Author of the publication

Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links.

, , , , , and . InterIoT/SaSeIoT, volume 190 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 56-63. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IPv6 Multicast Forwarding in RPL-Based Wireless Sensor Networks., , and . Wireless Personal Communications, 73 (3): 1089-1116 (2013)An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact., , , and . T. Large-Scale Data- and Knowledge-Centered Systems, (2016)BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs., , , and . InterIoT/SaSeIoT, volume 190 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 18-25. (2016)Guard time optimisation and adaptation for energy efficient multi-hop TSCH networks., , , , , , and . WF-IoT, page 301-306. IEEE Computer Society, (2016)Living Labs, Innovation Districts and Information Marketplaces: A Systems Approach for Smart Cities., , and . CSER, volume 16 of Procedia Computer Science, page 668-677. Elsevier, (2013)Life-logging in smart environments: Challenges and security threats., , and . ICC, page 5680-5684. IEEE, (2012)A System Dynamics Model of Cyber Conflict., , , and . SMC, page 303-308. IEEE, (2013)Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention., , , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 28-41. Springer, (2013)Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems., , , , and . SEC, volume 455 of IFIP Advances in Information and Communication Technology, page 601-615. Springer, (2015)Optimizing Short Message Text Sentiment Analysis for Mobile Device Forensics., , , and . IFIP Int. Conf. Digital Forensics, volume 484 of IFIP Advances in Information and Communication Technology, page 69-87. Springer, (2016)