© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 12: Secure protocols for.
Routing in Wireless Sensor Network
20121224 meeting standard cell routing via boolean satisfiability_mori ver
1 Ad Hoc Networks Cholatip Yawut Faculty of Information Technology King Mongkut's University of Technology North Bangkok.
A survey on routing protocols for wireless sensor networks Speaker: Kuan-Ta Lu Advisor: Quincy Wu Date: June 9, 2010.
Seongcheol Hong, POSTECHPhD Thesis Defense 1/30 Network Reachability-based IP Prefix Hijacking Detection - PhD Thesis Defense - Seongcheol Hong Supervisor:
Delay Tolerant Networking Jeff Pang Abhijit Deshmukh (with slides borrowed from Kevin Fall, Sushant Jain, Yogita Mehta, and Yong Wang)
Mobile Agents for Adaptive Routing Presented by Hong-Jiun Chen & Manu Prasanna Gianni Di Caro & Marco Dorigo.
Routing algorithms Yaakov (J) Stein Sept 2009 Chief Scientist RAD Data Communications.
Secure Protocols for Behavior Enforcement Slides elaborated by Julien Freudiger and adapted by Jean-Pierre Hubaux Note: this chapter.
Directed acyclic graphs with the unique dipath property