Elizabeth Belding
Elizabeth Belding
Verified email at - Homepage
Cited by
Cited by
Ad-hoc on-demand distance vector routing
CE Perkins, EM Royer
Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA'99 …, 1999
A review of current routing protocols for ad hoc mobile wireless networks
EM Royer, CK Toh
IEEE personal communications 6 (2), 46-55, 1999
Performance comparison of two on-demand routing protocols for ad hoc networks
CE Perkins, EM Royer, SR Das, MK Marina
Personal Communications, IEEE 8 (1), 16-28, 2001
Performance comparison of two on-demand routing protocols for ad hoc networks
SR Das, CE Perkins, EM Royer
INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and …, 2000
A secure routing protocol for ad hoc networks
K Sanzgiri, B Dahill, BN Levine, C Shields, EM Belding-Royer
10th IEEE International Conference on Network Protocols, 2002. Proceedings …, 2002
Multicast ad hoc on-demand distance vector routing (MAODV)
EM Royer, CE Perkins
Proc. ACM/IEEE International Conference on Mobile Computing and Networking …, 2000
Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks.
KN Ramachandran, EM Belding-Royer, KC Almeroth, MM Buddhikot
Infocom 6, 1-12, 2006
An analysis of the optimum node density for ad hoc mobile networks
EM Royer, PM Melliar-Smith, LE Moser
ICC 2001. IEEE International Conference on Communications. Conference Record …, 2001
Towards realistic mobility models for mobile ad hoc networks
A Jardosh, EM Belding-Royer, KC Almeroth, S Suri
Proceedings of the 9th annual international conference on Mobile computing …, 2003
Multicast ad hoc on-demand distance vector (MAODV) routing
EM Royer, CE Perkins
IETF Internet Draft, draft-ietf-manetmaodv-00. txt, 2000
AODV routing protocol implementation design
ID Chakeres, EM Belding-Royer
24th International Conference on Distributed Computing Systems Workshops …, 2004
Mitigating gender bias in natural language processing: Literature review
T Sun, A Gaut, S Tang, Y Huang, M ElSherief, J Zhao, D Mirza, E Belding, ...
arXiv preprint arXiv:1906.08976, 2019
Authenticated routing for ad hoc networks
K Sanzgiri, D LaFlamme, B Dahill, BN Levine, C Shields, ...
IEEE Journal on selected areas in communications 23 (3), 598-610, 2005
Understanding congestion in IEEE 802.11 b wireless networks
AP Jardosh, KN Ramachandran, KC Almeroth, EM Belding-Royer
Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 25-25, 2005
Internet connectivity for ad hoc mobile networks
Y Sun, EM Belding-Royer, CE Perkins
International journal of wireless information networks 9, 75-88, 2002
Blockage and directivity in 60 GHz wireless personal area networks: From cross-layer model to multihop MAC design
S Singh, F Ziliotto, U Madhow, E Belding, M Rodwell
IEEE Journal on Selected Areas in Communications 27 (8), 1400-1413, 2009
Hate lingo: A target-based linguistic analysis of hate speech in social media
M ElSherief, V Kulkarni, D Nguyen, WY Wang, E Belding
Proceedings of the international AAAI conference on web and social media 12 (1), 2018
An implementation study of the AODV routing protocol
EM Royer, CE Perkins
2000 IEEE Wireless Communications and Networking Conference. Conference …, 2000
Delay tolerant mobile networks (dtmns): Controlled flooding in sparse mobile networks
KA Harras, KC Almeroth, EM Belding-Royer
NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005
On the design and implementation of infrastructure mesh networks
K Ramachandran, M Buddhikot, G Chandranmenon, S Miller, ...
Proceedings of the IEEE Workshop on Wireless Mesh Networks (WiMesh), 4-15, 2005
The system can't perform the operation now. Try again later.
Articles 1–20