dblp: ICDCS 2005 - Workshops (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


25th ICDCS 2005: Columbus, OH, USA - Workshops

jump to- Fourth International Workshop on Assurance in Distributed Systems and Networks (ADSN)
- Second International Workshop on Security in Distributed Computing Systems (SDCS)
- First International Workshop on Services and Infrastructure for the Ubiquitous and Mobile Internet (SIUMI)
- Fourth International Workshop on Distributed Event-Based Systems (DEBS)
- Fifth International Workshop on Smart Appliances and Wearable Computing (IWSAWC)
- Third International Workshop on Mobile Distributed Computing (MDC)
- Seventh International Workshop on Multimedia Network Systems and Applications (MNSA)
- First International Workshop on Mobility in Peer-to-Peer Systems (MPPS)
- Second International Workshop on Wireless Ad Hoc Networking (WWAN)

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA. IEEE Computer Society 2005, ISBN 0-7695-2328-5
Fourth International Workshop on Assurance in Distributed Systems and Networks (ADSN)
Introduction

Message from the Workshops Chair.
Message from the ADSN Chairs.
Workshop Committee Members.
Session 1: Fault-Tolerance and Security

Cristina L. Abad, Indranil Gupta, William Yurcik:
Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. 5-11
Joong Man Kim, Yoshifumi Manabe:
A Byzantine Fault-Tolerant Mutual Exclusion Algorithm and Its Application to Byzantine Fault-Tolerant Storage Systems. 12-19
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda:
Zmail: Zero-Sum Free Market Control of Spam. 20-26
Session 2: Reliability and Stabilization

Chin-Tser Huang, Mohamed G. Gouda:
State Checksum and Its Role in System Stabilization. 29-34
Doina Bein, Ajoy Kumar Datta, Mehmet Hakan Karaata, Safaa Zaman:
An Optimal Snap-Stabilizing Multi-Wave Algorithm. 35-41
Gregory V. Chockler, Murat Demirbas, Seth Gilbert
, Nancy A. Lynch, Calvin C. Newport, Tina Nolte:
Reconciling the Theory and Practice of (Un)Reliable Wireless Broadcast. 42-48
Session 3: Load Balancing

Megumi Hisayuki, Shinji Inoue, Yoshiaki Kakuda, Kenji Toda, Kuniyasu Suzaki:
Dynamic Load Balancing Using Network Transferable Computer. 51-57
Junichi Funasaka, Atsushi Kawano, Kenji Ishida:
Implementation Issues of Parallel Downloading Methods for a Proxy System. 58-64
Wei-Tek Tsai, Yinong Chen, Dawei Zhang, Hai Huang:
Voting Multi-Dimensional Data with Deviations for Web Services under Group Testing. 65-71
Session 4: Adaptive Systems

Hiroyasu Obata, Satoru Takeuchi, Kenji Ishida:
A New TCP Congestion Control Method Considering Adaptability over Satellite Internet. 75-81
Chiping Tang, Philip K. McKinley:
Improving Mutipath Reliability in Topology-Aware Overlay Networks. 82-88
Constandinos X. Mavromoustakis, Helen D. Karatza
:
Bandwidth Clustering for Reliable and Prioritized Network Routing Using Split Agent-Based Method. 89-94
Second International Workshop on Security in Distributed Computing Systems (SDCS)
Introduction

Message from the SDCS Chairs.
Session 1: Network Attack Traceback

Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade:
InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. 99-106
Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang:
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. 107-113
Howard Chivers, Jeremy Jacob:
Specifying Information-Flow Controls. 114-120
Session 2: Internet Infrastructure Security and Intrusion Detection

Yu Chen, Yu-Kwong Kwok, Kai Hwang:
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks. 123-129
Ke Zhang, Soon Tee Teoh, Shih-Ming Tseng, Rattapon Limprasittiporn, Kwan-Liu Ma, Shyhtsun Felix Wu, Chen-Nee Chuah:
Performing BGP Experiments on a Semi-realistic Internet Testbed Environment. 130-136
Adnan Agbaria, Roy Friedman:
A Replication- and Checkpoint-Based Approach for Anomaly-Based Intrusion Detection and Recovery. 137-143
Eivind Naess, Deborah A. Frincke, A. David McKinnon, David E. Bakken:
Configurable Middleware-Level Intrusion Detection for Embedded Systems. 144-151
Session 3: Digital Forensics & Covert Channel Analysis

Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Feng, Jonathan Walpole:
Forensix: A Robust, High-Performance Reconstruction System. 155-162
Yongping Tang, Thomas E. Daniels:
A Simple Framework for Distributed Forensics. 163-169
Zhenghong Wang, Ruby B. Lee:
Capacity Estimation of Non-Synchronous Covert Channels. 170-176
Session 4: Wireless and Sensor Network Security

Harald Vogt:
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks. 179-184
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning:
Defending against Sybil Attacks in Sensor Networks. 185-191
Session 5: Work-in-Progress (WIP) Session

Kalle Burbeck, Simin Nadjm-Tehrani:
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget. 195-202
Natalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov:
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. 203-209
Syed A. Khayam, Hayder Radha:
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks. 210-216
Hyun Seok Kim, Il-Gon Kim, Jin-Young Choi
:
Analysis of Security Protocols with Certificate over Open Networks: Electronic Payment System. 217-223
Onur Demir
, Kanad Ghose:
Real-Time Protection against DDoS Attacks Using Active Gateways. 224-231
First International Workshop on Services and Infrastructure for the Ubiquitous and Mobile Internet (SIUMI)
Introduction

Message from the SIUMI Chairs.
Session 1: Identification and Location Management

Wooseong Kim
, Yang Woo Ko, Soojeon Lee:
A Fast Mobile Node Configuration Using Address Caching in Hybrid Wireless Networks. 237-243
Cristiano di Flora, Massimo Ficco, Stefano Russo
, Vincenzo Vecchio:
Indoor and Outdoor Location Based Services for Portable Wireless Devices. 244-250
Jyh-How Huang, Shivakant Mishra:
A Sensor-Based Tracking System Using Witnesses. 251-255
Session 2: Middleware Support for the Mobile Internet

Raffaella Grieco, Delfina Malandrino, Vittorio Scarano
, Francesco Varriale, Francesca Mazzoni:
An Intermediary Software Infrastructure for Edge Services. 259-265
Claudio Bettini, Nicolò Cesa-Bianchi, Daniele Riboni:
A Distributed Architecture for Management and Retrieval of Extended Points of Interest. 266-272
Michael S. Thompson, Scott F. Midkiff:
Service Description for Pervasive Service Discovery. 273-279
Session 3: Enabling Technologies: Mobile Agents

Paolo Bellavista, Antonio Corradi
, Stefano Monti:
Integrating Web Services and Mobile Agent Systems. 283-290
Tarig Mohamed Ahmed:
Generating Mobile Agent Securely by Using MASL. 291-296
Paolo Bellavista, Antonio Corradi
, Carlo Giannelli
:
Mobile Proxies for Proactive Buffering in Wireless Internet Multimedia Streaming. 297-304
Session 4: Resource-Limited Systems

Minyoung Kim, Hyunok Oh, Nikil D. Dutt
, Alexandru Nicolau, Nalini Venkatasubramanian:
Probability Based Power Aware Error Resilient Coding. 307-313
Hugo Miranda, Luís E. T. Rodrigues:
Using a Fairness Monitoring Service to Improve Load-Balancing in DSR. 314-320
Dmitrii Zagorodnov, Dag Johansen:
The Last Hop of Global Notification Delivery to Mobile Users: Accommodating Volume Limits and Device Constraints. 321-328
Session 5: Context Awareness and Content Adaptation

Claudia Canali
, Valeria Cardellini
, Michele Colajanni, Riccardo Lancellotti
:
Performance Comparison of Distributed Architectures for Content Adaptation and Delivery of Web Resources. 331-337
Domenico Cotroneo, Generoso Paolillo, C. Pirro, Stefano Russo
:
A User-Driven Adaptation Strategy for Mobile Video Streaming Applications. 338-344
Kouji Nishigaki, Keiichi Yasumoto, Naoki Shibata, Minoru Ito, Teruo Higashino:
Framework and Rule-Based Language for Facilitating Context-Aware Computing Using Information Appliances. 345-351
Roberto Boselli
, Federico Cabitza, Flavio De Paoli
, Marco Loregian:
An Adaptive Middleware to Support Context-Aware Knowledge Sharing. 352-358
Fourth International Workshop on Distributed Event-Based Systems (DEBS)
Introduction

Message from the DEBS Chairs.
Session 1: Matching and Multicasting

Satyen Kale, Elad Hazan
, Fengyun Cao, Jaswinder Pal Singh:
Analysis and Algorithms for Content-Based Event Matching. 363-369
Fengyun Cao, Jaswinder Pal Singh:
MEDYM: Match-Early and Dynamic Multicast for Content-Based Publish-Subscribe Service Networks. 370-376
Gianpaolo Cugola, Jose Enrique Munoz de Cote:
On Introducing Location Awareness in Publish-Subscribe Middleware. 377-382
Session 2: Publish-Subscribe with State

Christian Kreibich, Robin Sommer:
Policy-Controlled Event Management for Distributed Intrusion Detection. 385-391
Luis Vargas, Jean Bacon, Ken Moody:
Integrating Databases with Publish/Subscribe. 392-397
Anton Michlmayr, Pascal Fenkam:
Integrating Distributed Object Transactions with Wide-Area Content-Based Publish/Subscribe Systems. 398-403
Session 3: Ad Hoc and Dynamic Topologies

Filipe Araújo, Luís E. T. Rodrigues, Jörg Kaiser, Changling Liu, Carlos Mitidieri:
CHR: A Distributed Hash Table for Wireless Ad Hoc Networks. 407-413
Paolo Costa, Davide Frey:
Publish-Subscribe Tree Maintenance over a DHT. 414-420
Vinod Muthusamy, Milenko Petrovic, Dapeng Gao, Hans-Arno Jacobsen:
Publisher Mobility in Distributed Publish/Subscribe Systems. 421-427
Session 4: Short Papers

Ingar Mæhlum Arntzen, Dag Johansen:
A Stateful and Open Publish-Subscribe Structure for Online Marketplalces. 431-437
Duncan McCaffery, Joe Finney:
Low Latency Optimisation of Content Based Publish Subscribe for Real-Time Mobile Gaming Applications. 438-443
Annika Hinze
, George Buchanan:
A Distributed Alerting Service for Open Digital Library Software. 444-450
Sven Bittner, Annika Hinze
:
On the Benefits of Non-Canonical Filtering in Publish/Subscribe Systems. 451-457
Fifth International Workshop on Smart Appliances and Wearable Computing (IWSAWC)
Introduction

Message from the IWSAWC Chairs.
Session 1: Enabling Technologies and Networking

Albert Krohn, Michael Beigl, Mike Hazas, Hans-Werner Gellersen
:
Using Fine-Grained Infrared Positioning to Support the Surface-Based Activities of Mobile Users. 463-468
Tadashi Yanagihara, Hiroshi Sakakibara, Ryo Ohsawa, Masao Ideuchi, Naohiko Kohtake, Masayuki Iwai, Kazunori Takashio, Hideyuki Tokuda:
A Self Configurable Topology-Aware Network for Smart Materials. 469-474
Session 2: Wearable Computers

Nga Viet Pham, Tsutomu Terada, Masahiko Tsukamoto, Shojiro Nishio:
An Information Retrieval System for Supporting Casual Conversation in Wearable Computing Environments. 477-483
Jakob E. Bardram
, Jonathan Bunde-Pedersen:
IASO - An Activity-Based Computing Platform for Wearable Computing. 484-490
Janna C. Kimel:
Thera-Network: A Wearable Computing Network to Motivate Exercise in Patients Undergoing Physical Therapy. 491-495
Session 3: Novel User Interface

Matthias Kranz, Paul Holleis, Albrecht Schmidt:
DistScroll - A New One-Handed Interaction Device. 499-505
Michael Rohs:
Visual Code Widgets for Marker-Based Interaction. 506-513
Charles Rich, Candy L. Sidner, Neal Lesh, Andrew Garland, Shane Booth, Markus Chimani:
DiamondHelp: A Collaborative Interface Framework for Networked Home Appliances. 514-519
Session 4: Smart Appliances in the Real World

Lasse Kaila, Lauri Lehti, Tero Hakkinen, Pasi Myllymaki, Ville Mäkinen, Jukka Vanhala
:
The BluePost - A Smart Car Heating System. 523-528
Ramy Asselin, Guillermo Ortiz, Jonathan Pui, Asim Smailagic, Christian Kissling:
Implementation and Evaluation of the Personal Wellness Coach. 529-535
Paul Holleis, Matthias Kranz, Marion Gall, Albrecht Schmidt:
Adding Context Information to Digital Photos. 536-542
Third International Workshop on Mobile Distributed Computing (MDC)
Introduction

Message from the MDC Chairs.
Session I: Keynote Address

Jie Wu:
Mobility in Ad Hoc Wireless Networks: A Villain or a Friend?. 547
Session II: Wireless and Ad Hoc Networks

Venkata C. Giruka, Mukesh Singhal:
Angular Routing Protocol for Mobile Ad Hoc Networks. 551-557
Ju Wang, Jonathan C. L. Liu:
Hybrid Uplink Scheduling in an Integrated 3G/WLAN Network with Relaying. 558-563
Doina Bein, Ajoy Kumar Datta, Vincent Villain:
Self-Stabilizing Optimal Local Routing in Ad Hoc Networks. 564-570
Session III: Mobile Distributed Systems

Jiannong Cao, Yang Zhang, Li Xie, Guohong Cao:
Consistency of Cooperative Caching in Mobile Peer-to-Peer Systems over MANET. 573-579
Shiyong Lu, Cheng-Zhong Xu
:
A Formal Framework for Agent Itinerary Specification, Security Reasoning and Logic Analysis. 580-586
Yuhong Feng, Wentong Cai, Jiannong Cao:
Communication Partner Identification in Distributed Job Workflow Execution over the Grid. 587-593
Hasina Abdu:
A Framework for Reconfiguring Mobile Applications. 594-600
Session IV: Wireless Network and Mobile Systems

Rüdiger Kapitza, Hans P. Reiser, Franz J. Hauck:
Stable, Time-Bund Object References in Context of Dynamically Changing Environments. 603-609
Huaizhi Li, Mukesh Singhal:
A Key Establishment Protocol for Bluetooth Scatternets. 610-616
Emmanuel Agu, Kutty Banerjee, Shirish Nilekar, Oleg Rekutin, Diane Kramer:
A Middleware Architecture for Mobile 3D Graphics. 617-623
Xingwei Wang, Cong Liu, Jianye Cui, Min Huang, Sajal K. Das:
A Fair QoS Multicast Routing Scheme for IP/DWDM Optical Internet. 624-629
Session V: Wireless Networks and Mobile Systems (Short Papers)

William Hak-Lim Wong, Joseph Kee-Yin Ng, Wilson M. Yeung:
Wireless LAN Positioning with Mobile Devices in a Library Environment. 633-636
Angelo Brayner, José de Aguiar Moraes Filho:
Increasing Mobile Transaction Concurrency in Dynamically Configurable Environments. 637-641
Xiuqi Li, Jie Wu:
Cluster-Based Intelligent Searching in Unstructured Peer-to-Peer Networks. 642-645
Zhi Zhou, Kin Choong Yow:
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy. 646-651
José Mocito, Liliana Rosa, Nuno Almeida, Hugo Miranda, Luís E. T. Rodrigues, Antónia Lopes:
Context Adaptation of the Communication Stack. 652-655
Fang Qi, Weijia Jia, Jie Wu:
Available Bandwidth Detection with Improved Transport Control Algorithm for Heterogeneous Networks. 656-659
Chun Cao, Jian Lu:
A Path-History-Sensitive Access Control Model for Mobile Agent Environment. 660-663
Ruijun Yang, Qunhua Pan, Weinong Wang, Minglu Li:
Secure Enhancement Scheme for Routing Protocol in Mobile Ad Hoc Networks. 664-667
Seventh International Workshop on Multimedia Network Systems and Applications (MNSA)
Introduction

Message from the MNSA Chairs.
Session 1: Web and Network Applications

Nobuyoshi Sato, Minoru Uehara, Jin Tamaoka, Koichiro Shimomura, Hirobumi Yamamoto, Ken'ichi Kamijo:
A Discrimination System for Identification of Cultivated Products by Trace Elements Analysis - Using Broccoli as an Example. 673-679
Ying-Hong Wang, Wen-Nan Wang, Chu-Chi Huang:
An Intelligent Semantic Agent for Supervising Chat Rooms in e-Learning System. 680-685
Kaoru Sugita, Noriki Uchida, Akihiro Miyakawa, Giuseppe De Marco, Leonard Barolli:
Implementation of WWW Conference System for Supporting Remote Mental Health Care Education. 686-692
Hajime Sogawa, Niwat Thepvilojanapong, Hiroki Saito, Kaoru Sezaki, Yoshito Tobe:
Measurement-Based Peer-to-Peer Grouping for Networked Virtual Environment. 693-697
Lain-Chyr Hwang, Steen J. Hsu, San-Yuan Wang, Yong-Hua Huang:
A Hybrid Scheduling Algorithm with Low Complexity: Jumping Virtual Clock Round Robin. 698-703
Session 2: Multimedia Applications and Systems

Mikio Amano, Daisuke Hironaka, Seio Oda, Valbona Barolli, Genci Capi
, Masao Yokota:
Cross-Media Translation between Human Motions and Texts Based on Mental Image Directed Semantic Theory. 707-713
Michael Repplinger, Florian Winter, Marco Lohse, Philipp Slusallek:
Parallel Bindings in Distributed Multimedia Systems. 714-720
Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:
High Immersive System Aiming at the Collaboration Working over the Japan Gigabit Network II (JGNII). 721-726
Song Wu, Hai Jin, Jie Chu, Kaiqin Fan:
A Novel Cache Scheme for Cluster-Based Streaming Proxy Server. 727-733
Yasutaka Nishimura, Tomoya Enokido, Makoto Takizawa:
Striping Communication Protocol for Reliable Multimedia Communication in a Hierarchical Group. 734-740
Session 3: Network Protocols

Junpei Arai, Akio Koyama, Leonard Barolli:
A New MAC Protocol for Robot Communication and Its Performance Evaluation. 743-748
Mimoza Durresi, Arjan Durresi, Leonard Barolli:
Optimized Geographical Routing Protocol for Inter-Vehicle Communications. 749-755
Tomoya Enokido, Makoto Takizawa:
Concurrency Control Using Role Ordering (RO) Scheduler for Distributed Objects. 756-762
Fumiaki Hirose, Masahiko Fukuhara, Tomoya Hatano, Hiroshi Shigeno, Ken-ichi Okada:
A Two-Level ECN Marking for Fair Bandwidth Allocation between HSTCP and TCP Reno. 763-769
Arjan Durresi, Mukundan Sridharan, Sriram Chellappan, Raj Jain
, Hitai Ozbai, Leonard Barolli:
Control Theory Optimization of MECN in Satellite Networks. 770-776
First International Workshop on Mobility in Peer-to-Peer Systems (MPPS)
Introduction

Message from the MPPS Chairs.
Session 1: Keynote Address

Xiaodong Zhang:
The Power of P2P beyond File Sharing. 781
Session 2: Mobility and Infrastructure

Mario Bisignano, Giuseppe Di Modica
, Orazio Tomarchio
:
JMobiPeer: A Middleware for Mobile Peer-to-Peer Computing in MANETs. 785-791
Jinling Wang, Jiannong Cao, Jing Li:
Supporting Mobile Clients in Publish/Subscribe Systems. 792-798
Hung-Chang Hsiao, Chung-Ta King:
Mobility Churn in DHTs. 799-805
Feng Hong, Minglu Li, Jiadi Yu, Yi Wang:
PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity. 806-811
Session 3: Security and Reliability

Yanmin Zhu, Jinsong Han, Yunhao Liu, Lionel M. Ni, Chunming Hu, Jinpeng Huai:
TruGrid: A Self-Sustaining Trustworthy Grid. 815-821
Feng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi:
QoS Oriented Dynamic Replica Cost Model for P2P Computing. 822-828
Jinsong Han, Yanmin Zhu, Yunhao Liu, Jianfeng Cai, Lei Hu:
Provide Privacy for Mobile P2P Systems. 829-834
Yu Zhang, Xianxian Li, Jinpeng Huai, Yunhao Liu:
Access Control in Peer-to-Peer Collaborative Systems. 835-840
Session 4: Services

Ravindra Sudhindra, Cheng-Zhong Xu
, Sithanshu Shashidhara, Xiaobo Zhou:
NaproxI: A Hash Based Collaborative Proxy System for Content Adaptation. 843-849
Yao-Nan Lien:
Performance Issues of P2P File Sharing over Asymmetric and Wireless Networks. 850-855
Chongnan Gao, Jing Sun, Jinfeng Hu, Ning Ning, Weimin Zheng:
ImDeploy: A Tool for Global-Scale Service Deployment on Peer-to-Peer Networks. 856-860
Second International Workshop on Wireless Ad Hoc Networking (WWAN)
Introduction

Message from the WWAN Chairs.
Session I: Scheduling and MAC Layer

Jelena V. Misic, Vojislav B. Misic, Gonapati Rajashekar Reddy:
On the Performance of Bluetooth Scatternets with Finite Buffers. 865-870
Masanori Sekido, Masanori Takata, Masaki Bandai
, Takashi Watanabe:
Directional NAV Indicators and Orthogonal Routing for Smart Antenna Based Ad Hoc Networks. 871-877
Yang Liu, Yu-Kwong Kwok, Jiangzhou Wang:
A Practical Adaptive Packet Scheduling Algorithm with Single User Fairness Guarantee over the Forward Link of 3G Cellular Data Services. 878-882
Session II: Positioning and Position-Aware Protocols

Hannes Frey, Daniel Görgen:
Geographical Cluster Based Routing in Sensing-Covered Networks. 885-891
Ahmed A. Ahmed, Hongchi Shi, Yi Shang:
SHARP: A New Approach to Relative Localization in Wireless Sensor Networks. 892-898
Masanori Takata, Masaki Bandai
, Takashi Watanabe:
An Extended Directional MAC for Location Information Staleness in Ad Hoc Networks. 899-905
Session III: Self-Organization and Route Discovery

Nathalie Mitton, Eric Fleury, Isabelle Guérin Lassous, Sébastien Tixeuil:
Self-Stabilization in Self-Organized Multihop Wireless Networks. 909-915
Stefaan Seys, Bart Preneel:
The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks. 916-922
Dimitrios Koutsonikolas, Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu:
On Optimal TTL Sequence-Based Route Discovery in MANETs. 923-929
Session IV: Energy Optimized Protocols

Jonathan Hammell, André Weimerskirch, Joao Girão, Dirk Westhoff:
Recognition in a Low-Power Environment. 933-938
Chiping Tang, Philip K. McKinley:
iMobif: An Informed Mobility Framework for Energy Optimization in Wireless Ad Hoc Networks. 939-945
Hao Zhang, Zhong-Ping Jiang:
On Reducing Broadcast Expenses in Ad Hoc Route Discovery. 946-952

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







