Volume 8, Number 1, January 2010
Volume 8, Number 2, March 2010
, Faramarz Fekri
: A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks.
, Ahmed Helmy
: CATCH: A protocol framework for cross-layer attacker traceback in mobile multi-hop networks.
Volume 8, Number 3, May 2010
, Thomas Gerety
: A new distributed topology control algorithm for wireless environments with non-uniform path loss and multipath propagation.
, Chenjuan Zhou
: Using hierarchical agglomerative clustering in wireless sensor networks: An energy-efficient and flexible approach.
Volume 8, Number 4, June 2010
Volume 8, Number 5, July 2010
, Eylem Ekici
: PROMPT: A cross-layer position-based communication protocol for delay-aware vehicular access networks.
Volume 8, Number 6, August 2010
, Bulent Tavli
: Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks.
, Injong Rhee
: Implementation and experimental evaluation of multi-channel MAC protocols for 802.11 networks.
Volume 8, Number 7, September 2010
Volume 8, Number 8, November 2010
, Adnan Kavak
: Scalable location estimation using smart antennas in wireless sensor networks.