Author of the publication

Supporting carrier grade services over wireless mesh networks: The approach of the European FP-7 STREP CARMEN Very Large Projects.

, , , , , , , and . IEEE Commun. Mag., 47 (4): 14-16 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks., , and . ADHOC-NOW, volume 5198 of Lecture Notes in Computer Science, page 176-188. Springer, (2008)Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes., , and . Networking, volume 4982 of Lecture Notes in Computer Science, page 792-803. Springer, (2008)An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance., and . WCNC, page 819-823. IEEE, (2000)Providing Throughput and Fairness Guarantees in Virtualized WLANs Through Control Theory., , , and . Mob. Networks Appl., 17 (4): 435-446 (2012)Supporting carrier grade services over wireless mesh networks: The approach of the European FP-7 STREP CARMEN Very Large Projects., , , , , , , and . IEEE Commun. Mag., 47 (4): 14-16 (2009)A cooperative MAC protocol for lossy forwarding networks., , , , , , and . Wireless Days, page 1-3. IEEE, (2016)CLF-MAC: A coordinated MAC protocol supporting Lossy Forwarding in WLANs., , , and . ISWCS, page 434-438. IEEE, (2016)A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations., and . PWC, volume 179 of IFIP Conference Proceedings, page 157-168. Kluwer, (2000)Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach., , and . Secur. Commun. Networks, 6 (4): 509-522 (2013)Detecting Transmission Power Misbehaviour in Wi-Fi Networks., , , and . WiFlex, volume 8072 of Lecture Notes in Computer Science, page 58-68. Springer, (2013)