image - Mobile MAN IST project

image - logo IST (Information Society Technologies)

http://www.cordis.lu/ist/fethome.htm
members only. . .

project > bibliography


[1] M. S. Corson, J.P. Maker, J.H. Cernicione, “Internet-based Mobile Ad Hoc Networking” IEEE Internet Computing, July-August 1999, pp. 63-70.

[2] Wireless LAN Medium Access Control and Physical Layer Specifications", IEEE P802.11/D10, 14 January 1999.

[3] Specification of the Bluetooth System, http://www.bluetooth.com/

[4] D. Clark “Face-to Face with Peer-to-Peer Networking, IEEE Computer, January 2001.

[5] The IETF Mobile Ad-Hoc Networking Page (MANET): http://www.ietf.org/html.charters/Manet-charter.html

[6] http://www.cise.nsf.gov/anir/ww.html

[7] http://www.darpa.mil/ito/research/glomo/

[8] L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J-P. Hubaux, J-Y. Le Boudec "Self-Organization in Mobile Ad-Hoc Networks: the approach of Terminodes", IEEE Communications Magazine, June, 2001.

[9] Global System for Mobile Communications (GSM), http://www.gsm.org

[10] Pravin Bhagwat Charles Perkins Satish Tripathi: “Network Layer Mobility: an Architecture and Survey”, IBM, T.J. Watson Research Center, 1996.

[11] Srdan Capkun, Maher Hamdi, Jean-Pierre Hubaux, “GPS-free positioning in mobile Ad-Hoc networks”, Proc. HICCS-34, Maui, Hawaii, 3-6 January 2001.

[12] Alfonso Fuggetta, Gian Pietro Picco, and Giovanni Vigna: “Understanding Code Mobility.” IEEE Transactions on Software Engineering, Vol. 24, 1998.

[13] National Science Foundation, NFS Wireless and Mobile Communications Workshop, Northern Virginia, March 1997

[14] NFS Tetherless T3 and Beyond Workshop, interim report, November 1998

[15] Report to the President Information Technology: Transforming our Society 1999

[16] NFS Wireless Information Technology and Networks Program Announcement NSF 99-68, 1999

[17] W. Daugherty, C. Eugster, P. Roche & T. Stovall, “Information Unleashed: The Coming of Wirelss Data”, McKinsey Quarterly, 1999, No. 2, pp. 88-99

[18] L. Feeney, B. Ahlgren, A. Westerlund. "Spontaneous Networking: An Application-oriented approach to Ad Hoc Networking''. IEEE Communications Magazine, June 2001.

[19] D.J.Watts, “Small Worlds: The Dynamics of Networks between Order and Randomness.”, Princeton: Princeton University Press, 1999.

[20] Sanders, E.B. and E.H. Nutter. 1995. Participatory Design Practices: A Special Interest Group. In CHI ’95 Conference Companion. Denver: Association for Computing Machinery

[21] Beninger, James R. 1986. The Control Revolution: Technological and Economic Origins of the Information Society. Cambridge, MA: Harward UP.

[22] Schrage, Michael. 1990. Shared Minds. New Technologies of Collaboration. New York: Random House.

[23] Stone, Allucquere R. 1995. The War of Desire and Technology at the Close of the Mechanical Age. Cambridge, MA: MIT Press.

[24] Sproull, Lee and S. Kiesler. 1991. Connections: New Ways of Working in the Networked Organization. Cambridge, MA: MIT Press.

[25] Mackay, Hugh, W. Maples and P. Reynolds. 2001. Investigating the Information Society. London: Routledge.

[26] Chandler, Daniel. 1995. Technological or Media Determinism. http://www.aber.ac.uk/media/Documents/tecdet.html

[27] Long, N. and J. van der Ploeg, J. 1994. Heterogeneity, Actor and Structure: Towards a Reconstitution of the Concept of Structure. In: D. Booth (ed). Rethinking Social Development: Research, Theory and Practice. London: Longman.

[28] Long, N. and M. Villarreal. 1993. Exploring Development Interfaces: from the Transfer of Knowledge to the Transformation of Meaning. In: F.J. Schuurman (ed). Beyond the Impasse: New Directions in Development Theory. London: Zed Press.

[29] Zuboff, Shoshana. 1988. The Age of the Smart Machine. New York: Basic Books.

[30] Appadurai, Arjun. 1991. “Global Ethnoscapes: Notes and Queries for a Transnational Anthropology” In: R.G. Fox (ed.). Recapturing Anthropology. Working in the Present . Santa Fe: School of American Research Press.

[31] Escobar, Arturo. 1994. Welcome to Cyberia: Notes on the Anthropology of Cyberculture. Current Anthropology 35(3): 211-233.

[32] Turkle, Sherry. 1996. Virtuality and its Discontents: Searching for Community in the Cyberspace. The American Prospect 24: 50-57. http://usyd.edu.au/su/social/papers/turkle1.htm

[33] Jones, Steven G. 1995. Understanding Community in the Information Age. In: S.G. Jones(ed). CyberSociety: Computer-mediated Communication and Community. Thousand Oaks,
CA: Sage Publ.

[34] Rheingold, Howard. 1994. The Virtual Community: Homesteading on the Electronic Frontier. Reading, PA: Addison Wesley.

[35] Bell, David. 2001. An Introduction to Cybercultures. London: Routledge.;

[36] Willett, Gilles. 2000. Global Communication: A Modern Myth? Communicao 21:2. http://www.unisa.ac.za/dept/press/comca/212/willet.html

[37] Smith, Marc and P. Kollock. 1998. Communities in Cyberspace. London: Routledge.

[38] http://www.cs.ucl.ac.uk/staff/jon/talks/many-source-rate-adapt-paris2000/.

[39] ANSI/IEEE Standard 802.11, "Part 11: Wireless LAN- Medium Access Control (MAC) and Physical Layer (PHY) Specification'', August 1999.

[40] S. Xu, T. Saadawi, "Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks, IEEE Communications Magazine, Vol. 39(6), June 2001, pp. 130-137.

[41] Martin Mauve, Jorg Widmer, Hannes Hartenstein. A Survey on Position-Based Routing in Mobile Ad-Hoc Networks. In IEEE Network, November 2001.

[42] Jinyang Li, A Scalable Location Service for Geographic Ad Hoc Routing in Proceedings of ACM Mobicom 99, Boston, 1999.

[43] GRID project, http://www.pdos.lcs.mit.edu/grid/

[44] S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM, 2000.

[45] L. Buttyan and J.-P. Hubaux. Nuglets: a virtual currency to stimulate cooperation in selforganized ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology -- Lausanne, 2001.

[46] ISTAG reports on (WWW.cordis.lu/ist/istag.htm) “Orientations for WP2000 and beyond”

[47] ISTAG reports on (WWW.cordis.lu/ist/istag.htm) “Scenarios for Ambient Intelligience in 2010”

[48] F. Kelly, S. Maulloo, and D. Tan, “Rate control for communications networks: Shadow prices, proportional fairness stability.” Journal of Operation Research Society, March 1998.

[49] F. Kelly, “Mathematical modelling of the Internet.” Proc. Fourth International Congress on Industrial and Applied Mathematics, 1999.

[50] D. L. Tennenhouse and D. J. Wetherall, ”Towards an Active Network Architecture'”, ACM Computer Communication Review, vol. 26, no. 2, pp. 5--18, Apr. 1996.

[51] Fry Ghosh, J. Crowcroft, "An Architecture for Application Layer Routing", Yasuda, H. (Ed), Active Networks, LNCS 1942, Springer, pp 71-86.

[52] D. Anderson, H. Balakrishnan, F. Kaashoek, R. Morris, "The case for reslient overlay networks," Proc. HotOS VIII, May 2001.

[53] Jon Kleinberg, "The Small-World Phenomenon: An Algorithmic Perspective," http://www.cs.cornell.edu/home/kleinber/swn.ps

[54] D. Anderson, H. Balakrishnan, F. Kaashoek, R. Morris, "Resilient Overlay Networks," Proc. 18th ACM SOSP, Banff, Canada, October 2001. http://nms.lcs.mit.edu/papers/ronsosp2001.html

[55] B. Gedik, "Determining Characteristics of the Gnutella Network," http://www.cs.gatech.edu/people/home/bgedik/mini-projects/mini-project1/FinalReport.htm

[56] Peer-to-peer, Harnessing the Power of Disruptive Technologies (Edited by Andy Oram) pub. O'Reilly, Mar 2001, ISBN 0-596-00110.

[57] Peer-to-Peer architecture case study:gnutella, Matei Ripeanu, Pro. 2001 International conference on P2P computing. http://people.cs.uchicago.edu/~matei/PAPERS/P2P2001.pdf

 

please send any comment about the web site to patrizia.andronico@iit.cnr.it