Up a level |
Sankar, Udaya V and Sharma, Vinod (2016) QoS provisioning for multiple Femtocells via game theory. In: COMPUTER NETWORKS, 102 . pp. 70-82.
Bhatia, Ashutosh and Hansdah, RC (2016) TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability. In: COMPUTER NETWORKS, 104 . pp. 79-93.
Sarma, Siddhartha and Kuri, Joy (2015) Optimal power allocation for protective jamming in wireless networks: A flow based model. In: COMPUTER NETWORKS, 81 . pp. 258-271.
Maity, Soumyadev and Hansdah, RC (2014) Self-organized public key management in MANETs with enhanced security and without certificate-chains. In: COMPUTER NETWORKS, 65 . pp. 183-211.
Bhattacharya, Abhijit and Kumar, Anurag (2014) A shortest path tree based algorithm for relay placement in a wireless sensor network and its performance analysis. In: COMPUTER NETWORKS, 71 . pp. 48-62.