ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A new scheme for effective MAC-layer DiffServ supports in mobile ad hoc networks and multihop wireless LANs
2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514)
◽
10.1109/vetecs.2004.1390654
◽
2005
◽
Author(s):
Chi-Hsiang Yeh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Wireless Lans
◽
Mac Layer
◽
Multihop Wireless
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Collision-controlled multiple access for mobile ad hoc networks and multihop wireless LANs
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004
◽
10.1109/vetecf.2004.1404628
◽
2005
◽
Cited By ~ 1
Author(s):
Chi-Hsiang Yeh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Multiple Access
◽
Ad Hoc
◽
Wireless Lans
◽
Multihop Wireless
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A collision-controlled MAC protocol for mobile ad hoc networks and multihop wireless LANs
IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
◽
10.1109/glocom.2004.1378083
◽
2005
◽
Author(s):
Chi-Hsiang Yeh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mac Protocol
◽
Wireless Lans
◽
Multihop Wireless
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Interference-controlled multiple access for mobile ad hoc networks and multihop wireless LANs
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004
◽
10.1109/vetecf.2004.1400583
◽
2005
◽
Author(s):
Chi-Hsiang Yeh
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Multiple Access
◽
Ad Hoc
◽
Wireless Lans
◽
Multihop Wireless
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A power-controlled multiple access scheme for differentiated service and energy efficiency in mobile ad hoc networks and wireless LANs
14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003.
◽
10.1109/pimrc.2003.1264377
◽
2004
◽
Author(s):
Chi-Hsiang Yeh
◽
Tiantong You
Keyword(s):
Energy Efficiency
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Multiple Access
◽
Ad Hoc
◽
Wireless Lans
◽
Differentiated Service
◽
Access Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
The Trust-Based MAC - Layer Security Protocol for Mobile Ad Hoc Networks
2010 International Conference on Computational Intelligence and Software Engineering
◽
10.1109/wicom.2010.5600904
◽
2010
◽
Cited By ~ 13
Author(s):
A. Rajaram
◽
S. Palaniswami
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Protocol
◽
Mac Layer
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Performance Evaluation of Link Quality Extension in Multihop Wireless Mobile Ad-hoc Networks
2009 International Conference on Complex, Intelligent and Software Intensive Systems
◽
10.1109/cisis.2009.101
◽
2009
◽
Cited By ~ 3
Author(s):
Makoto Ikeda
◽
Leonard Barolli
◽
Masahiro Hiyama
◽
Giuseppe De Marco
◽
Tao Yang
◽
...
Keyword(s):
Performance Evaluation
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Link Quality
◽
Multihop Wireless
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Wireless Mobile
Download Full-text
A Reliable and Efficient MAC Layer Broadcast Protocol for Mobile Ad Hoc Networks
IEEE Transactions on Vehicular Technology
◽
10.1109/tvt.2007.897654
◽
2007
◽
Vol 56
(4)
◽
pp. 2296-2305
◽
Cited By ~ 17
Author(s):
Chun-Yuan Chiu
◽
E.H.-K. Wu
◽
Gen-Huey Chen
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mac Layer
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Broadcast Protocol
Download Full-text
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
◽
10.1109/icdcs.2006.28
◽
2006
◽
Cited By ~ 10
Author(s):
V.N. Lolla
◽
Lap Kong Law
◽
S.V. Krishnamurthy
◽
C. Ravishankar
◽
D. Manjunath
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mac Layer
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Real-time detection of MAC layer misbehavior in mobile ad hoc networks
Applied Computing and Informatics
◽
10.1016/j.aci.2015.11.001
◽
2017
◽
Vol 13
(1)
◽
pp. 1-9
◽
Cited By ~ 5
Author(s):
Abdessadek Aaroud
◽
Mohammed-Alamine El Houssaini
◽
Ali El Hore
◽
Jalel Ben-Othman
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Real Time
◽
Ad Hoc
◽
Mac Layer
◽
Mobile Ad Hoc
◽
Real Time Detection
◽
Hoc Networks
Download Full-text
DDoS Attacks at MAC Layer in Tactical Mobile Ad Hoc Networks
2010 International Conference on Communications and Intelligence Information Security
◽
10.1109/icciis.2010.11
◽
2010
◽
Cited By ~ 1
Author(s):
Rui Xu
◽
Zemao Zhao
◽
Fei He
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Ddos Attacks
◽
Mac Layer
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close