Abstract
No abstract available.
Cited By
- Adelantado F and Verikoukis C (2013). Detection of malicious users in cognitive radio ad hoc networks, Ad Hoc Networks, 11:8, (2367-2380), Online publication date: 1-Nov-2013.
- Penev I, Karova M and Stoyanov S Heuristic algorithms for a particular case of resource-constrained job-scheduling problem Proceedings of the 13th International Conference on Computer Systems and Technologies, (111-117)
- Sahami M A course on probability theory for computer scientists Proceedings of the 42nd ACM technical symposium on Computer science education, (263-268)
- Strasser M, Danev B and Čapkun S (2010). Detection of reactive jamming in sensor networks, ACM Transactions on Sensor Networks, 7:2, (1-29), Online publication date: 1-Aug-2010.
Index Terms
- Probability and Statistics for Computer Scientists