]
- Distributed construction of bounded-degree low-interference spanners of low weightMirela Damian, Nagesh Javali. 101-110 [doi]
- A local greedy scheduling scheme with provable performance guaranteeChanghee Joo. 111-120 [doi]
- Connectivity in cooperative wireless ad hoc networksLiaoruo Wang, Benyuan Liu, Dennis Goeckel, Donald F. Towsley, Cédric Westphal. 121-130 [doi]
- Improved asymptotic bounds on critical transmission radius for greedy forward routing in wireless ad hoc networksLixin Wang, Chih-Wei Yi, F. Frances Yao. 131-138 [doi]
- On the latency for information dissemination in mobile wireless networksZhenning Kong, Edmund M. Yeh. 139-148 [doi]
- Improving sensor network immunity under worm attacks: a software diversity approachYi Yang, Sencun Zhu, Guohong Cao. 149-158 [doi]
- Finding popular categories for RFID tagsBo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao. 159-168 [doi]
- Towards energy efficient VoIP over wireless LANsVinod Namboodiri, Lixin Gao. 169-178 [doi]
- The capacity and energy efficiency of wireless ad hoc networks with multi-packet receptionZheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garcia-Luna-Aceves. 179-188 [doi]
- Multicast capacity for hybrid wireless networksXufei Mao, Xiang-Yang Li, ShaoJie Tang. 189-198 [doi]
- On throughput in linear wireless networksPetar Momcilovic, Mark S. Squillante. 199-208 [doi]
- Route recovery in vertex-disjoint multipath routing for many-to-one sensor networksWei Cheng, Kai Xing, Xiuzhen Cheng, Xicheng Lu, Zexin Lu, Jinshu Su, Baosheng Wang, Yujun Liu. 209-220 [doi]
- Energy efficient multi-path communication for time-critical applications in underwater sensor networksZhong Zhou, Jun-Hong Cui. 221-230 [doi]
- Rendezvous design algorithms for wireless sensor networks with a mobile base stationGuoliang Xing, Tian Wang, Weijia Jia, Minming Li. 231-240 [doi]
- Bubble rap: social-based forwarding in delay tolerant networksPan Hui, Jon Crowcroft, Eiko Yoneki. 241-250 [doi]
- Delegation forwardingVijay Erramilli, Mark Crovella, Augustin Chaintreau, Christophe Diot. 251-260 [doi]
- The networking shape of vehicular mobilityMarco Fiore, Jérôme Härri. 261-272 [doi]
- Toward stochastic anatomy of inter-meeting time distribution under general mobility modelsHan Cai, Do Young Eun. 273-282 [doi]
- Hidden information and actions in multi-hop wireless ad hoc networksXiang-Yang Li, Yanwei Wu, Ping Xu, Guihai Chen, Mo Li. 283-292 [doi]
- Dice: a game theoretic framework for wireless multipath network codingXinyu Zhang, Baochun Li. 293-302 [doi]
- A game approach for multi-channel allocation in multi-hop wireless networksLin Gao, Xinbing Wang. 303-312 [doi]
- Competitions and dynamics of duopoly wireless service providers in dynamic spectrum marketJuncheng Jia, Qian Zhang. 313-322 [doi]
- Minimum-latency gossiping in multi-hop wireless networksScott C.-H. Huang, Hongwei Du, E-K. Park. 323-330 [doi]
- An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networksReza Mahjourian, Feng Chen, Ravi Tiwari, My T. Thai, Hongqiang Zhai, Yuguang Fang. 331-340 [doi]
- Delay-bounded routing in vehicular ad-hoc networksAntonios Skordylis, Niki Trigoni. 341-350 [doi]
- Routing in a cyclic mobispaceCong Liu, Jie Wu. 351-360 [doi]
- Challenging benchmark for location discovery in ad hoc networks: foundations and applicationsDavood Shamsi, Farinaz Koushanfar, Miodrag Potkonjak. 361-370 [doi]
- Using persistent homology to recover spatial information from encounter tracesBrenton D. Walker. 371-380 [doi]
- Cooperative transmit-power estimation under wireless fadingMurtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho. 381-390 [doi]
- Fast and quality-guaranteed data streaming in resource-constrained sensor networksEmad Soroush, Kui Wu, Jian Pei. 391-400 [doi]
- Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networksXiaole Bai, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai, Weijia Jia. 401-410 [doi]
- Strong barrier coverage of wireless sensor networksBenyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipulla. 411-420 [doi]
- Measuring and guaranteeing quality of barrier-coverage in wireless sensor networksAi Chen, Ten-Hwang Lai, Dong Xuan. 421-430 [doi]
- Self-monitoring for sensor networksDezun Dong, Yunhao Liu, Xiangke Liao. 431-440 [doi]
- Symmetric replication for efficient flooding in DHTsSalma Ktari, Mathieu Zoubert, Artur Hecker, Houda Labiod. 441-442 [doi]
- P2P-based routing and data management using the virtual cord protocol (VCP)Abdalkarim Awad, Reinhard German, Falko Dressler. 443-444 [doi]
- An approach to finding weak regions for wireless sensor networks with arbitrary sensing areasGaoJun Fan, Shiyao Jin, Wei Cheng. 445-446 [doi]
- BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networksJian Zhang. 447-448 [doi]
- A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networksChia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo. 449-450 [doi]
- Authentication for WiFi - WiBbro-based BWAN interworkingYong Lee, Goo Yeon Lee. 451-452 [doi]
- Poster abstract: force-based geometric routingCong Liu, Jie Wu. 453-454 [doi]
- Poster abstract: an evaluation study of routing reliability in opportunistic networksChe-Liang Chiou, Ling-Jyh Chen. 455-456 [doi]
- A two-level social mobility model for trace generationSabrina Gaito, Giuliano Grossi, Federico Pedersini. 457-458 [doi]
- Poster abstract: scalable and collaborative internet access for opportunistic people networksLing-Jyh Chen, Ting-Kai Huang, Che-Liang Chiou. 459-460 [doi]
- Mixed altruistic and selfish users in wireless mesh networks: a game theoretic model for multihop bandwidth sharingShih-Lung Chao, Guan-Yu Lin, Hung-Yu Wei. 461-462 [doi]