References
- Stephen M. Dye, "End-to-end M2M," 3rd Edition, Mind Commerce LLC, pp.222-224, Jan.2010.
- I. Cha, Y. Shah and A. U. Schmidt, "Trust in M2M communication," IEEE Vehicle Technology Magazine., vol.4, no.3, pp.69-75, Sep.2009.
- 3rd Generation Partnership Project (3GPP), "Study on facilitation of machine-to-machine communication in 3GPP systems," 3GPP Tech. Rep. 22.868, Mar.2007.
- 3rd Generation Partnership Project (3GPP), "Feasibility study on remote managements of USIM application on M2M equipment," 3GPP Tech. Rep. 33.812, May.2007.
- Bob Emmerson, "M2M: The Internet of 50 billion devices," Win-Win Magazine, pp.19-22, Jan.2010.
- X. Li, J. Lu, J. Yang and J. An, "A novel routing and data transmission method for stub network of Internet of things based on percolation," IEEE Conference on Computer Communications Workshops on M2MCN, pp.201-205, Apr.2011.
- T. Predojev, J. Alonso-Zarate and M. Dohler, "Energy-delay tradeoff analysis in embedded M2M networks with channel coding," IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, pp.2733-2738, Dec.2010,.
- M. Martsola, T. Kiravuo and J.K.O. Lindqvist, "Machine to machine communication in cellular networks", IEEE International Conference on Mobile Technology, Applications and Systems, pp.1-6, Nov. 2005.
- L. Popova, T. Herpel and W. Koch, "Improving downlink UMTS capacity by exploiting direct M2M data transfer," International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, pp.1-8, Apr.2007.
- C.K.K Toh, "Ad Hoc mobile wireless networks: protocols and systems," Prentice Hall PTR Upper Saddle River, pp.324-326.
- G. Jayakumar and G. Gopinath, "Ad Hoc mobile wireless networks routing protocols - A review," Journal of Computer Science, vol.3, No.8, Aug.2007, pp.574-582. https://doi.org/10.3844/jcssp.2007.574.582
- C. Hu, X. Wang, Z. Yang, J. Zhang, Y. Xu and X. Gao, "A geometry study on the capacity of wireless networks via percolation," IEEE Transactions on Communications, 2010.
- Chi-Kin Chau, Richard J. Gibbens and Robert E. Hancock, "Robust multipath routing in large wireless networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.271-275.
- Bertossi, A.A. and Pinotti, C.M., "Skewed allocation of non-uniform data for broadcasting over multiple channels," 20th International Symposium on Parallel and Distributed Processing, 2006.
- A. Mei and J. Stefa, "SWIM: A simple model to generate small mobile worlds," in Proc. of IEEE Conference on Computer Communications Workshops, pp.2106-13.
- O. Bakun and G. Konjevod, "Adaptive decentralized routing in small-world networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.1-6, 2010.
- I. Grønbaek and P.K. Biswas, "Ontology-based abstractions for M2M virtual nodes and topologies," International Conference on Ultra Modern Telecommunications & Workshops, pp.1-8, Oct.2009.
- M. Ryu, S. Cha, J. Koh, etc. "Position-based routing Algorithm for improving reliability of Inter-vehicle communication," KSII Transactions on Internet and Information Systems (TIIS), vol.5, no.8, pp.1388-1402, Aug.2011.
- S. Park, S. Yoo, and F. Qiu, "Route reutilization routing in mobile ad hoc networks," KSII Transactions on Internet and Information Systems (TIIS), vol.4, no.2, pp. 78-97, Apr.2010.
- M. Luby, "LT codes," in Proc. of 43rd IEEE Symposium on Foundations of Computer Sciences, pp.271-280, Nov.2002
- A. Shokrollahi, "Raptor codes," IEEE Transactions on Information Theory, vol.52, no.6, pp.2551-2567, Jun.2006.
- X. Li and T. Jiang. "Fountain codes over GF(q)," Wireless Communications and Mobile Computing, Sep.2011.
- T.Jiang and X. Li. "Using fountain codes to control the Peak-to-Average power ratio of OFDM signals," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3779-85, 2010.
- M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Transactions on Information Theory, vol.53, no.3, pp.1009-18, Mar.2007,.