Jelena V. Misic

Orcid: 0000-0002-1251-3730

Affiliations:
  • Toronto Metropolitan University, Canada
  • University of Manitoba, Winnipeg, Canada (former)


According to our database1, Jelena V. Misic authored at least 404 papers between 1994 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2018, "For contributions to modeling and performance evaluation in wireless communications".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Investigating the Effect of Distance and TXOP Allocation Limit in IEEE 802.11bd Networks.
IEEE Internet Things J., December, 2024

Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
Cybersecur., December, 2024

RSMS: Towards Reliable and Secure Metaverse Service Provision.
IEEE Trans. Veh. Technol., November, 2024

PA-iMFL: Communication-Efficient Privacy Amplification Method Against Data Reconstruction Attack in Improved Multilayer Federated Learning.
IEEE Internet Things J., May, 2024

Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake.
IEEE Trans. Netw. Serv. Manag., April, 2024

An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus.
IEEE Trans. Netw. Serv. Manag., February, 2024

PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack.
IEEE Internet Things J., January, 2024

Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-Like Blockchains? Quantitative Analysis.
IEEE Trans. Serv. Comput., 2024

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
IEEE Trans. Netw. Sci. Eng., 2024

Block and Transaction Delivery in Ethereum Network.
IEEE Trans. Netw. Sci. Eng., 2024

Towards Lightweight and Privacy-preserving Data Provision in Digital Forensics for Driverless Taxi.
CoRR, 2024

A2E: Attribute-based Anonymity-Enhanced Authentication for Accessing Driverless Taxi Service.
CoRR, 2024

MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation.
CoRR, 2024

Analyzing the Impact of TXOP Allocation on Legacy Devices in IEEE 802.11bd Networks.
IEEE Access, 2024

Performance Evaluation of a Single-Hop LoRa IoT Network.
Proceedings of the IEEE International Conference on Smart Mobility, 2024

Performance Assessment of Vehicular Cloud Systems: An Analytical Approach Using M/G/m Queueing Model.
Proceedings of the IEEE International Conference on Smart Mobility, 2024

On Dependability of Heterogeneous Distributed Oracle System in Blockchain.
Proceedings of the IEEE International Conference on Communications, 2024

Towards Well-trained Model Robustness in Federated Learning: An Adversarial- Example-Generation- Efficiency Perspective.
Proceedings of the IEEE International Conference on Communications, 2024

Performance of Ethereum 2.0-Like Consensus Under Single-Slot Finality.
Proceedings of the IEEE International Conference on Communications, 2024

Investigating the Impact of TXOP Allocation in IEEE 802.11bd for NGV Devices.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm.
IEEE Trans. Intell. Transp. Syst., November, 2023

An Asymmetric Ensemble Method for Determining the Importance of Individual Factors of a Univariate Problem.
Symmetry, November, 2023

Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.
Comput. J., October, 2023

Networks for Blockchain-Enabled Applications.
IEEE Commun. Mag., August, 2023

A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism.
IEEE Internet Things J., July, 2023

Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model.
IEEE Trans. Veh. Technol., February, 2023

Design of Proof-of-Stake PBFT Algorithm for IoT Environments.
IEEE Trans. Veh. Technol., February, 2023

Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach.
IEEE Internet Things J., 2023

PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning.
CoRR, 2023

CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning.
CoRR, 2023

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
CoRR, 2023

Performance of IEEE802.11bd for Legacy and NGV Devices with Channel Bonding and No Fallback.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Trust and Rewards in a Two-Tier Consensus Architecture.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Prioritizing transaction delivery in Ethereum network.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain.
Proceedings of the IEEE International Conference on Communications, 2023

DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse.
Proceedings of the IEEE International Conference on Communications, 2023

PBFT with Gated Prioritized Block Cycles.
Proceedings of the IEEE International Conference on Communications, 2023

Fast Cycle Multiple Entry PBFT Consensus.
Proceedings of the IEEE International Conference on Communications, 2023

Analytical evaluation of three attacks on Ethereum.
Proceedings of the IEEE Global Communications Conference, 2023

SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data.
Proceedings of the IEEE Global Communications Conference, 2023

Performance of IEEE 802.11bd Channel Bonding with Fallback.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Guest Editorial Introduction to the Special Section on Cybertwin-Driven 6G for V2X Applications.
IEEE Trans. Veh. Technol., 2022

Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT.
IEEE Trans. Veh. Technol., 2022

Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization.
IEEE Trans. Veh. Technol., 2022

Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack.
IEEE Trans. Netw. Serv. Manag., 2022

Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment.
IEEE Trans. Green Commun. Netw., 2022

Revisiting FAW attack in an imperfect PoW blockchain system.
Peer-to-Peer Netw. Appl., 2022

A high performance two-layer consensus architecture for blockchain-based IoT systems.
Peer-to-Peer Netw. Appl., 2022

Reducing the number of transaction messages in bitcoin.
Peer-to-Peer Netw. Appl., 2022

Understanding MEC empowered vehicle task offloading performance in 6G networks.
Peer-to-Peer Netw. Appl., 2022

DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics.
Peer-to-Peer Netw. Appl., 2022

Scalable Self-Sovereign Identity Architecture.
IEEE Netw., 2022

IWA: Integrated gradient-based white-box attacks for fooling deep neural networks.
Int. J. Intell. Syst., 2022

Android Malware Detection using Feature Ranking of Permissions.
CoRR, 2022

ComSoc Awards.
IEEE Commun. Mag., 2022

Call for Nominations for IEEE ComSoc Career and Service Awards.
IEEE Commun. Mag., 2022

Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
Proceedings of the IEEE Smartworld, 2022

Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Dual-UAV Aided Secure Dynamic G2U Communication.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach.
Proceedings of the IEEE International Conference on Communications, 2022

Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT.
Proceedings of the IEEE International Conference on Communications, 2022

Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Proof of Stake Voting in Multiple Entry PBFT System.
Proceedings of the IEEE International Conference on Communications, 2022

Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
Proceedings of the IEEE Global Communications Conference, 2022

On block delivery time in Ethereum network.
Proceedings of the IEEE Global Communications Conference, 2022

Evaluating fork after withholding (FAW) attack in Bitcoin.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

2021
Guest EditorialIntroduction to the Special Section on Vehicular Networks in the Era of 6G: End-Edge-Cloud Orchestrated Intelligence.
IEEE Trans. Veh. Technol., 2021

Guest EditorialIntroduction to the Special Section on Blockchain for Vehicles and Intelligent Communications.
IEEE Trans. Veh. Technol., 2021

Adapting PBFT for Use With Blockchain-Enabled IoT Systems.
IEEE Trans. Veh. Technol., 2021

Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks.
IEEE Trans. Netw. Serv. Manag., 2021

On Selfholding Attack Impact on Imperfect PoW Blockchain Networks.
IEEE Trans. Netw. Sci. Eng., 2021

The Impact of Selfish Mining on Bitcoin Network Performance.
IEEE Trans. Netw. Sci. Eng., 2021

Cost-effective migration-based dynamic platform defense technique: a CTMDP approach.
Peer-to-Peer Netw. Appl., 2021

Performance analysis of heterogeneous cloud-edge services: A modeling approach.
Peer-to-Peer Netw. Appl., 2021

Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum.
CoRR, 2021

LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X.
Ad Hoc Networks, 2021

Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System.
Proceedings of the ICC 2021, 2021

A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording.
Proceedings of the ICC 2021, 2021

Analysis of Selfish Miner Behavior in the Bitcoin Network.
Proceedings of the ICC 2021, 2021

Mal-LSGAN: An Effective Adversarial Malware Example Generation Model.
Proceedings of the IEEE Global Communications Conference, 2021

Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications.
Proceedings of the IEEE Global Communications Conference, 2021

Trade-offs in large blockchain-based IoT system design.
Proceedings of the IEEE Global Communications Conference, 2021

Multiple Leader PBFT Based Blockchain Architecture for IoT Domains: Invited Paper.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

Voting control in multiple entry PBFT blockchain systems for IoT.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

The Impact of Vote Counting Policy on the Performance of PBFT: Invited Paper.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

2020
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing.
IEEE Trans. Veh. Technol., 2020

Impact of Node Churn in the Bitcoin Network.
IEEE Trans. Netw. Sci. Eng., 2020

Modeling of Bitcoin's Blockchain Delivery Network.
IEEE Trans. Netw. Sci. Eng., 2020

Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks.
IEEE Trans. Netw. Sci. Eng., 2020

Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks.
IEEE Trans. Cogn. Commun. Netw., 2020

Performance Modeling of Linux Network System with Open vSwitch.
Peer-to-Peer Netw. Appl., 2020

An analytical model for churn process in Bitcoin network with ordinary and relay nodes.
Peer-to-Peer Netw. Appl., 2020

Performance analysis of Hyperledger Fabric platform: A hierarchical model approach.
Peer-to-Peer Netw. Appl., 2020

Stochastic Modeling Approaches for Analyzing Blockchain: A Survey.
CoRR, 2020

Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views.
Comput. Secur., 2020

Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies.
Comput. J., 2020

Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification.
IEEE Access, 2020

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives.
IEEE Access, 2020

PBFT-based ordering service for IoT domains.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Comparison of single- and multiple entry point PBFT for IoT blockchain systems.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Examining Permission Patterns in Android Apps using Kernel Density Estimation.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Modeling of Churn Process in Bitcoin Network.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

On the Benefits of Compact Blocks in Bitcoin.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Impact of Node Churn in the Bitcoin Network with Compact Blocks.
Proceedings of the IEEE Global Communications Conference, 2020

Multiple entry point PBFT for IoT systems.
Proceedings of the IEEE Global Communications Conference, 2020

Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin.
Proceedings of the IEEE Global Communications Conference, 2020

Model-based Performance Evaluation of a Moving Target Defense System.
Proceedings of the IEEE Global Communications Conference, 2020

High-Accuracy Particulate Matter Prediction Model Based on Artificial Neural Network.
Proceedings of the 10th International Conference on Advanced Computer Information Technologies, 2020

2019
Performance Evaluation of Heterogeneous IoT Nodes With Differentiated QoS in IEEE 802.11ah RAW Mechanism.
IEEE Trans. Veh. Technol., 2019

Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud.
IEEE Trans. Cloud Comput., 2019

Data Lifetime Estimation in a Multicast-Based CoAP Proxy.
Open J. Internet Things, 2019

Bridging the Transition from IEEE 802.11ac to IEEE 802.11ax: Survival of EDCA in a Coexistence Environment.
IEEE Netw., 2019

BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services.
IEEE Internet Things J., 2019

Reliable and Secure Vehicular Fog Service Provision.
IEEE Internet Things J., 2019

Performance Analysis of Multithreaded IoT Gateway.
IEEE Internet Things J., 2019

Efficient Security Scheme for Disaster Surveillance UAV Communication Networks.
Inf., 2019

Performance analysis of IEEE 802.11ax heterogeneous network in the presence of hidden terminals.
CoRR, 2019

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples.
IEEE Access, 2019

Towards a Blockchain-Based Healthcare Information System : Invited Paper.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Block Delivery Time in Bitcoin Distribution Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Extending the Operational Range of UAV Communication Network using IEEE 802.11ah.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

On Forks and Fork Characteristics in a Bitcoin-Like Distribution Network.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Uplink Access Protocol in IEEE 802.11ac.
IEEE Trans. Wirel. Commun., 2018

Formation of Cognitive Personal Area Networks (CPANs) Using Probabilistic Rendezvous.
IEEE Trans. Veh. Technol., 2018

Efficiency of Power Ramping During Random Access in LTE.
IEEE Trans. Veh. Technol., 2018

Protocol Architectures for IoT Domains.
IEEE Netw., 2018

Security and Privacy of Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Priority-Based Machine-To-Machine Overlay Network over LTE for a Smart City.
J. Sens. Actuator Networks, 2018

Proxy Cache Maintenance Using Multicasting in CoAP IoT Domains.
IEEE Internet Things J., 2018

Architecture for IoT Domain With CoAP Observe Feature.
IEEE Internet Things J., 2018

SOSerbia: Android-Based Software Platform for Sending Emergency Messages.
Complex., 2018

Performance of Caching in a Layered CoAP Proxy.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Impact of hidden nodes on uplink transmission in IEEE 802.11ax heterogeneous network.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

IEEE 802.15.6-Based LTE Overlay Network with Priority Support.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel Condition.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Lightweight Data Streaming from IoT Devices.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Priority-Based Caching Policy at a Hybrid IoT Proxy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Kernel Based Estimation of Domain Parameters at IoT Proxy.
Proceedings of the IEEE Global Communications Conference, 2018

Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh.
Proceedings of the IEEE Global Communications Conference, 2018

Differentiated QoS to Heterogeneous IoT Nodes in IEEE 802.11ah RAW Mechanism.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Sharing It My Way: Efficient M2M Access in LTE/LTE-A Networks.
IEEE Trans. Veh. Technol., 2017

Zoning and Relaying-Based MAC Protocol With RF Recharging.
IEEE Trans. Veh. Technol., 2017

Performance Analysis of Downlink MU-TXOP Sharing in IEEE 802.11ac.
IEEE Trans. Veh. Technol., 2017

Adapting LTE/LTE-A to M2M and D2D Communications.
IEEE Netw., 2017

Guest Editorial Big Security Challenges in Big Data Era.
IEEE Internet Things J., 2017

Explicit Power Ramping during Random Access in LTE#x002F;LTE-A.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Performance of Data Caching in Cloud Sensing.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

An RSU Controlled IEEE 802.11ac Based MAC Protocol for Multi-Vehicle Uplink Transmission in VANET.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Towards efficient monitoring in a sensor cloud.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Inter-piconet communications in Cognitive Personal Area Networks with prioritized exchange of synchronization information.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Group joining time for Cognitive Personal Area Networks (CPANs) with independent node arrivals.
Proceedings of the IEEE International Conference on Communications, 2017

Evaluation of MU-TXOP sharing probabilities in IEEE 802.11ac.
Proceedings of the IEEE International Conference on Communications, 2017

Reliable and Scalable Data Acquisition from IoT Domains.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Access Point Controlled MAC (A-MAC) Protocol for Uplink Multi-User Transmission in IEEE 802.11ac.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Adaptive low-energy clustering in slotted beacon-enabled IEEE 802.15.4 networks.
Wirel. Commun. Mob. Comput., 2016

Task admission control policy in cloud server pools based on task arrival dynamics.
Wirel. Commun. Mob. Comput., 2016

Bridge Performance in Asynchronous Cognitive Personal Area Networks.
IEEE Trans. Veh. Technol., 2016

Analysis of CSMA/CA Mechanism of IEEE 802.15.6 under Non-Saturation Regime.
IEEE Trans. Parallel Distributed Syst., 2016

Performance of the MAC protocol in wireless recharging under E-limited scheduling.
Comput. Commun., 2016

Student/supervisor collaboration and usage patterns of publications available on ResearchGate.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Optimum Zoning in RF-Recharged Sensor Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Towards an M2M Overlay Network on PRACH in LTE/LTE-A.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Tradeoffs in PRACH Bandwidth Partitioning for VM2M Overlay Network in LTE.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Lifetime of a linear IEEE 802.15.4 sensor field with randomized sleep and bridge rotation.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

VM2M: An overlay network to support Vehicular traffic over LTE.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

To Shout or Not to Shout: Performance of Power Ramping during Random Access in LTE/LTE-A.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Recharge Interval and Packet Delay in Wireless Sensor Network with RF Recharging.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Priority based VM2M communications over LTE.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

2015
Simple solutions may still be best: on the selection of working channels in a channel-hopping cognitive network.
Wirel. Commun. Mob. Comput., 2015

Integration of an IEEE 802.15.4 RFID network with mobile readers with a 802.11 WLAN.
Wirel. Commun. Mob. Comput., 2015

Energy-Efficient Cluster-Head Rotation in Beacon-Enabled IEEE 802.15.4 Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Impact of Network Load on the Performance of a Polling MAC With Wireless Recharging of Nodes.
IEEE Trans. Emerg. Top. Comput., 2015

Networking for big data: part 2 [Guest Editorial].
IEEE Netw., 2015

Modeling of RF Recharging in a Wireless Sensor Network with Coordinated Node Sleep.
J. Commun., 2015

Investigating Public-Key Certificate Revocation in Smart Grid.
IEEE Internet Things J., 2015

Evaluation of Single Dimensional Sensor Network Implemented Using Slave-Slave Bridging in IEEE 802.15.4 Technology.
Ad Hoc Sens. Wirel. Networks, 2015

Bridging Between IEEE 802.15.6 and IEEE 802.11e for Wireless Healthcare Networks.
Ad Hoc Sens. Wirel. Networks, 2015

Performance of bridging in cognitive wireless personal area networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Task admission control for cloud server pools.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

A polling MAC with reliable RF recharging of sensor nodes.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Two-way Communications in Cognitive Personal Area Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Task filtering as a task admission control policy in cloud server pools.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Access anomaly of emergency traffic in CSMA/CA of IEEE 802.15.6.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Priority differentiation in cognitive radio networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

MAC protocol for wireless sensor networks with on-demand RF recharging of sensor nodes.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Prioritized Access in a Channel-Hopping Cognitive Network with Spectrum Sensing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Zoning Based MAC with Support for Recharging Process in WSN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Crawling ResearchGate.net to Measure Student/Supervisor Collaboration.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Impact of priority differentiation on the bridged WBAN/WLAN healthcare networks.
Wirel. Commun. Mob. Comput., 2014

Recovery in Channel-Hopping Cognitive Networks Under Random Primary-User Activity.
IEEE Trans. Veh. Technol., 2014

Probabilistic vs. Sequence-Based Rendezvous in Channel-Hopping Cognitive Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2014

A framework for intrusion detection system in advanced metering infrastructure.
Secur. Commun. Networks, 2014

Networking for big data [Guest Editorial].
IEEE Netw., 2014

Channel and Error Modeling for Wireless Body Area Networks.
Mob. Networks Appl., 2014

Guest Editorial for the Special Series on Smart Grid Communications.
IEEE J. Sel. Areas Commun., 2014

Performance of simple polling MAC with wireless re-charging in the presence of noise.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Probability distribution of spectral hole duration in cognitive networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Characterizing energy consumption of IaaS clouds in non-saturated operation.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

An intrusion detection system for smart grid neighborhood area network.
Proceedings of the IEEE International Conference on Communications, 2014

Analyzing the impact of provisioning overhead time in cloud computing centers.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs.
IEEE Trans. Veh. Technol., 2013

Analysis of a Pool Management Scheme for Cloud Computing Centers.
IEEE Trans. Parallel Distributed Syst., 2013

Performance of Cloud Centers with High Degree of Virtualization under Batch Task Arrivals.
IEEE Trans. Parallel Distributed Syst., 2013

A Fine-Grained Performance Model of Cloud Computing Centers.
IEEE Trans. Parallel Distributed Syst., 2013

Lifetime Properties in Cluster-Based IEEE 802.15.4WSNs.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Properties of Blind Rendezvous in Channel Hopping Cognitive Piconets.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Interaction of clustering period and event sensing reliability in IEEE 802.15.4 based WSNs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

On the selection of working channels in a channel-hopping cognitive PAN.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Energy-Efficient Clustering in IEEE 802.15.4 Wireless Sensor Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Modeling the Performance of Heterogeneous IaaS Cloud Centers.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

A scalable public key infrastructure for smart grid communications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Efficient public-key certificate revocation schemes for smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Performance of an IaaS cloud with live migration of virtual machines.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Recovery Using Backup Channels in Channel-Hopping Cognitive Networks.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

2012
Capacity limits in a variable duty cycle IEEE 802.11p-based VANET.
Wirel. Commun. Mob. Comput., 2012

Analysis of Impact of TXOP Allocation on IEEE 802.11e EDCA under Variable Network Load.
IEEE Trans. Parallel Distributed Syst., 2012

Performance Analysis of Cloud Computing Centers Using M/G/m/m+r Queuing Systems.
IEEE Trans. Parallel Distributed Syst., 2012

An identity-based authentication scheme for safety messages in WAVE-enabled VANETs.
Int. J. Parallel Emergent Distributed Syst., 2012

Cooperative Sensing at the MAC Level in Simple Cognitive Personal Area Networks.
IEEE J. Sel. Areas Commun., 2012

Prioritized WAVE-based Parking Assistance with Security and User Anonymity.
J. Commun., 2012

Effects of access phases lengths on performance of IEEE 802.15.6 CSMA/CA.
Comput. Networks, 2012

Stable operation of IEEE 802.11e EDCA: Interaction between offered load and MAC parameters.
Ad Hoc Networks, 2012

Editorial for the special issue of Ad Hoc Networks journal on Recent advances in analysis and deployment of IEEE 802.11e and IEEE 802.11p protocol families.
Ad Hoc Networks, 2012

CSCD: A simple channel scan protocol to discover and join a cognitive PAN.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

MAC performance modeling of IEEE 802.15.6-based WBANs over Rician-faded channels.
Proceedings of IEEE International Conference on Communications, 2012

Extending LTE to support machine-type communications.
Proceedings of IEEE International Conference on Communications, 2012

Towards an efficient rendezvous protocol for a cognitive PAN.
Proceedings of IEEE International Conference on Communications, 2012

Relevance-based verification of VANET safety messages.
Proceedings of IEEE International Conference on Communications, 2012

Two-tier WBAN/WLAN healthcare networks; priority considerations.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Availability analysis of cloud computing centers.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

DDoS attack on WAVE-enabled VANET through synchronization.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Capillary Machine-to-Machine Communications: The Road Ahead.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

Providing QoS in the Integration of RFID and Wi-Fi WLAN.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Performance of simple cognitive personal area networks with finite buffers and adaptive superframe duration.
Wirel. Commun. Mob. Comput., 2011

Cognitive wireless personal area network for monitoring and control.
Wirel. Commun. Mob. Comput., 2011

IEEE 802.11e EDCA Under Bursty Traffic - How Much TXOP Can Improve Performance.
IEEE Trans. Veh. Technol., 2011

Performance Characterization for IEEE 802.11p Network With Single Channel Devices.
IEEE Trans. Veh. Technol., 2011

Emerging technologies and applications of wireless communication in healthcare.
J. Commun. Networks, 2011

IEEE 802.15.6 under saturation: Some problems to be expected.
J. Commun. Networks, 2011

Dynamic parameter adjustment in a cognitive MAC protocol with transmission tax.
Int. J. Auton. Adapt. Commun. Syst., 2011

Reaching spatial or networking saturation in VANET.
EURASIP J. Wirel. Commun. Netw., 2011

Performance analysis of IEEE 802.15.6 under saturation condition and error-prone channel.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Characterization of idle periods in IEEE 802.11e networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

On non-saturation regime in IEEE 802.11p based VANET with mobile nodes.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Location-based anonymous authentication for vehicular communications.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Street Lighting Network Formation Mechanism Based on IEEE 802.15.4.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Video communications over IEEE 802.11p using single channel devices.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Performance of simple cognitive personal area networks with finite buffers.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Modelling of Cloud Computing Centers Using M/G/m Queues.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

ID-based Safety Message Authentication for Security and Trust in Vehicular Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Performance Evaluation of IEEE 802.15.6 under Non-Saturation Condition.
Proceedings of the Global Communications Conference, 2011

Performance Analysis of Cloud Centers under Burst Arrivals and Total Rejection Policy.
Proceedings of the Global Communications Conference, 2011

2010
Bridge performance in a multitier wireless network for healthcare monitoring.
IEEE Wirel. Commun., 2010

Special Section on Advancements in Analysis of CSMA-CA Wireless Network Standards.
IEEE Trans. Veh. Technol., 2010

Vehicular telematics over heterogeneous wireless networks: A survey.
Comput. Commun., 2010

Making the best of limited resources: Optimized differential sensing in cognitive PANs.
Comput. Networks, 2010

Privacy and Anonymity in VANETs: A Contemporary Study.
Ad Hoc Sens. Wirel. Networks, 2010

Performance modeling of safety message delivery in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Performance Analysis of Cloud Computing Centers.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

A novel access control framework for secure pervasive computing.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Impacts of node population and TXOP on stable operation of IEEE 802.11e EDCA.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Performance of G-limited scheduling in a cognitive MAC with transmission tax.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Mobile Software Agents for Wireless Network Mapping and Dynamic Routing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Stability Boundaries between Non-Saturation and Saturation Regimes for IEEE 802.11e EDCA.
Proceedings of IEEE International Conference on Communications, 2010

Controlling Sensing Error for Cognitive PANs with 1-Limited Packet Scheduling.
Proceedings of IEEE International Conference on Communications, 2010

Cognitive MAC Protocol with Transmission Tax: Dynamically Adjusting Sensing and Data Performance.
Proceedings of the Global Communications Conference, 2010

Tradeoff Issues for CCH/SCH Duty Cycle for IEEE 802.11p Single Channel Devices.
Proceedings of the Global Communications Conference, 2010

Deploying Proxy Signature in VANETs.
Proceedings of the Global Communications Conference, 2010

Establishing Trust on VANET Safety Messages - (Invited Paper).
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2009
Cost of secure sensing in IEEE 802.15.4 networks.
IEEE Trans. Wirel. Commun., 2009

Performance of Cooperative Sensing at the MAC Level: Error Minimization Through Differential Sensing.
IEEE Trans. Veh. Technol., 2009

Improving sensing accuracy in cognitive PANs through modulation of sensing probability.
Mob. Inf. Syst., 2009

Bridging between ieee 802.15.4 and IEEE 802.11b networks for multiparameter healthcare sensing.
IEEE J. Sel. Areas Commun., 2009

Differential sensing in cognitive personal area networks with bursty secondary traffic and varying primary activity factor.
Int. J. Auton. Adapt. Commun. Syst., 2009

Reducing sensing error in cognitive PANs through reduction of the channel set and split sensing.
Comput. Commun., 2009

Variable probability modulation policies for sensing in cognitive PANs.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

A Novel Asynchronous, Energy Efficient, Low Transmission Delay MAC Protocol for Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Fast, Seamless Rekeying In Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Simple and Efficient MAC for Cognitive Wireless Personal Area Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Vehicular Network Security.
Encyclopedia of Wireless and Mobile Communications, 2008

IEEE 802.15.4: Signature-Based Intrusion Detection in Wireless Sensor Networks (WSNs).
Encyclopedia of Wireless and Mobile Communications, 2008

Building multicluster 802.15.4 networks: issues and open problems.
IEEE Wirel. Commun., 2008

Analysis of Slave-Slave Bridging in IEEE 802.15.4 Beacon-Enabled Networks.
IEEE Trans. Veh. Technol., 2008

Enforcing patient privacy in healthcare WSNs through key distribution algorithms.
Secur. Commun. Networks, 2008

Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange.
J. Comput. Sci. Technol., 2008

Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster.
Int. J. Sens. Networks, 2008

Analysis of Cluster Interconnection Schemes in 802.15.4 Beacon Enabled Networks.
Int. J. Distributed Sens. Networks, 2008

Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange.
Comput. Networks, 2008

Reducing sensing error in cognitive PANs through differential sensing.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Making the best of limited resources: differential sensing in cognitive PANs.
Proceedings of the 11th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2008

Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Reducing Sensing Error in Cognitive PANs through Modulation of Sensing Probability.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Tradeoff Between CPAN Size and the Number of Working Channels.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Sensor Pooling for Differential Sensing of Active and Idle Channels in Cognitive WPANs.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
Design and performance issues of slave-slave cluster interconnection in 802.15.4 beacon enabled networks.
Int. J. Parallel Emergent Distributed Syst., 2007

Editorial for the Special Issue of ACM/Springer Mobile Networks and Applications - Selected Papers from Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2007).
Mob. Networks Appl., 2007

Sensing with One or with Four? A Comparison of Two IEEE 802.15.x Protocols for Use in Sensor Networks.
Int. J. Distributed Sens. Networks, 2007

The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network.
Comput. Networks, 2007

Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network.
Comput. Networks, 2007

Can we use Acknowledged Transfer in Large Multi-Cluster Beacon Enabled 802.15.4 Networks?
Ad Hoc Sens. Wirel. Networks, 2007

Analytical Model for Key Distribution in 802.15.4 Beacon Enabled Cluster.
Ad Hoc Sens. Wirel. Networks, 2007

Editorial for the Special Issue of Ad hoc networks "Security issues in sensor and Ad hoc networks".
Ad Hoc Networks, 2007

Implementation of security policy for clinical information systems over wireless sensor networks.
Ad Hoc Networks, 2007

Slave-Slave Bridging in 802.15.4 Beacon Enabled Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Performance of Key Distribution in 802.15.4 Beacon Enabled Cluster.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

The cost of secure and reliable sensing in 802.15.4 networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Analysis of non-acknowledged, CSMA-CA, slave-slave bridging in 802.15.4 beacon enabled networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Lifetime Equalization with Key Exchanges in IEEE 802.15.4 Networks.
Proceedings of the Global Communications Conference, 2007

On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

On slave-slave bridging with non-acknowledged GTS access in 802.15.4 beacon enabled networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Impact of Bluetooth MAC layer on the performance of TCP traffic.
Wirel. Commun. Mob. Comput., 2006

Maintaining reliability through activity management in an 802.15.4 sensor cluster.
IEEE Trans. Veh. Technol., 2006

Performance of a Beacon Enabled IEEE 802.15.4 Cluster with Downlink and Uplink Traffic.
IEEE Trans. Parallel Distributed Syst., 2006

Faster Lanes, Longer Lifetimes: Activity Management in Interconnected 802.15.4 Sensor Clusters.
Mob. Networks Appl., 2006

Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis.
J. Interconnect. Networks, 2006

Real-time admission control in 802.15.4 sensor clusters.
Int. J. Sens. Networks, 2006

Performance limitations of the MAC layer in 802.15.4 low rate WPAN.
Comput. Commun., 2006

Activity scheduling based on cross-layer information in Bluetooth sensor networks.
Comput. Commun., 2006

Wireless sensor networks: Performance, reliability, security, and beyond.
Comput. Commun., 2006

Cross-layer activity management in an 802-15.4 sensor network.
IEEE Commun. Mag., 2006

Network lifetime equalization in interconnected 802.15.4 clusters.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Key Exchange in 802.15.4 Networks and Its Performance Implications.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

The Cost of Security: Performance of ZigBee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Admission control in 802.15.4 beacon enabled clusters.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Wireless Sensor Networks for Clinical Information Systems: A Security Perspective.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

Interconnecting 802.15.4 clusters in slotted CSMA-CA mode.
Proceedings of IEEE International Conference on Communications, 2006

On Node Population in a Multi-Level 802.15.4 Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

On Bridge Residence Times in Master-Slave Connected 802.15.4 Clusters.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Intra-Piconet Polling Algorithms in Bluetooth.
Proceedings of the Handbook of Algorithms for Wireless Networking and Mobile Computing., 2005

Performance analysis of Bluetooth piconets with finite baseband buffers.
Wirel. Commun. Mob. Comput., 2005

Modeling of Loosely Coupled Scatternets with Finite Buffers.
Simul., 2005

Access delay for nodes with finite buffers in IEEE 802.15.4 beacon enabled PAN with uplink transmissions.
Comput. Commun., 2005

Editorial for the special issue of computer communications 'performance issues of wireless LANs, PANs, and Ad Hoc networks'.
Comput. Commun., 2005

Walk-In Bridge Scheduling in Bluetooth Scatternets.
Clust. Comput., 2005

Duty Cycle Management in Sensor Networks Based on 802.15.4 Beacon Enabled MAC.
Ad Hoc Sens. Wirel. Networks, 2005

The impact of MAC parameters on the performance of 802.15.4 PAN.
Ad Hoc Networks, 2005

Talk and let talk: performance of Bluetooth piconets with synchronous traffic.
Ad Hoc Networks, 2005

TCP traffic in Bluetooth 1.2: performance and dimensioning of flow control.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Maintaining Reliability Through Activity Management in 802.15.4 Sensor Networks.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

Modeling a Beacon Enabled 802.15.4 Cluster with Bidirectional Traffic.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

MAC layer security of 802.15.4-compliant networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Interconnecting 802.15.4 clusters in master-slave mode: queueing theoretic analysis.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

Avoiding the Bottlenecks in the MAC Layer in 802.15.4 Low Rate WPAN.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

On the Performance of Bluetooth Scatternets with Finite Buffers.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Activity management through bernoulli scheduling in 802.15.4 sensor clusters.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

Adaptive Cycle-Controlled E-Limited Polling in Bluetooth Piconets.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Special section: topics in performance evaluation of wireless networks.
Wirel. Commun. Mob. Comput., 2004

Special issue: performance evaluation of wireless networks.
Wirel. Commun. Mob. Comput., 2004

Performance of adaptive bridge scheduling in a scatternet with a slave-slave bridge.
Wirel. Commun. Mob. Comput., 2004

Admission control in Bluetooth piconets.
IEEE Trans. Veh. Technol., 2004

Performance of Bluetooth Bridges in Scatternets with Limited Service Scheduling.
Mob. Networks Appl., 2004

Call Level QoS Performance under Variable User Mobilities in Wireless Networks.
Mob. Networks Appl., 2004

Performance of Bluetooth bridge scheduling algorithms.
Comput. Commun., 2004

Performance of Bluetooth Piconets with Finite Buffers.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

Bluetooth Master/Slave Bridge Scheduling with and without Rendezvous Points.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Load and QoS-Adaptive Scheduling in Bluetooth Piconets.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Efficient Polling Schemes for Bluetooth Picocells Revisited.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

An on-line hot-spot detection scheme in DS-CDMA networks - single traffic type.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Performance of IEEE 802.15.4 Beacon Enabled PAN with Uplink Transmissions in Non-Saturation Mode - Access Delay for Finite Buffers.
Proceedings of the 1st International Conference on Broadband Networks (BROADNETS 2004), 2004

2003
Non-Uniform Traffic Issues in DCA Wireless Multimedia Networks.
Wirel. Networks, 2003

Admission control in TD-CDMA networks.
Wirel. Commun. Mob. Comput., 2003

Handoff performance in wireless DS-CDMA networks.
Wirel. Commun. Mob. Comput., 2003

Performance of Bluetooth Slave/Slave Bridge.
Telecommun. Syst., 2003

Adaptive inter-piconet scheduling in small scatternets.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Bridges of Bluetooth county: topologies, scheduling, and performance.
IEEE J. Sel. Areas Commun., 2003

Modeling Bluetooth piconet performance.
IEEE Commun. Lett., 2003

On uplink call level QoS in DS-CDMA networks.
Comput. Networks, 2003

Adaptive cycle-limited scheduling scheme for Bluetooth piconets.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Adaptive management of Bluetooth master/slave bridge.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Maintaining Hando .QoS in TD-CDMA Networks.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Performance of Bluetooth Bridges in Scatternets With Exhaustive Service Scheduling.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic.
Proceedings of the Global Telecommunications Conference, 2003

2002
DCA wireless networks under high offered loads: the need for bandwidth reservation.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2002

On virtual private networks security design issues.
Comput. Networks, 2002

On Bluetooth piconet traffic performance.
Proceedings of the 13th IEEE International Symposium on Personal, 2002

Queueing Analysis of Delays in Bluetooth Slave/Slave Bridge.
Proceedings of the 10th International Workshop on Modeling, 2002

Minimizing end-to-end delays in Bluetooth scatternet with a slave/slave bridge.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002

Connecting physical layer and networks layer QoS in DS-CDMA networks-multiple traffic case.
Proceedings of the Global Telecommunications Conference, 2002

Bluetooth scatternet with a master/slave bridge: a queueing theoretic analysis.
Proceedings of the Global Telecommunications Conference, 2002

On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

2001
Correction to "adaptive admission control in wireless multimedia networks under nonuniform traffic conditions".
IEEE J. Sel. Areas Commun., 2001

Hot-spot behavior of DCA wireless networks.
Proceedings of the Global Telecommunications Conference, 2001

2000
Adaptive admission control in wireless multimedia networks under non-uniform traffic conditions.
IEEE J. Sel. Areas Commun., 2000

1999
Admission Control for Wireless Multimedia Networks with Hard Call Level Quality of Service Bounds.
Comput. Networks, 1999

About the problem of hot-spots under adaptive admission control in wireless multimedia networks.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

On Bandwidth Reservation Policies in Broadband Wireless Networks.
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999

1998
Unicast-Based Multicast Algorithm in Wormhole-Routed Star Graph Interconnection Networks.
Parallel Comput., 1998

Call admission control in DCA wireless network.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

Towards a Framework for Testing Distributed Multimedia Software Systems.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1998

Complete Sharing versus Partitioning : Quality of Service Management for Wireless Multimedia Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Event based resource estimation in admission control for wireless networks with heterogeneous traffic.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1997

Charging Schemes for ATM Networks Based on Virtual Effective Bandwidths.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

Admission Control for Wireless Networks with Heterogeneous Traffic using Event Based Resource Estimation.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

1996
Multicast communication algorithm on a wormhole-routed star graph interconnection network.
Proceedings of the 3rd International Conference on High Performance Computing, 1996

1994
Communication Aspects of the Star Graph Interconnection Network.
IEEE Trans. Parallel Distributed Syst., 1994

Routing Function and Deadlock Avoidance in a Star Graph Interconnection Network.
J. Parallel Distributed Comput., 1994

Fault Tolerance of the Star Graph Interconnection Network.
Inf. Process. Lett., 1994


  Loading...