Author of the publication

Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation

, , , and . Proceedings of the 21st International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). Workshop CCNCPS., page 367--372. IEEE, (August 2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Harnessing cross-layer-design., , , , and . Ad Hoc Networks, (2014)Dynamic TinyOS: Modular and Transparent Incremental Code-Updates for Sensor Networks., , , and . ICC, page 1-6. IEEE, (2010)A Trust Point-based Security Architecture for Sensor Data in the Cloud., , , and . Trusted Cloud Computing, Springer, (2014)IP-QoS: Scalable and Flexible Quality-of-Service with Differentiated Services.. The Industrial Information Technology Handbook, CRC Press, (2005)SCSlib: Transparently Accessing Protected Sensor Data in the Cloud., , , and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 370-375. Elsevier, (2014)A receiver-based 802.11 rate adaptation scheme with On-Demand Feedback., , , , and . PIMRC, page 399-405. IEEE, (2012)A blueprint for switching between secure routing protocols in wireless multihop networks., , , , and . WOWMOM, page 1-6. IEEE Computer Society, (2013)Reliability of data in structured peer-to-peer systems., , , , and . HOT-P2P, page 108-113. IEEE Computer Society, (2004)Finite Blocklength Performance of Cooperative Multi-Terminal Wireless Industrial Networks., , , and . IEEE Trans. Vehicular Technology, 67 (7): 5778-5792 (2018)Cooperative security in distributed networks., , , and . Computer Communications, 36 (12): 1284-1297 (2013)