http://www.cordis.lu/ist/fethome.htm | |||
members only. . . |
[1] M. S. Corson, J.P. Maker, J.H. Cernicione, Internet-based Mobile Ad Hoc Networking IEEE Internet Computing, July-August 1999, pp. 63-70. [2] Wireless LAN Medium Access Control and Physical Layer Specifications",
IEEE P802.11/D10, 14 January 1999. [3] Specification of the Bluetooth System, http://www.bluetooth.com/ [4] D. Clark Face-to Face with Peer-to-Peer Networking, IEEE Computer,
January 2001. [5] The IETF Mobile Ad-Hoc Networking Page (MANET): http://www.ietf.org/html.charters/Manet-charter.html [6] http://www.cise.nsf.gov/anir/ww.html [7] http://www.darpa.mil/ito/research/glomo/ [8] L. Blazevic, L. Buttyan, S. Capkun, S. Giordano, J-P. Hubaux, J-Y.
Le Boudec "Self-Organization in Mobile Ad-Hoc Networks: the approach
of Terminodes", IEEE Communications Magazine, June, 2001. [9] Global System for Mobile Communications (GSM), http://www.gsm.org [10] Pravin Bhagwat Charles Perkins Satish Tripathi: Network Layer
Mobility: an Architecture and Survey, IBM, T.J. Watson Research
Center, 1996. [11] Srdan Capkun, Maher Hamdi, Jean-Pierre Hubaux, GPS-free positioning
in mobile Ad-Hoc networks, Proc. HICCS-34, Maui, Hawaii, 3-6 January
2001. [12] Alfonso Fuggetta, Gian Pietro Picco, and Giovanni Vigna: Understanding
Code Mobility. IEEE Transactions on Software Engineering, Vol. 24,
1998. [13] National Science Foundation, NFS Wireless and Mobile Communications
Workshop, Northern Virginia, March 1997 [14] NFS Tetherless T3 and Beyond Workshop, interim report, November
1998 [15] Report to the President Information Technology: Transforming our
Society 1999 [16] NFS Wireless Information Technology and Networks Program Announcement
NSF 99-68, 1999 [17] W. Daugherty, C. Eugster, P. Roche & T. Stovall, Information
Unleashed: The Coming of Wirelss Data, McKinsey Quarterly, 1999,
No. 2, pp. 88-99 [18] L. Feeney, B. Ahlgren, A. Westerlund. "Spontaneous Networking:
An Application-oriented approach to Ad Hoc Networking''. IEEE Communications
Magazine, June 2001. [19] D.J.Watts, Small Worlds: The Dynamics of Networks between
Order and Randomness., Princeton: Princeton University Press, 1999. [20] Sanders, E.B. and E.H. Nutter. 1995. Participatory Design Practices:
A Special Interest Group. In CHI 95 Conference Companion. Denver:
Association for Computing Machinery [21] Beninger, James R. 1986. The Control Revolution: Technological and
Economic Origins of the Information Society. Cambridge, MA: Harward UP. [22] Schrage, Michael. 1990. Shared Minds. New Technologies of Collaboration.
New York: Random House. [23] Stone, Allucquere R. 1995. The War of Desire and Technology at the
Close of the Mechanical Age. Cambridge, MA: MIT Press. [24] Sproull, Lee and S. Kiesler. 1991. Connections: New Ways of Working
in the Networked Organization. Cambridge, MA: MIT Press. [25] Mackay, Hugh, W. Maples and P. Reynolds. 2001. Investigating the
Information Society. London: Routledge. [26] Chandler, Daniel. 1995. Technological or Media Determinism. http://www.aber.ac.uk/media/Documents/tecdet.html [27] Long, N. and J. van der Ploeg, J. 1994. Heterogeneity, Actor and
Structure: Towards a Reconstitution of the Concept of Structure. In: D.
Booth (ed). Rethinking Social Development: Research, Theory and Practice.
London: Longman. [28] Long, N. and M. Villarreal. 1993. Exploring Development Interfaces:
from the Transfer of Knowledge to the Transformation of Meaning. In: F.J.
Schuurman (ed). Beyond the Impasse: New Directions in Development Theory.
London: Zed Press. [29] Zuboff, Shoshana. 1988. The Age of the Smart Machine. New York: Basic Books. [30] Appadurai, Arjun. 1991. Global Ethnoscapes: Notes and Queries
for a Transnational Anthropology In: R.G. Fox (ed.). Recapturing
Anthropology. Working in the Present . Santa Fe: School of American Research
Press. [31] Escobar, Arturo. 1994. Welcome to Cyberia: Notes on the Anthropology
of Cyberculture. Current Anthropology 35(3): 211-233. [32] Turkle, Sherry. 1996. Virtuality and its Discontents: Searching
for Community in the Cyberspace. The American Prospect 24: 50-57. http://usyd.edu.au/su/social/papers/turkle1.htm [33] Jones, Steven G. 1995. Understanding Community in the Information
Age. In: S.G. Jones(ed). CyberSociety: Computer-mediated Communication
and Community. Thousand Oaks, [34] Rheingold, Howard. 1994. The Virtual Community: Homesteading on
the Electronic Frontier. Reading, PA: Addison Wesley. [35] Bell, David. 2001. An Introduction to Cybercultures. London: Routledge.; [36] Willett, Gilles. 2000. Global Communication: A Modern Myth? Communicao
21:2. http://www.unisa.ac.za/dept/press/comca/212/willet.html [37] Smith, Marc and P. Kollock. 1998. Communities in Cyberspace. London:
Routledge. [38] http://www.cs.ucl.ac.uk/staff/jon/talks/many-source-rate-adapt-paris2000/. [39] ANSI/IEEE Standard 802.11, "Part 11: Wireless LAN- Medium Access
Control (MAC) and Physical Layer (PHY) Specification'', August 1999. [40] S. Xu, T. Saadawi, "Does the IEEE 802.11 MAC Protocol Work
Well in Multihop Wireless Ad Hoc Networks, IEEE Communications Magazine,
Vol. 39(6), June 2001, pp. 130-137. [41] Martin Mauve, Jorg Widmer, Hannes Hartenstein. A Survey on Position-Based
Routing in Mobile Ad-Hoc Networks. In IEEE Network, November 2001. [42] Jinyang Li, A Scalable Location Service for Geographic Ad Hoc Routing
in Proceedings of ACM Mobicom 99, Boston, 1999. [43] GRID project, http://www.pdos.lcs.mit.edu/grid/ [44] S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior
in mobile ad hoc networks. In Proceedings of MOBICOM, 2000. [45] L. Buttyan and J.-P. Hubaux. Nuglets: a virtual currency to stimulate
cooperation in selforganized ad hoc networks. Technical Report DSC/2001/001,
Swiss Federal Institute of Technology -- Lausanne, 2001. [46] ISTAG reports on (WWW.cordis.lu/ist/istag.htm)
Orientations for WP2000 and beyond [47] ISTAG reports on (WWW.cordis.lu/ist/istag.htm)
Scenarios for Ambient Intelligience in 2010 [48] F. Kelly, S. Maulloo, and D. Tan, Rate control for communications
networks: Shadow prices, proportional fairness stability. Journal
of Operation Research Society, March 1998. [49] F. Kelly, Mathematical modelling of the Internet. Proc.
Fourth International Congress on Industrial and Applied Mathematics, 1999. [50] D. L. Tennenhouse and D. J. Wetherall, Towards an Active Network
Architecture', ACM Computer Communication Review, vol. 26, no. 2,
pp. 5--18, Apr. 1996. [51] Fry Ghosh, J. Crowcroft, "An Architecture for Application Layer
Routing", Yasuda, H. (Ed), Active Networks, LNCS 1942, Springer,
pp 71-86. [52] D. Anderson, H. Balakrishnan, F. Kaashoek, R. Morris, "The
case for reslient overlay networks," Proc. HotOS VIII, May 2001. [53] Jon Kleinberg, "The Small-World Phenomenon: An Algorithmic
Perspective," http://www.cs.cornell.edu/home/kleinber/swn.ps [54] D. Anderson, H. Balakrishnan, F. Kaashoek, R. Morris, "Resilient
Overlay Networks," Proc. 18th ACM SOSP, Banff, Canada, October 2001.
http://nms.lcs.mit.edu/papers/ronsosp2001.html [55] B. Gedik, "Determining Characteristics of the Gnutella Network,"
http://www.cs.gatech.edu/people/home/bgedik/mini-projects/mini-project1/FinalReport.htm [56] Peer-to-peer, Harnessing the Power of Disruptive Technologies (Edited
by Andy Oram) pub. O'Reilly, Mar 2001, ISBN 0-596-00110. [57] Peer-to-Peer architecture case study:gnutella, Matei Ripeanu, Pro. 2001 International conference on P2P computing. http://people.cs.uchicago.edu/~matei/PAPERS/P2P2001.pdf
|
|
||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||