Author:
Janson Thomas,Traub-Ens Alexander,Schindelhauer Christian
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference19 articles.
1. Alsbih, A., Janson, T., & Schindelhauer, C. (2011). Analysis of peer-to-peer traffic and user behaviour. In Fourth International Conference on Internet Technologies & Applications (ITA 2011). Wales.
2. Awerbuch, B., Richa, A., & Scheideler, C. (2008). A jamming-resistant mac protocol for single-hop wireless networks. In Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing (pp. 45–54). ACM.
3. Awerbuch, B., Richa, A., Scheideler, C., Schmid, S., & Zhang, J. (2014). Principles of robust medium access and an application to leader election. ACM Transactions on Algorithms, 10(4), 24:1–24:26. doi: 10.1145/2635818 .
4. Bentley, J. L., & Yao, A. C. C. (1976). An almost optimal algorithm for unbounded searching. Information Processing Letters, 5(3), 82–87. doi: 10.1016/0020-0190(76)90071-5 .
5. Chiang, J., & Hu, Y. C. (2011). Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Transactions on Networking, 19(1), 286–298. doi: 10.1109/TNET.2010.2068576 .