|
@comment{x-kbibtex-personnameformatting=<%l><, %f>}
|
|
|
|
@inproceedings{hundeboll2013impact,
|
|
author = "Hundeboll, Martin and Rein, Stephan A and Fitzek, Frank HP",
|
|
booktitle = "{Consumer Communications and Networking Conference (CCNC), 2013 IEEE}",
|
|
organization = "IEEE",
|
|
pages = "381--386",
|
|
title = "{Impact of network coding on delay and throughput in practical wireless chain topologies}",
|
|
url = "http://vbn.aau.dk/ws/files/71109525/paper.pdf",
|
|
year = "2013"
|
|
}
|
|
|
|
@inproceedings{egners2013secure,
|
|
title={Secure roaming and infrastructure sharing for multi-operator wmns},
|
|
author={Egners, Andr{\'e} and Meyer, Ulrike},
|
|
booktitle={Proceedings of the 28th Annual ACM Symposium on Applied Computing},
|
|
pages={1800--1807},
|
|
year={2013},
|
|
url = {https://itsec.rwth-aachen.de/publications/p1800-egners.pdf},
|
|
organization={ACM}
|
|
}
|
|
|
|
@phdthesis{bourdelles2013distributed,
|
|
title={Distributed and Cooperative Intrusion Detection in Wireless Mesh Networks},
|
|
author={Bourdell{\`e}s, Michel},
|
|
year={2013},
|
|
url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.302.5407&rep=rep1&type=pdf},
|
|
school={Citeseer}
|
|
}
|
|
|
|
@phdthesis{reineri2013vehicular,
|
|
title={Vehicular Networks with Infrastructure: Modeling, Simulation and Testbed},
|
|
author={Reineri, Massimo},
|
|
year={2013},
|
|
url={http://porto.polito.it/2506274/1/Reineri_PhDTesi_v2.pdf},
|
|
school={Politecnico di Torino}
|
|
}
|
|
|
|
@inproceedings{raffelsberger2013hybrid,
|
|
title={A hybrid MANET-DTN routing scheme for emergency response scenarios},
|
|
author={Raffelsberger, Christian and Hellwagner, Hermann},
|
|
booktitle={Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on},
|
|
pages={505--510},
|
|
year={2013},
|
|
url={http://www-itec.uni-klu.ac.at/bib/files/PerNEM2013-cr.pdf},
|
|
organization={IEEE}
|
|
}
|
|
|
|
@article{rasmussenenergy,
|
|
title={Energy Consumption in Wireless Mesh Networks},
|
|
author={Rasmussen, Ulrik Wilken},
|
|
url={http://projekter.aau.dk/projekter/files/62825023/10report.pdf}
|
|
}
|
|
|
|
@article{veni2013mobile,
|
|
title={Mobile Ad hoc Network},
|
|
author={Veni, R Marutha and Latha, R},
|
|
journal={International Journal of Science and Research (IJSR)},
|
|
volume={2},
|
|
number={4},
|
|
url={http://www.ijsr.net/archive/v2i4/IJSRON2013649.pdf},
|
|
year={2013}
|
|
}
|
|
|
|
@article{robinson2013aerial,
|
|
title={Aerial MANETs: Developing a Resilient and Efficient Platform for Search and Rescue Applications},
|
|
author={Robinson, William H and Lauf, Adrian P},
|
|
journal={Journal of Communications},
|
|
volume={8},
|
|
number={4},
|
|
url={http://www.researchgate.net/profile/William_Robinson11/publication/236454964_Aerial_MANETs_Developing_a_Resilient_and_Efficient_Platform_for_Search_and_Rescue_Applications/links/00b49517f0388c0a7a000000.pdf},
|
|
year={2013}
|
|
}
|
|
|
|
@inproceedings{wang2010experimental,
|
|
title={Experimental evaluation of IEEE 802.11 s path selection protocols in a mesh testbed},
|
|
author={Wang, JC-P and Hagelstein, Brett and Abolhasan, Mehran},
|
|
booktitle={Signal Processing and Communication Systems (ICSPCS), 2010 4th International Conference on},
|
|
pages={1--3},
|
|
year={2010},
|
|
url={http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2761&context=infopapers},
|
|
organization={IEEE}
|
|
}
|
|
|
|
@article{robinson2013aerial,
|
|
title={AUST: Anonymous Unswerving and Secure Transmission in MANET},
|
|
url={http://www.ijarcsse.com/docs/papers/Special_Issue/icctrd2013/11_ijarcsse.pdf},
|
|
year={2013}
|
|
}
|
|
|
|
@article{yankine2013algoritmi,
|
|
title={Algoritmi di routing su reti mesh wireless},
|
|
author={Yankine, Ibrahim},
|
|
url={http://tesi.cab.unipd.it/43110/1/Algoritmi_di_routing_su_reti_mesh_wireless.pdf},
|
|
year={2013}
|
|
}
|
|
|
|
@article{prasannaenergy,
|
|
title={An Energy Efficient Multicast Routing Based On Genetic Algorithm for MANET},
|
|
author={Prasanna, P and Saravanan, D and Chandrasekaran, RM},
|
|
url={http://www.ijircce.com/upload/2014/icgict14/532_2078.pdf}
|
|
}
|
|
|
|
@inproceedings{abreu2013effective,
|
|
title={An effective attack detection approach in wireless mesh networks},
|
|
author={Abreu, Felipe Barbosa and Morais, Anderson and Cavalli, Ana and Wehbi, Bachar and Montes de Oca, Edgardo},
|
|
booktitle={Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on},
|
|
pages={1450--1455},
|
|
year={2013},
|
|
url={http://www.mallouli.com/recherche/publications/ijssc2014.pdf},
|
|
organization={IEEE}
|
|
}
|
|
|
|
@article{villapolperformance,
|
|
title={PERFORMANCE COMPARISON OF MESH ROUTING PROTOCOLS IN AN EXPERIMENTAL NETWORK WITH BANDWIDTH RESTRICTIONS IN THE BORDER ROUTER},
|
|
author={VILLAPOL, MAR{\'I}A E and ABREU, DAVID P{\'E}REZ and BALDERAMA, CAROLINA and COLOMBO, MARIANA},
|
|
url={http://saber.ucv.ve/ojs/index.php/rev_fiucv/article/viewFile/5181/4989}
|
|
}
|
|
|
|
@article{edmundsevaluating,
|
|
title={Evaluating OLSR and BATMAN over D-STAR},
|
|
author={Edmunds, Bury St},
|
|
url={http://www.tapr.org/pdf/DCC2013-OLSR-BATMAN-EI7IG-G0HWW.pdf}
|
|
}
|
|
|
|
@article{sharmacomparative,
|
|
title={A Comparative Study of BATMAN and OLSR Routing Protocols for MANETs},
|
|
author={Sharma, Aastikta and Rajagopalan, Narendran},
|
|
url={http://warse.org/pdfs/2013/icetcsesp%2003.pdf},
|
|
publisher={Citeseer}
|
|
}
|
|
|
|
@article{ahirwarreview,
|
|
title={A Review Report Better Approach to Mobile Adhoc Network},
|
|
author={Ahirwar, Deshraj and Dhariwal, Mukesh Kumar and Tehariya, Sanjay Kumar and Khan, Azher Ahmed},
|
|
url={http://ijmemr.org/Publication/V1I4/IJMEMR-V1I4-003.pdf}
|
|
}
|
|
|
|
@article{raczsecurity,
|
|
title={A Security Extension for Ad-hoc Routing Protocols},
|
|
url={http://www.uni-ulm.de/fileadmin/website_uni_ulm/iui/Ulmer_Informatik_Berichte/2013/UIB-2013-01.pdf#page=17},
|
|
author={Racz, Peter and Lunn, Andrew and Paatero, Janne}
|
|
}
|
|
|
|
@article{holmbergevaluation,
|
|
title={Evaluation of open source software for mobile ad hoc routing in military tactical networks},
|
|
url={http://publications.lib.chalmers.se/records/fulltext/193942/193942.pdf},
|
|
author={Holmberg, Oscar}
|
|
}
|
|
|
|
@article{kullaimplementation,
|
|
title={Implementation of a Testbed and a Simulation System for MANETs: Experiments and Simulations},
|
|
url={http://www.lib.fit.ac.jp/files/uploads/Elis_KULLA.pdf},
|
|
author={KULLA, Elis}
|
|
}
|
|
|
|
@article{vilhansecure,
|
|
title={Secure access control in distributed environment},
|
|
url={http://acmbulletin.fiit.stuba.sk/abstracts/vilhan2014.pdf},
|
|
author={Vilhan, Peter}
|
|
}
|
|
|
|
@article{sanchez2014approach,
|
|
title={An approach to a cross layer-based QoE improvement for MANET routing protocols},
|
|
author={Sanchez-Iborra, Ramon and Cano, Maria-Dolores},
|
|
journal={Network Protocols and Algorithms},
|
|
volume={6},
|
|
number={3},
|
|
pages={18--34},
|
|
url={http://macrothink.org/journal/index.php/npa/article/viewFile/5827/4930},
|
|
year={2014}
|
|
}
|
|
|
|
@article{gaini2014unobservable,
|
|
title={UnObservable BATMAN Routing for Fast and Secure Transmission in Comparison with USOR},
|
|
author={Gaini, ISujatha and Azeem, Abdul},
|
|
url={http://ijarcst.com/doc/vol2-issue3/ver.2/sujatha_g2.pdf},
|
|
year={2014}
|
|
}
|
|
|
|
@article{hiyamaperformance,
|
|
title={Performance Comparison of OLSR Protocol by Experiments and Simulations for Different TC Packet Intervals},
|
|
url={http://www.researchgate.net/profile/Santi_Caballe/publication/266780262_Performance_Comparison_of_OLSR_Protocol_by_Experiments_and_Simulations_for_Different_TC_Packet_Intervals/links/543bb3330cf24a6ddb9788fe.pdf},
|
|
author={Hiyama, Masahiro and Sakamoto, Shinji and Kulla, Elis and Ikeda, Makoto and Caballe, Santi and Barolli, Leonard}
|
|
}
|
|
|
|
@article{ilyasoverhead,
|
|
title={Overhead reduction methods for Ad hoc routing protocols},
|
|
url={http://www.nngt.org/upload/conference2/p28.pdf},
|
|
author={Ilyas, Bambrik and Didi, Fedoua}
|
|
}
|
|
|
|
@article{hussain2014design,
|
|
title={Design and Implementation of a Testbed for Mobile Adhoc Network Protocols},
|
|
author={Hussain, Akhtar and Khan, Aimel and Qaiser, Abdul Rehman and Akhtar, Muhammad Mohsin and Khalid, Obaidullah and Khan, Muhammad Faisal},
|
|
journal={Computing},
|
|
volume={2},
|
|
number={4},
|
|
pages={42--51},
|
|
url={http://2conserve.com/ict/wp-content/uploads/2014/12/11-test-10.11648.j.wcmc_.20140204.11.pdf},
|
|
year={2014}
|
|
}
|
|
|
|
@article{rajamohan2014video,
|
|
title={Video Streaming Application: Image Quality Analysis of Wireless Ad-hoc Network Routing Protocols},
|
|
author={Rajamohan, Dr P and Leelavathi, Dr R and others},
|
|
journal={International Journal of Scientific Engineering and Technology},
|
|
volume={3},
|
|
number={12},
|
|
pages={1468--1471},
|
|
url={http://ijer.in/ijset/publication/v3s12/IJSET_2014_1212.pdf},
|
|
year={2014}
|
|
}
|
|
|