Showing results 1 to 4 of 4
A Counterattack- Detection Scheme in Transmission Time-Based Wormhole Detection Methods Kim, Dong-uk; Kim, Hyo-won; Kim, Gisung; Kim, Sehun, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013 |
A distributed sinkhole detection method using cluster analysis Shim, Woo-Chul; Kim, Gi-Sung; Kim, Se-Hun, EXPERT SYSTEMS WITH APPLICATIONS, v.37, pp.8486 - 8491, 2010-12 |
Effective Video Multicast Using SVC with Heterogeneous User Demands over TDMA-Based Wireless Mesh Networks Hwang, Jin-Bum; Lee, Chae Young, IEEE TRANSACTIONS ON MOBILE COMPUTING, v.12, no.5, pp.984 - 994, 2013-05 |
Robust design of communication systems: The case of expedited forwarding of voice traffic in differentiated services networks Yoon, Hyoup-Sang; Yum, Bong-Jin, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, v.20, no.10, pp.1131 - 1154, 2007-10 |
Discover