
International Journal of Ad Hoc and Ubiquitous Computing
2007 Vol.2 No.3
Special Issue: Mobility Conference 2005
Guest Editor: Dr. Peter Han Joo Chong
Pages | Title and author(s) |
Conference Special Issue Papers |
134-139 | A secure mobile communication approach based on information hidingYun-Feng Chen, Tao Li, Dong-Ni Gao, Xiao-Qin Hu, Xiao-Ping Zhang, Jin Liu DOI: 10.1504/IJAHUC.2007.012414 |
Conference Special Issue Papers |
140-148 | On network coding in wireless ad-hoc networksJingyao Zhang, Pingyi Fan DOI: 10.1504/IJAHUC.2007.012415 |
Conference Special Issue Papers |
149-156 | Routing protocol for ad hoc mobile networks using mobility predictionWerner Creixell, Kaoru Sezaki DOI: 10.1504/IJAHUC.2007.012416 |
Conference Special Issue Papers |
157-166 | Detailed DoS attacks in wireless networks and countermeasuresLawan A. Mohammed, Biju Issac DOI: 10.1504/IJAHUC.2007.012417 |
Conference Special Issue Papers |
167-174 | Simulation study of some PRMA-based protocols with channel reservation for data trafficXue Jun Li, Peter Han Joo Chong DOI: 10.1504/IJAHUC.2007.012418 |
Additional Papers |
175-185 | Configuring node status in a two-phase tightly integrated mode for wireless sensor networksDi Tian, Zhijun Lei, N.D. Georganas DOI: 10.1504/IJAHUC.2007.012436 |
Additional Papers |
186-196 | A distributed stabilised clustering algorithm for large-scale wireless ad hoc networksReza Purtoosi, Hassan Taheri, Abbas Mohammadi, Foroohar Foroozan DOI: 10.1504/IJAHUC.2007.012419 |
Additional Papers |
197-206 | Designing next generation middleware for context-aware ubiquitous and pervasive computingIoanna G. Roussaki, Maria A. Strimpakou, Miltiades E. Anagnostou DOI: 10.1504/IJAHUC.2007.012420 |