An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks (English)
- New search for: Peng, Yuhuai
- New search for: Yu, Yao
- New search for: Guo, Lei
- New search for: Jiang, Dingde
- New search for: Gai, Qiming
- New search for: Peng, Yuhuai
- New search for: Yu, Yao
- New search for: Guo, Lei
- New search for: Jiang, Dingde
- New search for: Gai, Qiming
In:
Journal of Network and Computer Applications
;
36
, 2
;
843-857
;
2012
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks
-
Contributors:Peng, Yuhuai ( author ) / Yu, Yao ( author ) / Guo, Lei ( author ) / Jiang, Dingde ( author ) / Gai, Qiming ( author )
-
Published in:Journal of Network and Computer Applications ; 36, 2 ; 843-857
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2012-11-03
-
Size:15 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 36, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 567
-
A survey of network flow applicationsLi, Bingdong / Springer, Jeff / Bebis, George / Hadi Gunes, Mehmet et al. | 2012
- 582
-
Securing DSR against wormhole attacks in multirate ad hoc networksQazi, Shams / Raad, Raad / Mu, Yi / Susilo, Willy et al. | 2012
- 593
-
A survey and tutorial of wireless relay network protocols based on network codingHassan Mohammed, Ahmed / Dai, Bin / Huang, Benxiong / Azhar, Muhammad / Xu, Guan / Qin, Peng / Yu, Shui et al. | 2012
- 611
-
Dynamic key management in wireless sensor networks: A surveyHe, Xiaobing / Niedermeier, Michael / de Meer, Hermann et al. | 2012
- 623
-
A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networksTyagi, Sudhanshu / Kumar, Neeraj et al. | 2012
- 646
-
Classification of malware based on integrated static and dynamic featuresIslam, Rafiqul / Tian, Ronghua / Batten, Lynn M. / Versteeg, Steve et al. | 2012
- 657
-
Fast and deterministic hash table lookup using discriminative bloom filtersHuang, Kun / Xie, Gaogang / Li, Rui / Xiong, Shuai et al. | 2012
- 667
-
Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approachWang, Chiapin et al. | 2012
- 677
-
Windows Mobile LiveSD ForensicsCanlar, Eyüp S. / Conti, Mauro / Crispo, Bruno / Di Pietro, Roberto et al. | 2012
- 685
-
Position-based routing in vehicular networks: A surveyBilal, Sardar Muhammad / Bernardos, Carlos Jesus / Guerrero, Carmen et al. | 2012
- 698
-
Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologiesKretschmer, M. / Batroff, P. / Ghinea, G. et al. | 2012
- 711
-
Combination of data replication and scheduling algorithm for improving data availability in Data GridsMansouri, Najme / Dastghaibyfard, Gholam Hosein / Mansouri, Ehsan et al. | 2012
- 723
-
Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively 2-class priority routing trafficVasiliadis, D.C. / Rizos, G.E. / Vassilakis, C. et al. | 2012
- 738
-
TSOIA: An efficient node selection algorithm facing the uncertain process for Internet of ThingsLuo, Shiliang / Lu, Xu / Cheng, Lianglun et al. | 2012
- 744
-
A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETsCervera, Gimer / Barbeau, Michel / Garcia-Alfaro, Joaquin / Kranakis, Evangelos et al. | 2012
- 756
-
Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networksLian, Kuang-Yow / Hsiao, Sung-Jung / Sung, Wen-Tsai et al. | 2012
- 768
-
Re-examining the performance bottleneck in a NIDS with detailed profilingLin, Po-Ching / Lee, Jia-Hau et al. | 2012
- 781
-
Quantitative survivability evaluation of three virtual machine-based server architecturesYang, Yan / Zhang, Yulong / Wang, Alex Hai / Yu, Meng / Zang, Wanyu / Liu, Peng / Jajodia, Sushil et al. | 2012
- 791
-
A novel model for user clicks identification based on hidden semi-MarkovXu, C. / Du, C. / Zhao, G.F. / Yu, S. et al. | 2012
- 799
-
Research on social relations cognitive model of mobile nodes in Internet of ThingsAn, Jian / Gui, Xiaolin / Zhang, Wendong / Jiang, Jinhua / Yang, Jianwei et al. | 2012
- 811
-
A virtual square grid-based coverage algorithm of redundant node for wireless sensor networkLiu, Yanheng / Suo, Longxiang / Sun, Dayang / Wang, Aimin et al. | 2012
- 818
-
Virtual machine power measuring technique with bounded error in cloud environmentsXiao, Peng / Hu, Zhigang / Liu, Dongbo / Yan, Guofeng / Qu, Xilong et al. | 2012
- 829
-
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacksChan, Gaik-Yee / Lee, Chien-Sing / Heng, Swee-Huay et al. | 2012
- 843
-
An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networksPeng, Yuhuai / Yu, Yao / Guo, Lei / Jiang, Dingde / Gai, Qiming et al. | 2012
- 858
-
On the use of a full information feedback to stabilize REDJamali, Shahram / Seyyed Hashemi, Seyyed Nasser / Eftekhari Moghadam, Amir Masoud et al. | 2012
- 870
-
Evaluating opportunistic networks in disaster scenariosMartín-Campillo, Abraham / Crowcroft, Jon / Yoneki, Eiko / Martí, Ramon et al. | 2012
- 881
-
AGRIB-BHF: A sustainable and fault tolerant aggregationKumar, Mahesh / Kumar, Shishir et al. | 2012
- 887
-
A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc NetworkAl-shugran, Mahmoud / Ghazali, Osman / Hassan, Suhaidi / Nisar, Kashif / Arif, A. Suki M. et al. | 2012
- 898
-
A power laws-based reconstruction approach to end-to-end network trafficNie, Laisen / Jiang, Dingde / Guo, Lei et al. | 2012
- 908
-
A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queuesEver, Enver / Gemikonakli, Orhan / Kocyigit, Altan / Gemikonakli, Eser et al. | 2012
- 927
-
New identity-based three-party authenticated key agreement protocol with provable securityXiong, Hu / Chen, Zhong / Li, Fagen et al. | 2012
- 933
-
A comprehensive survey on scheduler for VoIP over WLANNisar, Kashif / Amphawan, Angela / Hassan, Suhaidi / Sarkar, Nurul I. et al. | 2012
- 949
-
A novel solution to the energy hole problem in sensor networksWatfa, Mohamed K. / Al-Hassanieh, Haitham / Salmen, Samir et al. | 2012
- IFC
-
Editorial board| 2013