[1]M. Abolhasan, T. Wysocki and E. Dutkiewicz, "A Review of Routing Protocols for Mobile Ad hoc Networks," Ad hoc networks, 2004, Vol. 2, No. 1, pp. 1-22.
[2]B. Das and V. Bhargavan, “Routing in Ad-Hoc Networks Using Minimum Connected Dominating Sets,” Proceedings of IEEE International Conference on Communications, 1997, pp. 376-380.
[3]F. Dai and J. Wu, “Distributed Dominant Pruning in Ad Hoc Wireless Networks,” Proceedings of IEEE International Conference on Communications, 2003, pp.353-357.
[4]F. Dai and J. Wu, “On constructing k-connected k-dominating set in wireless networks,” Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, 2005, pp. 81a-81a.
[5]P. Fly and N. Meghanathan, "Predicted Link Expiration Time Based Connected Dominating Sets for Mobile Ad hoc Networks," International Journal on Computer Science and Engineering, 2010, Vol. 2, No. 6, pp. 2096-2103.
[6]D. B. Johnson and D. A. Maltz, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,” Intemet-Draft, draft-ietf-manet-dsr-00.txt, 1998.
[7]H. Lim and C. Kim, "Flooding in Wireless Ad Hoc Networks," Computer Communications, 2001, Vol. 24, No. 3-4, pp. 353-363.
[8]S. Lee, B. Bhattacharjee, A. Srinivasan and S. Khuller, "Efficient and Resilient Backbones for Multihop Wireless Networks." IEEE Transactions on Mobile Computing, 2008, Vol. 7, No. 11, pp. 1349-1362.
[9]C. Markarian and F. N. Abu-Khzam, “A Degree-Based Heuristic for Strongly Connected Dominating-Absorbent Sets in Wireless Ad-Hoc Networks,” Proceedings of IEEE International Conference on Innovations in Information Technology, 2012, pp. 200-204.
[10]M. Maheswaran, S. Ali, H. J. Siegal, D. Hensgen, R. F. Freund, “Dynamic matching and scheduling of a class of independent tasks onto heterogeneous computing systems,” Proceedings of 8th IEEE Heterogeneous Computing Workshop, 1999, pp. 30-44.
[11]N. Meghanathan, “An Algorithm to Determine Minimum Velocity-based Stable Connected Dominating Sets for Ad hoc Networks,” Communications in Computer Science and Engineering, 2010, pp. 206-217.
[12]N. Meghanathan and A. Farago, "On the stability of paths, Steiner trees and connected dominating sets in mobile ad hoc networks," Ad Hoc Networks, 2008, Vol. 6, No. 5, pp. 744-769.
[13]N. Meghanathan and M. Terrell, "An Algorithm to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks using Strong Neighborhoods," International Journal of Combinatorial Optimization Problems and Informatics, 2012, Vol. 3, No. 2, pp. 79-92.
[14]S. Murthy and J. J. Garcia-Luna-Aceves, “A Routing Protocol for Packet Radio Networks,” Proceedings of the 1st Annual ACM International Conference on Mobile Computing and Networking, 1995, pp. 86-95.
[15]C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” Proceedings of ACM Conference on Communications Architectures, 1994, Vol. 24, No. 4, pp.234-244.
[16]C. E. Perkins, and E. M. Royer, “Ad-hoc On-Demand Distance Vector Routing,” Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications, 1999, pp. 90-100.
[17]T. S. Rappaport, Wireless Communications: Principles & Practice, Prentice Hall, 2002.
[18]J. Z. Sun, “Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing,” Proceedings of IEEE International Conferences on Info-tech and Info-net, 2001.
[19]P. Sheu and Y. Lee, “On Calculating Stable Connected Dominating Sets Base on Battery Power for Mobile Ad Hoc Networks,” Proceedings of International symposium on Communications, 2003.
[20]Y. C. Tseng, S. Y. Ni, Y. S. Chen and J. P. Sheu, “The Broadcast Storm Problem in a Mobile Ad Hoc Network,” Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, 1999, pp. 151-162.
[21]N. Velummylum and N. Meghanathan, "On the Utilization of ID-based Connected Dominating Sets for Mobile Ad hoc Networks," International Journal of Advanced Research in Computer Science, 2010, Vol. 1, No. 3, pp. 36-43.
[22]F. Wang, M. T. Thai and D. Z. Du, "On the Construction of 2-Connected Virtual Backbone in Wireless Networks," IEEE Transactions on Wireless Communications, 2009, Vol. 8, No. 3, pp. 1230-1237.
[23]J. Wu, "Extended Dominating-Set-Based Routing in Ad Hoc Wireless Networks with Unidirectional Links," IEEE Transactions on Parallel and Distributed Systems, 2002, Vol. 13, No. 9, pp. 866-881.
[24]J. Wu and H. Li, “On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks,” Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, 1999, pp. 7-14.
[25]J. Wu, D. Fai, M. Gao and I. Stojmenovic, "On Calculating Power-Aware Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless Networks," IEEE Journal of Communications and Networks, 2002, Vol. 4, No. 1, pp. 59-70.
[26]C. Zheng, L. Yin and Y. Zhang, “Constructing r-Hop 2-Connected Dominating Sets for Fault-Tolerant Backbone in Wireless Sensor Networks, ” Proceedings of the 8th IEEE International Conferences on Wireless Communications, Networking and Mobile Computing, 2012, pp. 1-4.
[27]賈坤芳、江茂綸、陳俊榮,「利用區域演算法將ad hoc 無線網路下之Connected Dominating Set 最小化」,全國計算機會議,2005。
[28]林靖洋,隨意無線網路中虛擬骨幹的局部維護機制,碩士論文,國立中山大學電機工程學系,高雄,2013。[29]陳俊榮,Ad Hoc無線網路中利用ID重置技術建構最小省電Connected Dominating Set的區域演算法,碩士論文,國立中興大學資訊科學研究所,臺中,2006。