Spelling suggestions: "subject:"computer networks amobile computing."" "subject:"computer networks 0mobile computing.""
1 |
Roaming authentication and end-to-end authentication in wireless securityLong, Men, Wu, Chwan-Hwa. January 2005 (has links) (PDF)
Dissertation (Ph.D.)--Auburn University, 2005. / Abstract. Vita. Includes bibliographic references.
|
2 |
Hardware assisted misbehaving nodes detection in mobile ad hoc networksLiu, Hongxun, January 2007 (has links) (PDF)
Thesis (Ph. D.)--Washington State University, August 2007. / Includes bibliographical references (p. 94-100).
|
3 |
Quality of service routing in mobile ad hoc networks /Chau, Ming Kit. January 2003 (has links)
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 156-159). Also available in electronic version. Access restricted to campus users.
|
4 |
On the performance of probabilistic flooding in wireless mobile ad hoc networksBani Yassein, Muneer O. January 2006 (has links)
Thesis (Ph.D.) - University of Glasgow, 2006. / Ph.D. thesis submitted to the Faculty of Information and Mathematical Sciences, University of Glasgow, 2006. Includes bibliographical references. Print version also available.
|
5 |
Pro-active connection maintenance in a AODV and MAODV /Zhu, Yufang. January 1900 (has links)
Thesis (M.Sc.) - Carleton University, 2002. / Includes bibliographical references (p. 102-108). Also available in electronic format on the Internet.
|
Page generated in 0.0734 seconds