|
[1].Chang, C.Y., and Chang, C.T. (2001) , “ Hierarchical Cellular-based Management for Mobile Hosts in Ad-hoc Wireless Networks,” Computer Communications, pp. 1554-1567. [2].Charles,E. P. (2000) , “ Ad Hoc Networking,” Addison-Wesley Professional, 1st Edition. [3].Chatterjee, M., Das, S.K., and Turgut, D. (2000) , “ An On-demand Weighted Clustering Algorithm (WCA) for Ad Hoc Networks,” IEEE Global Telecommunications Conference, pp. 1697-1701. [4].George, J.K, Ute ,St.C., and Bo, Y., “ Fuzzy Set Theory Foundations and Applications,” Prentice Hall International Edition. [5].Huang, C.C., Chang, R.H., and Guo, M.H. (2003) , “ Weight-based Clustering Mlticast Routing Protocol for Mobile Ad Hoc Networks,” Wireless Communications and Networking on IEEE,Vol(2), pp. 1112-1117. [6].Kiniry, J., and Zimmerman, D. (1997) , “ A Hands-on Look at Java Mobile Agents,” Internet Computing, IEEE , pp. 21-30. [7].Liao, W.H., Tseng, Y.C., and Sheu, J.P. (2001) , “ GRID: A Fully Location-aware Routing Protocol for Mobile Ad Hoc Networks,” Telecommunication Systems, pp. 37-60. [8].Mieso, K. D. (2003) , “ The Use of Mobile Agents for Clustering in Mobile Ad Hoc Networks,” The South African institute of Computer Scientists and Information Technologists, pp. 241-247. [9].Narayanaswamy, S., Kawadia, V., Sreenivas, R.S., and Kumar, P.R. (2002) , “ Power Control in Ad-Hoc Networks: Theory, Architecture, Algorithm and Implementation of the COMPOW Protocol,” Proceedings of the European Wireless Conference, pp. 156-162. [10].Park, V.D., and Corson, M.S. (1998) , “ Applicability of The Temporally-ordered Routing Algorithm for Use in Mobile Tactical Networks,” Military Communications Conference on Third IEEE Symposium, pp. 426-430. [11].Perkins, C.E., and Royer, E.M. (1999) , “ Ad-hoc On-demand Distance Vector Routing,” WorksHop on Mobile Computing Systems and Applications, pp. 90-100. [12].Ravi, P., and Alan, D.A. (2000) , “ Load-Balancing Cluster in Wireless Ad Hoc Network,” Application-Specific Systems and Software Engineering Technology on 3rd IEEE Symposium, pp. 25-32. [13].Royer, E., and Toh, C.K. (1999) , “ A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,” IEEE Personal Communications Magazine, pp. 46-55. [14].Scott, K., and Bambos (1996) , “ Routing and Channel Assignment for Low Power Transmission in PCS,” Proceedings of IEEE International Conference on Universal Personal Communications(ICUPC ’96) , pp. 498-502. [15].Singh, S.,Woo, M., and Raghavendra, C.S. (1998) , “ Power-Aware Routing in Moible Ad Hoc Network,” Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, pp. 181-190. [16].Toh, C.K. (2001) , “ Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in MANET,” IEEE Communications Magazine, pp. 138-147. [17].Tsudaka, K., Kawahara, M., Matsumoto, A., and Okada, H. (2001) , “ Power Control Routing for Multi Hop Wireless Ad-hoc Network,” IEEE Global Telecommunications Conference, Vol(5) , pp. 2819-2824. [18].Tu, S.C, Chang, C.Y., Chang, C.T., and Hsieh, T.T. (2001) , “ Active Route-Maintenance Protocol for Signal-Based Communication Path in Ad-hoc Networks,” Networks Proceedings on Ninth IEEE International Conference, pp. 25-30. [19].Wang, Y.T. (2003) , “ A Fuzzy-based Dynamic Channel Borrowing Scheme for Wireless Cellular Nnetworks,” The 57th IEEE Semiannual Vehicular Technology Conference, Vol(3) , pp. 1517-1521. [20].Yeh, D.Y., Lee, M.C., and Wang, T.I. (2002) , “ Mobile Agents for Distributed Transactions of A Distributed Heterogeneous Database System,” Proceedings of the 13th International Conference on Database and Expert Systems Applications, pp. 403-412. [21].“Glenn Baddeley - GPS - NMEA sentence information,” http://home.mira.net/~gnb/gps/nmea.html, 2003. [22].“The Network Simulator - ns-2,” http://www.isi.edu/nsnam/ns/, 2005.
|