Jens B. Schmitt

Affiliations:
  • University of Kaiserslautern, Department of Computer Science


According to our database1, Jens B. Schmitt authored at least 163 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Extending Network Calculus To Deal With Partially Negative And Decreasing Service Curves.
CoRR, 2024

RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users.
Proceedings of the 33rd USENIX Security Symposium, 2024

Extending Network Calculus to Deal with Min-Plus Service Curves in Multiple Flow Scenarios.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024

2022
Unleashing the Power of Paying Multiplexing Only Once in Stochastic Network Calculus.
Proc. ACM Meas. Anal. Comput. Syst., 2022

Searching for Upper Delay Bounds in FIFO Multiplexing Feedforward Networks.
Proceedings of the RTNS 2022: The 30th International Conference on Real-Time Networks and Systems, Paris, France, June 7, 2022

Improving Performance Bounds for Weighted Round-Robin Schedulers under Constrained Cross-Traffic.
Proceedings of the IFIP Networking Conference, 2022

2021
Fully Unleashing the Power of Paying Multiplexing Only Once in Stochastic Network Calculus.
CoRR, 2021

Orbit-based authentication using TDOA signatures in satellite networks.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
Improving Delay Bounds in the Stochastic Network Calculus by Using less Stochastic Inequalities.
Proceedings of the VALUETOOLS 2020: 13th EAI International Conference on Performance Evaluation Methodologies and Tools, 2020

On the Stochastic End-to-End Delay Analysis in Sink Trees Under Independent and Dependent Arrivals.
Proceedings of the Measurement, Modelling and Evaluation of Computing Systems, 2020

2019
h-Mitigators: Improving your stochastic network calculus output bounds.
Comput. Commun., 2019

Secure Location Verification: Why You Want Your Verifiers to Be Mobile.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Dealing with Dependence in Stochastic Network Calculus - Using Independence as a Bound.
Proceedings of the Analytical and Stochastic Modelling Techniques and Applications, 2019

2018
Integrating Fractional Brownian Motion Arrivals into the Statistical Network Calculus.
Proceedings of the 30th International Teletraffic Congress, 2018

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Improving Output Bounds in the Stochastic Network Calculus Using Lyapunov's Inequality.
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018

Catching Corner Cases in Network Calculus - Flow Segregation Can Improve Accuracy.
Proceedings of the Measurement, Modelling and Evaluation of Computing Systems, 2018

2017
Quality and Cost of Deterministic Network Calculus: Design and Evaluation of an Accurate and Fast Analysis.
Proc. ACM Meas. Anal. Comput. Syst., 2017

Generalizing window flow control in bivariate network calculus to enable leftover service in the loop.
Perform. Evaluation, 2017

The Sensor Network Calculus as Key to the Design of Wireless Sensor Networks with Predictable Performance.
J. Sens. Actuator Networks, 2017

On per-flow delay bounds in tandem queues under (In)dependent arrivals.
Proceedings of the 2017 IFIP Networking Conference, 2017

Generalized finitary real-time calculus.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Calculating Accurate End-to-End Delay Bounds - You Better Know Your Cross-Traffic.
EAI Endorsed Trans. Ubiquitous Environ., 2016

Window Flow Control in Stochastic Network Calculus - The General Service Case.
EAI Endorsed Trans. Ubiquitous Environ., 2016

Friendly Jamming on Access Points: Analysis and Real-World Measurements.
IEEE Trans. Wirel. Commun., 2016

How real is the threat of instability events predicted by Adversarial Queueing Theory?
Tiny Trans. Comput. Sci., 2016

Delay Bounds in Feed-Forward Networks - A Fast and Accurate Network Calculus Solution.
CoRR, 2016

Secure Motion Verification using the Doppler Effect.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Traffic-Driven Implicit Buffer Management - Delay Differentiation without Traffic Contracts.
Proceedings of the 28th International Teletraffic Congress, 2016

Stochastic Upper and Lower Bounds for General Markov Fluids.
Proceedings of the 28th International Teletraffic Congress, 2016

Should Network Calculus Relocate? An Assessment of Current Algebraic and Optimization-Based Analyses.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

Load balancing - towards balanced delay guarantees in NFV/SDN.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Improving Cross-Traffic Bounds in Feed-Forward Networks - There is a Job for Everyone.
Proceedings of the Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems, 2016

Achieving Efficiency without Sacrificing Model Accuracy: Network Calculus on Compact Domains.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

2015
Maximizing Cache Hit Ratios by Variance Reduction.
SIGMETRICS Perform. Evaluation Rev., 2015

Network Calculus (Dagstuhl Seminar 15112).
Dagstuhl Reports, 2015

Security by mobility in location and track verification.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Secure Track Verification.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Boosting sensor network calculus by thoroughly bounding cross-traffic.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
On the Reception of Concurrent Transmissions in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

Detection of Reactive Jamming in DSSS-based Wireless Communications.
IEEE Trans. Wirel. Commun., 2014

Gaining insight on friendly jamming in a real-world IEEE 802.11 network.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

End-to-End Delay Bounds for Variable Length Packet Transmissions under Flow Transformations.
Proceedings of the 8th International Conference on Performance Evaluation Methodologies and Tools, 2014

The DiscoDNC v2 - A Comprehensive Tool for Deterministic Network Calculus.
Proceedings of the 8th International Conference on Performance Evaluation Methodologies and Tools, 2014

On the relevance of adversarial queueing theory in practice.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

On the catalyzing effect of randomness on the per-flow throughput in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Towards a statistical network calculus - Dealing with uncertainty in arrivals.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels.
IEEE J. Sel. Areas Commun., 2013

Air Dominance in Sensor Networks: Guarding Sensor Motes using Selective Interference
CoRR, 2013

An Analytical Model of Packet Collisions in IEEE 802.15.4 Wireless Networks.
CoRR, 2013

Measurement and Prediction of Centrical/Peripheral Network Properties based on Regression Analysis - A Parametric Foundation for Performance Self-Management in WSNs.
CoRR, 2013

Who do you sync you are?: smartphone fingerprinting via application behaviour.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Detection of reactive jamming in DSSS-based wireless networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

The DISCO stochastic network calculator version 1.0: when waiting comes to an end.
Proceedings of the 7th International Conference on Performance Evaluation Methodologies and Tools, 2013

Performance modelling and analysis of unreliable links with retransmissions using network calculus.
Proceedings of the 25th International Teletraffic Congress, 2013

Simulation of adversarial scenarios in OMNeT++: putting adversarial queueing theory from its head to feet.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

Sharp bounds in stochastic network calculus.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Towards measurement-based self-management of performance properties in wireless sensor networks.
Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, 2013

Neighborhood watch: On network coding throughput and key sharing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

An analytical model of a hybrid network of static and mobile sensors.
Proceedings of the Asian Internet Engineering Conference, 2013

2012
A leftover service curve approach to analyze demultiplexing in queueing networks.
Proceedings of the 6th International ICST Conference on Performance Evaluation Methodologies and Tools, 2012

On the calculation of sample-path backlog bounds in queueing systems over finite time horizons.
Proceedings of the 6th International ICST Conference on Performance Evaluation Methodologies and Tools, 2012

Perspectives on network calculus: no free lunch, but still good value.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Achieving High Lifetime and Low Delay in Very Large Sensors Networks Using Mobile Sinks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

2011
WiSec 2011 demo: RFReact - a real-time capable and channel-aware jamming platform.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Dynamic demultiplexing in network calculus - Theory and application.
Perform. Evaluation, 2011

Dimensioning of Time-Critical WSNs - Theory, Implementation and Evaluation.
J. Commun., 2011

Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

WiFire: a firewall for wireless networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Pay bursts only once holds for (some) non-FIFO systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

On expressing networks with flow transformations in convolution-form.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Planning the trajectories of multiple mobile sinks in large-scale, time-sensitive WSNs.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis
CoRR, 2010

Secret keys from entangled sensor motes: implementation and analysis.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Searching for Tight Performance Bounds in Feed-Forward Networks.
Proceedings of the Measurement, 2010

Statistical response time bounds in randomly deployed wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A Self-adversarial Approach to Delay Analysis under Arbitrary Scheduling.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010

2009
Minimizing contention through cooperation between densely deployed wireless LANs.
Wirel. Networks, 2009

Chaotic communication improves authentication: protecting WSNs against injection attacks.
Secur. Commun. Networks, 2009

Bringing law and order to IEEE 802.11 networks - A case for DiscoSec.
Pervasive Mob. Comput., 2009

Jamming for good: a fresh approach to authentic communication in WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Demultiplexing in Network Calculus- A Stochastic Scaling Approach.
Proceedings of the QEST 2009, 2009

Self-organized sink placement in large-scale wireless sensor networks.
Proceedings of the 17th Annual Meeting of the IEEE/ACM International Symposium on Modelling, 2009

A New Service Curve Model to Deal with Non-FIFO Systems.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Turning the Tables: Using Wireless Communication Against an Attacker.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2009

Node deployment in large wireless sensor networks: coverage, energy consumption, and worst-case delay.
Proceedings of the AINTEC '09, 2009

Sink placement without location information in large-scale wireless sensor networks.
Proceedings of the AINTEC '09, 2009

2008
Worst Case Modelling of Wireless Sensor Networks.
Prax. Inf.verarb. Kommun., 2008

Modeling of Self-Organizing Systems.
Prax. Inf.verarb. Kommun., 2008

Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Wireless client puzzles in IEEE 802.11 networks: security by wireless.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008

Placing Multiple Sinks in Time-Sensitive Wireless Sensor Networks using a Genetic Algorithm.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008

The DISCO Network Calculator.
Proceedings of the Proceedings 14th GI/ITG Conference on Measurement, Modelling and Evaluation of Computer and Communication Systems (MMB 2008), March 31, 2008

Firewalling wireless sensor networks: Security by wireless.
Proceedings of the LCN 2008, 2008

Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch...
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Network calculus: what it can do for you and where it needs your help.
Proceedings of the AINTEC '08, 2008

2007
Validating the sensor network calculus by simulations.
Proceedings of the 3rd International ICSTConference on Wireless Internet, 2007

Phishing in the Wireless: Implementation and Analysis.
Proceedings of the New Approaches for Security, 2007

A Comprehensive Worst-Case Calculus for Wireless Sensor Networks with In-Network Processing.
Proceedings of the 28th IEEE Real-Time Systems Symposium (RTSS 2007), 2007

Regional-based authentication against dos attacks in wireless networks.
Proceedings of the Q2SWinet'07, 2007

Energy-Efficent TDMA Design Under Real-Time Constraints in Wireless Sensor Networks.
Proceedings of the 15th International Symposium on Modeling, 2007

2006
The DISCO network calculator: a toolbox for worst case analysis.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006

On the way to a distributed systems calculus: an end-to-end network calculus with data scaling.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

On Self-coordination in Wireless Community Networks.
Proceedings of the Personal Wireless Communications, 2006

The Case for Virtualized Wireless Access Networks.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

Self-protection in P2P Networks: Choosing the Right Neighbourhood.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

2005
Layer-encoded video in scalable adaptive streaming.
IEEE Trans. Multim., 2005

Multimedia and firewalls: a performance perspective.
Multim. Syst., 2005

M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Best-Effort Versus Reservations Revisited.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

Packet marking for integrated load control.
Proceedings of the Integrated Network Management, 2005

On lower bounds for MAC layer contention in CSMA/CA-based wireless networks.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2005

Sensor Network Calculus - A Framework for Worst Case Analysis.
Proceedings of the Distributed Computing in Sensor Systems, 2005

2004
A Modular Approach to Mobile QoS Signaling- Motivation, Design & Implementation.
Multim. Tools Appl., 2004

Modeling mobility and workload for wireless metropolitan area networks.
Comput. Commun., 2004

Optimizing interconnection policies.
Comput. Networks, 2004

Layer-encoded video streaming a proxy's perspective.
IEEE Commun. Mag., 2004

The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process.
Proceedings of the Wired/Wireless Internet Communications, Second International Conference, 2004

Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications.
Proceedings of the NETWORKING 2004, 2004

Enhancing mobile QoS based on movement contracts.
Proceedings of the Quality of Service, 2004

Network calculus meets queueing theory -a simulation based approach to bounded queues.
Proceedings of the Quality of Service, 2004

A case for simplicity in providing network quality of service: class-based strict priority queueing.
Proceedings of the 12th IEEE International Conference on Networks, 2004

On the effect of node misbehavior in ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

Handover in Mobile Communication Networks: Who is in Control Anyway?.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
QoS-Controlled Dynamic Replication in Peer-to-Peer Systems.
Prax. Inf.verarb. Kommun., 2003

Translation of specification units between IP and ATM quality of service declarations.
Int. J. Commun. Syst., 2003

Generating realistic ISP-level network topologies.
IEEE Commun. Lett., 2003

The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems.
Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003), 2003

On realistic network topologies for simulation.
Proceedings of the ACM SIGCOMM workshop on Models, 2003

Observations on Equation-Based Estimation of TCP-Compatible Rate for Multi-rate Multicast Scenarios.
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003

KOM ScenGen The Swiss Army Knife for Simulation and Emulation Experiments.
Proceedings of the Interactive Multimedia on Next Generation Networks, 2003

Bottleneck Estimation for Load Control Gateways.
Proceedings of the 11th International Workshop on Modeling, 2003

Comparative Analysis of Quality of Service Routing in Wireless Metropolitan Area Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

A Reflective Media Server Design to Speedup TCP-Friendly Media Transmission at Start-Up.
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2003

Subjective Impression of Variations in Layer Encoded Videos.
Proceedings of the Quality of Service, 2003

Quality of Availability: Replica Placement for Widely Distributed Systems.
Proceedings of the Quality of Service, 2003

Equation-based approach to TCP-compatible multicast congestion control for layered transmission in low-multiplexing environments.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Per-flow guarantees under class-based priority queueing.
Proceedings of the Global Telecommunications Conference, 2003

Polishing: A Technique to Reduce Variations in Cached Layer-Encoded Video.
Proceedings of the 29th EUROMICRO Conference 2003, 2003

2002
VC Management for Heterogeneous QoS Multicast Transmissions.
Telecommun. Syst., 2002

Decoupling different time scales of network QoS systems.
Comput. Commun., 2002

On Availability QoS for Replicated Multimedia Service and Content.
Proceedings of the Protocols and Systems for Interactive Distributed Multimedia, 2002

On the allocation of network service curves for bandwidth/delay-decoupled scheduling disciplines.
Proceedings of the Global Telecommunications Conference, 2002

Is Dynamic Multi-Rate Multicast Worthwhile the Effort?
Proceedings of the 28th EUROMICRO Conference 2002, 4-6 September 2002, Dortmund, Germany, 2002

2001
On the aggregation of deterministic service flows.
Comput. Commun., 2001

Multi-Period Resource Allocation at System Edges -- Capacity Management in a Multi-Provider Multi-Service Internet.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Implementation and Evaluation of the KOM RSVP Engine.
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001

Design and Implementation of a QoS-Aware Replication Mechanism for a Distributed Multimedia System.
Proceedings of the Interactive Distributed Multimedia Systems, 2001

Replication for a Distributed Multimedia System.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

2000
Charging for packet-switched network communication - motivation and overview.
Comput. Commun., 2000

On the Feasibility of RSVP as General Signalling Interface.
Proceedings of the Quality of Future Internet Services, 2000

Layered Network QoS Signalling - Motivation, Implementation & Measurements.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Generalizing RSVP's traffic and policy control interface.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

1999
A taxonomy of interaction models for Internet and ATM quality of service architectures.
Telecommun. Syst., 1999

Cost and Price Calculation for Internet Integrated Services.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

1998
Abrechnungsverfahren für paketvermittelte diensteintegrierende Kommunikationsnetze.
Prax. Inf.verarb. Kommun., 1998

Quality of Service Support for Recording and Playback of MBone Sessions in Heterogeneous IP/ATM Networks.
Proceedings of the Broadband European Networks and Multimedia Services, 1998

1997
Search for native conformations of organic molecules by genetic algorithms.
Proceedings of the 23rd EUROMICRO Conference '97, 1997

1996
Finding the Conformation of Organic Molecules with Genetic Algorithms.
Proceedings of the Parallel Problem Solving from Nature, 1996

Search for Native Conformation of Organic Molecules by Genetic Algorithms.
Proceedings of the German Conference on Bioinformatics, 1996


  Loading...