Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference21 articles.
1. Sutton, G. J., Liu, R. P., & Guo, Y. J. (2018). Delay and reliability of load-based listen-before-talk in LAA. IEEE Access, 6, 6171–6182. https://doi.org/10.1109/ACCESS.2017.2785845.
2. Katti, S., Rahul, H., Hu, W., Katabi, D., Medard, M., & Crowcroft, J. (2006). XORs in the air: Practical wireless network coding. In SIGCOMM’06, September 11–15, Pisa, Italy.
3. Chachulski, S., Jennings, M., Katti, S., & Katabi, D. (2006). MORE: A network coding approach to opptunistic routing. In Computer science and artificial intelligence laboratory, MIT-CSAIL-TR-2006-049, June 30.
4. Thorat, S. A., Kulkarni, P. J., & Yadav, S. V. (2017). Formal verification of opportunistic routing protocol using SPIN model checker. In 2017 international conference on energy, communication, data analytics and soft computing (ICECDS) (pp. 2717–2722). Chennai. https://doi.org/10.1109/icecds.2017.8389948.
5. Ben Fradj, H., Anane, R., Bouallegue, M., & Bouallegue, R. (2017). A range-based opportunistic routing protocol for wireless sensor networks. In 2017 13th international wireless communications and mobile computing conference (IWCMC) (pp. 770–774). Valencia. https://doi.org/10.1109/IWCMC.2017.7986382.