From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks., , и . ADHOC-NOW, том 5198 из Lecture Notes in Computer Science, стр. 176-188. Springer, (2008)Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes., , и . Networking, том 4982 из Lecture Notes in Computer Science, стр. 792-803. Springer, (2008)An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance., и . WCNC, стр. 819-823. IEEE, (2000)A cooperative MAC protocol for lossy forwarding networks., , , , , , и . Wireless Days, стр. 1-3. IEEE, (2016)CLF-MAC: A coordinated MAC protocol supporting Lossy Forwarding in WLANs., , , и . ISWCS, стр. 434-438. IEEE, (2016)Providing Throughput and Fairness Guarantees in Virtualized WLANs Through Control Theory., , , и . Mob. Networks Appl., 17 (4): 435-446 (2012)Supporting carrier grade services over wireless mesh networks: The approach of the European FP-7 STREP CARMEN Very Large Projects., , , , , , , и . IEEE Commun. Mag., 47 (4): 14-16 (2009)A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations., и . PWC, том 179 из IFIP Conference Proceedings, стр. 157-168. Kluwer, (2000)Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach., , и . Secur. Commun. Networks, 6 (4): 509-522 (2013)Detecting Transmission Power Misbehaviour in Wi-Fi Networks., , , и . WiFlex, том 8072 из Lecture Notes in Computer Science, стр. 58-68. Springer, (2013)