208 results on '"Konorski, Jerzy"'
Search Results
2. A reactive algorithm for deducing nodal forwarding behavior in a multihop ad-hoc wireless network in the presence of errors
3. Nodal cooperation equilibrium analysis in multihop wireless ad hoc networks with a reputation system
4. Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
5. A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
6. Defending against fake VIP in scant-transparency information systems with QoS differentiation
7. Selfish Attacks in Two-hop IEEE 802.11 Relay Networks: Impact and Countermeasures
8. Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
9. Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
10. Trustworthiness and Subversion in Large Service-Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
11. Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System
12. Modulo N Backoff Scheme for Effective QoS Differentiation and Increased Bandwidth Utilization in IEEE 802.11 Networks
13. Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
14. DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
15. A Virtualization-Level Future Internet Defense-in-Depth Architecture
16. Packet Scheduling in Wireless LANs — A Framework for a Noncooperative Paradigm
17. Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations
18. An Incentive-Based Forwarding Protocol for Mobile Ad Hoc Networks with Anonymous Packets
19. Anonymous Agreed Order Multicast: Performance and Free Riding
20. An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs
21. Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations
22. Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs
23. Mitigating Traffic Remapping Attacks in Autonomous Multihop Wireless Networks
24. Fair Packet Forwarding in MANETs with Anonymous Stations: A Game-Theoretic Approach
25. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
26. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting
27. Membership-Insensitive Totally Ordered Multicast: Properties and Performance
28. Purkinje Cells in the Cerebellum: Their Responses to Postural Stimuli in Cats
29. Wireless and mobile networking (Foreword)
30. DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
31. Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
32. Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations
33. An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs
34. Anonymous Agreed Order Multicast: Performance and Free Riding
35. Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations
36. Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs
37. Fair Packet Forwarding in MANETs with Anonymous Stations: A Game-Theoretic Approach
38. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
39. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting
40. Membership-Insensitive Totally Ordered Multicast: Properties and Performance
41. Qualitative versus Directional Cues in Two Forms of Differentiation
42. Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
43. A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
44. WORST-CASE PERFORMANCE OF PRIORITIZED ACCESS TO RESOURCES IN DATA COMMUNICATION NETWORKS
45. Information Transfer Ion Wireless Networks
46. Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
47. Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
48. Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
49. Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
50. Traffic Remapping Attacks in Ad Hoc Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.