Search
Add filters:
Use filters to refine the search results.
Results 1-2 of 2 (Search time: 0.003 seconds).
- previous
- 1
- next
Item hits:
Upload Date | Title | Researcher | Guide(s) |
---|---|---|---|
21-Aug-2014 | Certain investigations on security schemes for detection and isolation of malicious nodes in mobile Ad Hoc networks | Murugan R | Shanmugam A |
8-Sep-2014 | Cross layer based MAC protocol for rate and power adjustment in multi hop Ad Hoc networks | Saravanan, K | Ravichandran, T |
Discover
Language
- 2 English