1: \newcommand{\etalchar}[1]{$^{#1}$}
2: \begin{thebibliography}{KRSW03}
3: \expandafter\ifx\csname url\endcsname\relax
4: \def\url#1{\texttt{#1}}\fi
5: \expandafter\ifx\csname urlprefix\endcsname\relax\def\urlprefix{URL }\fi
6: \providecommand{\selectlanguage}[1]{\relax}
7: \providecommand{\bibAnnoteFile}[1]{%
8: \IfFileExists{#1}{\begin{quotation}\noindent\textsc{Key:} #1\\
9: \textsc{Annotation:}\ \input{#1}\end{quotation}}{}}
10: \providecommand{\bibAnnote}[2]{%
11: \begin{quotation}\noindent\textsc{Key:} #1\\
12: \textsc{Annotation:}\ #2\end{quotation}}
13: \providecommand{\eprint}[2][]{\url{#2}}
14:
15: \bibitem[ASSC02]{ASS:sensors}
16: I.~F. Akyildiz, W.~Su, Y.~Sankarasubramaniam, and E.~Cayirci.
17: \newblock \emph{Wireless sensor networks: a survey}.
18: \newblock Computer Networks, \textbf{38}:393--422, 2002.
19: \bibAnnoteFile{ASS:sensors}
20:
21: \bibitem[Bet02]{Bet:minimum_node_degree}
22: C.~Bettstetter.
23: \newblock {\selectlanguage{english}\emph{On the minimum node degree and
24: conncetivity of a wireless multihop network}}.
25: \newblock In \emph{Proc. ACM MobiHoc 02}, pp. 80--91. 2002.
26: \bibAnnoteFile{Bet:minimum_node_degree}
27:
28: \bibitem[BH03]{BH:security_session}
29: L.~Butty\'an and J.-P. Hubaux.
30: \newblock \emph{Report on a working session on security in wireless ad hoc
31: networks}.
32: \newblock SIGMOBILE Mob. Comput. Commun. Rev., \textbf{7}(1):74--94, 2003.
33: \bibAnnoteFile{BH:security_session}
34:
35: \bibitem[CBD02]{CBD:mobility_models}
36: T.~Camp, J.~Boleng, and V.~Davies.
37: \newblock \emph{A survey of mobility models for ad hoc network research}.
38: \newblock Wirel. Commun. Mob. Comput., \textbf{2}(5):483--502, 2002.
39: \bibAnnoteFile{CBD:mobility_models}
40:
41: \bibitem[CCL03]{CCL:imperatives}
42: I.~Chlamtac, M.~Conti, and J.~J.-N. Liu.
43: \newblock \emph{Mobile ad hoc networking: imperatives and challenges}.
44: \newblock Ad Hoc Networks, \textbf{1}:13--64, 2003.
45: \bibAnnoteFile{CCL:imperatives}
46:
47: \bibitem[CSS02]{CSS:accuracy_simulators}
48: D.~Cavin, Y.~Sasson, and A.~Schieper.
49: \newblock {\selectlanguage{english}\emph{On the accuracy of {MANET}
50: simulators}}.
51: \newblock In \emph{Proc. ACM Workshop on Princ. Mobile Computing 02}, pp.
52: 38--43. 2002.
53: \bibAnnoteFile{CSS:accuracy_simulators}
54:
55: \bibitem[GK00]{GK:capacity}
56: P.~Gupta and P.~R. Kumar.
57: \newblock \emph{The capacity of wireless networks}.
58: \newblock IEEE Trans. Information Theory, \textbf{46}:388--404, 2000.
59: \bibAnnoteFile{GK:capacity}
60:
61: \bibitem[GS64]{GS:distributionsOneTwo}
62: I.~M. Gelfand and G.~E. Shilov.
63: \newblock {\selectlanguage{english}\emph{Generalized functions}}, volume I--II.
64: \newblock Academic Press, New York, 1964.
65: \bibAnnoteFile{GS:distributionsOneTwo}
66:
67: \bibitem[HBE{\etalchar{+}}01]{HBE:fleetnet}
68: H.~Hartenstein, B.~Bochow, A.~Ebner, M.~Lott, M.~Radimirsch, and D.~Vollmer.
69: \newblock \emph{Position-aware ad hoc wireless networks for inter-vehicle
70: communications: the Fleetnet project}.
71: \newblock In \emph{Proc. ACM MobiHoc '01}, pp. 259--262. 2001.
72: \bibAnnoteFile{HBE:fleetnet}
73:
74: \bibitem[Her03]{Her:middleware}
75: K.~Herrmann.
76: \newblock \emph{MESHMdl -- A middleware for self-organization in ad hoc
77: networks}.
78: \newblock In \emph{Proc. 23rd International Conference on Distributed Computing
79: Systems}, p. 446. IEEE Computer Society, 2003.
80: \bibAnnoteFile{Her:middleware}
81:
82: \bibitem[JCH{\etalchar{+}}04]{JCH:siren}
83: X.~Jiang, N.~Y. Chen, J.~I. Hong, K.~Wang, L.~Takayama, and J.~A. Landlay.
84: \newblock {\selectlanguage{english}\emph{Siren: Context-aware computing for
85: firefighting}}.
86: \newblock In \emph{IEEE Pervasive Computing 2004}, pp. 87--105. Springer
87: Verlag, 2004.
88: \bibAnnoteFile{JCH:siren}
89:
90: \bibitem[KKKP00]{KKKP:power_consumption}
91: L.~M. Kirousis, E.~Kranakis, D.~Krizanc, and A.~Pelc.
92: \newblock \emph{Power consumption in packet radio networks}.
93: \newblock Theoretical Computer Science, \textbf{243}:289--305, 2000.
94: \bibAnnoteFile{KKKP:power_consumption}
95:
96: \bibitem[KNG{\etalchar{+}}04]{KNG:experimental_eval}
97: D.~Kotz, C.~Newport, R.~S. Gray, J.~Liu, Y.~Yuan, and C.~Elliott.
98: \newblock {\selectlanguage{english}\emph{Experimental evaluation of wireless
99: simulation assumptions}}, 2004.
100: \newblock Dartmouth Computer Science Technical Report TR2004-507.
101: \bibAnnoteFile{KNG:experimental_eval}
102:
103: \bibitem[Kre91]{Kre:Statistik}
104: U.~Krengel.
105: \newblock {\selectlanguage{german}\emph{Einführung in die
106: Wahrscheinlichkeitstheorie und Statistik}}.
107: \newblock Vieweg, Braunschweig/Wiesbaden, 3rd edition, 1991.
108: \bibAnnoteFile{Kre:Statistik}
109:
110: \bibitem[KRSW03]{KRSW:bluetooth}
111: F.~Kargl, S.~Ribhegge, S.~Schlott, and M.~Weber.
112: \newblock \emph{Bluetooth-based ad-hoc networks for voice transmission}.
113: \newblock In \emph{Proc. 36th Annual Hawaii International Conference on System
114: Sciences}, p. 314.1. IEEE Computer Society, 2003.
115: \bibAnnoteFile{KRSW:bluetooth}
116:
117: \bibitem[MBJ00]{MBJ:quantitative_lessons}
118: D.~A. Maltz, J.~Broch, and D.~B. Johnson.
119: \newblock {\selectlanguage{english}\emph{Quantitative lessons from a full-scale
120: multi-hop wireless ad hoc network testbed}}.
121: \newblock In \emph{Proc. IEEE Wireless Communications and Networking
122: Conference}. IEEE, 2000.
123: \bibAnnoteFile{MBJ:quantitative_lessons}
124:
125: \bibitem[Mpl]{SkywaysSite}
126: Downtown Minneapolis internet site.
127: \newblock \urlprefix\url{http://www.downtown-mpls.com}.
128: \bibAnnoteFile{SkywaysSite}
129:
130: \bibitem[Pen99]{Pen:k_connect}
131: M.~D. Penrose.
132: \newblock \emph{On $k$-connecticity for a geometric random graph}.
133: \newblock Random Structures and Algorithms, \textbf{15}:145--164, 1999.
134: \bibAnnoteFile{Pen:k_connect}
135:
136: \bibitem[Pet83]{Pet:ergodic_theory}
137: K.~E. Petersen.
138: \newblock {\selectlanguage{english}\emph{Ergodic Theory}}.
139: \newblock Cambridge Studies in Advanced Mathematics. Cambridge University
140: Press, 1983.
141: \bibAnnoteFile{Pet:ergodic_theory}
142:
143: \bibitem[Pir91]{Pir:radio_connectivity}
144: P.~Piret.
145: \newblock {\selectlanguage{english}\emph{On the connectivity of radio
146: networks}}.
147: \newblock IEEE Trans. Information Theory, \textbf{37}(5):1490--1492, 1991.
148: \bibAnnoteFile{Pir:radio_connectivity}
149:
150: \bibitem[PKL04]{PKL:stochastic}
151: S.~Primak, V.~Kontorovitch, and V.~Lyandres.
152: \newblock {\selectlanguage{english}\emph{Stochastic Methods and their
153: Applications to Communications : Stochastic Differential Equations
154: Approach}}.
155: \newblock John Wiley \& Sons, 2004.
156: \bibAnnoteFile{PKL:stochastic}
157:
158: \bibitem[PPT89]{PPT:packet_radio_connectivity}
159: T.~K. Philips, S.~S. Panwar, and A.~N. Tantawi.
160: \newblock {\selectlanguage{english}\emph{Connectivity properties of a packet
161: radio network model}}.
162: \newblock IEEE Trans. Information Theory, \textbf{35}(5):1044--1047, 1989.
163: \bibAnnoteFile{PPT:packet_radio_connectivity}
164:
165: \bibitem[Pro03]{Pro:stochastic}
166: P.~E. Protter.
167: \newblock {\selectlanguage{english}\emph{Stochastic Integration and
168: Differential Equations}}.
169: \newblock Springer Verlag, 2nd edition, 2003.
170: \bibAnnoteFile{Pro:stochastic}
171:
172: \bibitem[Raj02]{Raj:routing}
173: R.~Rajaraman.
174: \newblock \emph{Topology control and routing in ad hoc networks: a survey}.
175: \newblock SIGACT News, \textbf{33}(2):60--73, 2002.
176: \bibAnnoteFile{Raj:routing}
177:
178: \bibitem[Rot02]{Rot:middleware}
179: J.~Roth.
180: \newblock \emph{A communication middleware for mobile and ad-hoc scenarios}.
181: \newblock In \emph{Proc. International Conference on Internet Computing},
182: volume~I, pp. 77--84. 2002.
183: \bibAnnoteFile{Rot:middleware}
184:
185: \bibitem[Rot03]{Rot:critical_mass}
186: J.~Roth.
187: \newblock {\selectlanguage{english}\emph{The critical mass problem of mobile
188: ad-hoc networks}}.
189: \newblock In \emph{Proc. IADIS International Conference e-Society}, pp.
190: 243--250. IADIS Press, 2003.
191: \bibAnnoteFile{Rot:critical_mass}
192:
193: \bibitem[RRH00]{RR:topology_control}
194: R.~Ramanathan and R.~Rosales-Hain.
195: \newblock {\selectlanguage{english}\emph{Topology control of multihop wireless
196: networks using transmit power adjustment}}.
197: \newblock In \emph{Proc. IEEE Infocom 2000}, volume~2, pp. 404--413. 2000.
198: \bibAnnoteFile{RR:topology_control}
199:
200: \bibitem[SB02]{SanBlo:connectivity}
201: P.~Santi and D.~M. Blough.
202: \newblock {\selectlanguage{english}\emph{An evaluation of connectivity in
203: mobile wireless ad hoc networks}}.
204: \newblock In \emph{Proc. IEEE DSN~2002}, pp. 89--98. 2002.
205: \bibAnnoteFile{SanBlo:connectivity}
206:
207: \bibitem[SB03]{SanBlo:transmitting_range}
208: P.~Santi and D.~M. Blough.
209: \newblock {\selectlanguage{english}\emph{The critical transmitting range for
210: connectivity in sparse wireless ad hoc networks}}.
211: \newblock IEEE Trans. Mobile Computing, \textbf{2}:25--39, 2003.
212: \bibAnnoteFile{SanBlo:transmitting_range}
213:
214: \bibitem[SBV01]{SBV:range_assignment}
215: P.~Santi, D.~M. Blough, and F.~Vainstein.
216: \newblock {\selectlanguage{english}\emph{A probabilistic analysis for the range
217: assignment problem in ad hoc networks}}.
218: \newblock In \emph{Proc. ACM MobiHoc~01}, pp. 212--220. 2001.
219: \bibAnnoteFile{SBV:range_assignment}
220:
221: \bibitem[XK04]{XK:neighbours}
222: F.~Xue and P.~R. Kumar.
223: \newblock \emph{The number of neighbours needed for connectivity of wireless
224: networks}.
225: \newblock Wireless Networks, \textbf{10}:169--181, 2004.
226: \bibAnnoteFile{XK:neighbours}
227:
228: \bibitem[XS01]{XS:wlan}
229: S.~Xu and T.~Saadawi.
230: \newblock \emph{Does the IEEE 802.11 MAC protocol work well in multihop
231: wireless ad hoc networks?}
232: \newblock IEEE Communications Magazine, \textbf{39}:130--137, 2001.
233: \bibAnnoteFile{XS:wlan}
234:
235: \bibitem[YLN03]{YLN:random_waypoint_harmful}
236: J.~Yoon, M.~Liu, and B.~Noble.
237: \newblock {\selectlanguage{english}\emph{Random waypoint considered harmful}}.
238: \newblock In \emph{Proc. IEEE Infocom 2003}, pp. 1312--1321. 2003.
239: \bibAnnoteFile{YLN:random_waypoint_harmful}
240:
241: \end{thebibliography}
242: