![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
8th Q2SWinet 2012: Paphos, Cyprus
- Peter Mueller, Jalel Ben-Othman, Raffaele Bruno:
Q2SWinet'12, Proceedings of the Eighth ACM Symposium on QoS and Security for Wireless and Mobile Networks, Paphos, Cyprus, October 24-25, 2012. ACM 2012, ISBN 978-1-4503-1619-4
Optimization issues in wireless networks
- Julien Boite, Vania Conan, Gérard Nguengang, Mathieu Bouet, Alain Ploix, Dominique Gaïti:
Scaling end-to-end measurements in heterogeneous wireless mesh networks. 1-8 - Fabien Esmiol, Stéphane Rousseau, Vania Conan, Christian Bonnet
:
Near optimal multicoloring for inter-cluster interference avoidance. 9-16 - James Gross, Marco Weyres, Adam Wolisz:
Effective service capacity analysis of opportunistic multi-carrier OFDMA systems. 17-26
QoS in wireless ad hoc and sensor networks
- Elias Yaacoub
, Abdullah Kadri, Adnan A. Abu-Dayya:
An energy-efficient M2M communication method for leakage detection in underground water pipes. 27-32 - Slim Rekhis
, Nourhene Ellouze, Noureddine Boudriga:
A wireless sensor network based water monitoring system. 33-40 - Elias Yaacoub
, Adnan A. Abu-Dayya:
Enhancing the QoS of real-time video streaming over LTE MBMS using D2D communications. 41-46
Security in wireless networks I
- Rodrigo do Carmo, Marc Werner, Matthias Hollick:
Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks. 47-54 - Ioana Rodhe, Christian Rohner, Edith C. H. Ngai:
On location privacy and quality of information in participatory sensing. 55-62
Security in wireless networks II
- Osama Abumansoor, Azzedine Boukerche:
Preventing a DoS threat in vehicular ad-hoc networks using adaptive group beaconing. 63-70 - Lukas Malina, Jan Hajny, Vaclav Zeman:
Group signatures for secure and privacy preserving vehicular ad hoc networks. 71-74 - Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi, Abderrahmane Lakas
:
Unthresholded adaptive revocation technique in mobile ad hoc networks. 75-78
Poster session
- Elias Yaacoub
, Abdullah Kadri, Adnan A. Abu-Dayya:
Cooperative wireless sensor networks for green internet of things. 79-80 - Htoo Aung Maw, Hannan Xiao
, Bruce Christianson:
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. 81-84 - Garima Gupta, Preeti Nagrath
, Sandhya Aneja
, Neelima Gupta:
Reference based approach to mitigate blackhole attacks in delay tolerant networks. 85-88
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.