Elizabeth Belding
Elizabeth Belding
Email verificata su - Home page
Citata da
Citata da
Ad-hoc on-demand distance vector routing
CE Perkins, EM Royer
Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99 …, 1999
A review of current routing protocols for ad hoc mobile wireless networks
EM Royer, CK Toh
IEEE personal communications 6 (2), 46-55, 1999
Performance comparison of two on-demand routing protocols for ad hoc networks
CE Perkins, EM Royer, SR Das, MK Marina
Personal Communications, IEEE 8 (1), 16-28, 2001
Performance comparison of two on-demand routing protocols for ad hoc networks
SR Das, CE Perkins, EM Royer
INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and …, 2000
A secure routing protocol for ad hoc networks
K Sanzgiri, B Dahill, BN Levine, C Shields, EM Belding-Royer
10th IEEE International Conference on Network Protocols, 2002. Proceedings …, 2002
Multicast ad hoc on-demand distance vector routing (MAODV)
EM Royer, CE Perkins
Proc. ACM/IEEE International Conference on Mobile Computing and Networking …, 2000
Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks.
KN Ramachandran, EM Belding-Royer, KC Almeroth, MM Buddhikot
Infocom 6, 1-12, 2006
An analysis of the optimum node density for ad hoc mobile networks
EM Royer, PM Melliar-Smith, LE Moser
ICC 2001. IEEE International Conference on Communications. Conference Record …, 2001
Towards realistic mobility models for mobile ad hoc networks
A Jardosh, EM Belding-Royer, KC Almeroth, S Suri
Proceedings of the 9th annual international conference on Mobile computing …, 2003
Multicast ad hoc on-demand distance vector (MAODV) routing
EM Royer, CE Perkins
IETF Internet Draft, draft-ietf-manetmaodv-00. txt, 2000
AODV routing protocol implementation design
ID Chakeres, EM Belding-Royer
24th International Conference on Distributed Computing Systems Workshops …, 2004
Mitigating gender bias in natural language processing: Literature review
T Sun, A Gaut, S Tang, Y Huang, M ElSherief, J Zhao, D Mirza, E Belding, ...
arXiv preprint arXiv:1906.08976, 2019
Authenticated routing for ad hoc networks
K Sanzgiri, D LaFlamme, B Dahill, BN Levine, C Shields, ...
IEEE Journal on selected areas in communications 23 (3), 598-610, 2005
Understanding congestion in IEEE 802.11 b wireless networks
AP Jardosh, KN Ramachandran, KC Almeroth, EM Belding-Royer
Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 25-25, 2005
Internet connectivity for ad hoc mobile networks
Y Sun, EM Belding-Royer, CE Perkins
International journal of wireless information networks 9, 75-88, 2002
Hate lingo: A target-based linguistic analysis of hate speech in social media
M ElSherief, V Kulkarni, D Nguyen, WY Wang, E Belding
Proceedings of the international AAAI conference on web and social media 12 (1), 2018
Blockage and directivity in 60 GHz wireless personal area networks: From cross-layer model to multihop MAC design
S Singh, F Ziliotto, U Madhow, E Belding, M Rodwell
IEEE Journal on Selected Areas in Communications 27 (8), 1400-1413, 2009
An implementation study of the AODV routing protocol
EM Royer, CE Perkins
2000 IEEE Wireless Communications and Networking Conference. Conference …, 2000
Delay tolerant mobile networks (dtmns): Controlled flooding in sparse mobile networks
KA Harras, KC Almeroth, EM Belding-Royer
NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005
On the design and implementation of infrastructure mesh networks
K Ramachandran, M Buddhikot, G Chandranmenon, S Miller, ...
Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh), 4-15, 2005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20