{"title":"Quality of Service Support in Wireless Ad Hoc Networks","authors":"Musfiq Rahman, Ashfaqur Rahman","doi":"10.1007/978-1-84800-328-6_12","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_12","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123018720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Threats in Ad Hoc Routing Protocols","authors":"John Felix Charles Joseph, A. Das, Bu-Sung Lee","doi":"10.1007/978-1-84800-328-6_18","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_18","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114069580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-Configuring, Self-Organizing, and Self-Healing Schemes in Mobile Ad Hoc Networks","authors":"Doina Bein","doi":"10.1007/978-1-84800-328-6_2","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_2","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in Wireless Ad Hoc Networks","authors":"K. Nahrstedt, Wenbo He, Ying Huang","doi":"10.1007/978-1-84800-328-6_16","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_16","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128041260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion Control in Wireless Ad Hoc Networks","authors":"Vinay Kolar, S. Tilak, N. Abu-Ghazaleh","doi":"10.1007/978-1-84800-328-6_15","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_15","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility Management in MANETs: Exploit the Positive Impacts of Mobility","authors":"Feng Li, Yinying Yang, Jie Wu","doi":"10.1007/978-1-84800-328-6_9","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_9","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust Management in Mobile Ad Hoc Networks","authors":"V. Balakrishnan, V. Varadharajan, U. Tupakula","doi":"10.1007/978-1-84800-328-6_19","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_19","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Models for Realistic Mobility and Radio Wave Propagation for Ad Hoc Network Simulations","authors":"M. Günes, Martin Wenig","doi":"10.1007/978-1-84800-328-6_11","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_11","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Properties of Wireless Multihop Networks in Theory and Practice","authors":"Bratislav Milic, M. Malek","doi":"10.1007/978-1-84800-328-6_1","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_1","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123564961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing in Mobile Ad Hoc Networks","authors":"A. Pathan, C. Hong","doi":"10.1007/978-1-84800-328-6_4","DOIUrl":"https://doi.org/10.1007/978-1-84800-328-6_4","url":null,"abstract":"","PeriodicalId":179919,"journal":{"name":"Guide to Wireless Ad Hoc Networks","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123680684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}