Author of the publication

Queuing modeling for delay analysis in mission oriented sensor networks under the protocol interference model.

, , , , , , and . MiSeNet@MobiCom, page 11-20. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Znati, Taieb
add a person with the name Znati, Taieb
 

Other publications of authors with the same name

ARP versus ES-IS: Performance Evaluation of Neighbour-Greeting Protocols., and . Comput. J., 39 (10): 854-867 (1996)On the Implementation and Performance of the (alpha, t) Protocol on Linux., , , and . Simulation, 81 (6): 413-424 (2005)An Optimized Clustering and Selective Probing Framework to Support Internet Quality-of-Service Routing., and . Simulation, 82 (5): 311-330 (2006)Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks., , , and . IPDPS, IEEE, (2006)Improving Macrocell Downlink Throughput in Rayleigh Fading Channel Environment Through Femtocell User Cooperation., , , , and . IEEE Trans. Wireless Communications, 12 (12): 6488-6499 (2013)Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks., , , , and . ICDCS, page 328-337. IEEE Computer Society, (2004)Energy-efficient, Delay-aware packet scheduling in high-speed networks., , and . IPCCC, page 1-8. IEEE Computer Society, (2015)Context-Aware Deep Learning-Driven Framework for Mitigation of Security Risks in BYOD-Enabled Environments., and . CIC, page 166-175. IEEE Computer Society, (2018)RECA: A Ring-Structured Energy-Efficient Cluster Architecture for Wireless Sensor Networks., and . MSN, volume 3794 of Lecture Notes in Computer Science, page 927-936. Springer, (2005)Similarity Based Optimization for Multiple Query Processing in Wireless Sensor Networks., and . DCOSS, volume 5516 of Lecture Notes in Computer Science, page 117-130. Springer, (2009)