Search the dblp DataBase
Jens B. Schmitt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jens B. Schmitt , Utz Roedig Sensor Network Calculus - A Framework for Worst Case Analysis. [Citation Graph (0, 0)][DBLP ] DCOSS, 2005, pp:141-154 [Conf ] Frank A. Zdarsky , Ivan Martinovic , Jens B. Schmitt On lower bounds for MAC layer contention in CSMA/CA-based wireless networks. [Citation Graph (0, 0)][DBLP ] DIALM-POMC, 2005, pp:8-16 [Conf ] Frank A. Zdarsky , Jens B. Schmitt Handover in Mobile Communication Networks: Who is in Control Anyway?. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 2004, pp:205-212 [Conf ] Ivan Martinovic , Christof Leng , Frank A. Zdarsky , Andreas Mauthe , Ralf Steinmetz , Jens B. Schmitt Self-protection in P2P Networks: Choosing the Right Neighbourhood. [Citation Graph (0, 0)][DBLP ] IWSOS/EuroNGI, 2006, pp:23-33 [Conf ] Frank A. Zdarsky , Ivan Martinovic , Jens B. Schmitt The Case for Virtualized Wireless Access Networks. [Citation Graph (0, 0)][DBLP ] IWSOS/EuroNGI, 2006, pp:90-104 [Conf ] Frank A. Zdarsky , Ivan Martinovic , Jens B. Schmitt On Self-coordination in Wireless Community Networks. [Citation Graph (0, 0)][DBLP ] PWC, 2006, pp:251-262 [Conf ] Oliver Heckmann , Jens B. Schmitt Best-Effort Versus Reservations Revisited. [Citation Graph (0, 0)][DBLP ] IWQoS, 2005, pp:151-163 [Conf ] Frank A. Zdarsky , Jens B. Schmitt Enhancing mobile QoS based on movement contracts. [Citation Graph (0, 0)][DBLP ] IWQoS, 2004, pp:3-9 [Conf ] Matthias Hollick , Parag S. Mogre , Tronje Krop , Hans-Peter Huth , Jens B. Schmitt , Ralf Steinmetz M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:366-373 [Conf ] Markus Fidler , Jens B. Schmitt On the way to a distributed systems calculus: an end-to-end network calculus with data scaling. [Citation Graph (0, 0)][DBLP ] SIGMETRICS/Performance, 2006, pp:287-298 [Conf ] Matthias Hollick , Jens B. Schmitt , Christian Seipl , Ralf Steinmetz The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process. [Citation Graph (0, 0)][DBLP ] WWIC, 2004, pp:201-212 [Conf ] Jens B. Schmitt , Frank A. Zdarsky The DISCO network calculator: a toolbox for worst case analysis. [Citation Graph (0, 0)][DBLP ] VALUETOOLS, 2006, pp:8- [Conf ] Utz Roedig , Jens B. Schmitt Multimedia and firewalls: a performance perspective. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2005, v:11, n:1, pp:19-33 [Journal ] Martin Karsten , Jens C. Schmitt Packet marking for integrated load control. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2005, pp:499-512 [Conf ] Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch... [Citation Graph (, )][DBLP ] A New Service Curve Model to Deal with Non-FIFO Systems. [Citation Graph (, )][DBLP ] Turning the Tables: Using Wireless Communication Against an Attacker. [Citation Graph (, )][DBLP ] Firewalling wireless sensor networks: Security by wireless. [Citation Graph (, )][DBLP ] Self-organized sink placement in large-scale wireless sensor networks. [Citation Graph (, )][DBLP ] Placing Multiple Sinks in Time-Sensitive Wireless Sensor Networks using a Genetic Algorithm. [Citation Graph (, )][DBLP ] Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once. [Citation Graph (, )][DBLP ] The DISCO Network Calculator. [Citation Graph (, )][DBLP ] Searching for Tight Performance Bounds in Feed-Forward Networks. [Citation Graph (, )][DBLP ] Regional-based authentication against dos attacks in wireless networks. [Citation Graph (, )][DBLP ] Demultiplexing in Network Calculus- A Stochastic Scaling Approach. [Citation Graph (, )][DBLP ] A Comprehensive Worst-Case Calculus for Wireless Sensor Networks with In-Network Processing. [Citation Graph (, )][DBLP ] Phishing in the Wireless: Implementation and Analysis. [Citation Graph (, )][DBLP ] Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs. [Citation Graph (, )][DBLP ] Secret keys from entangled sensor motes: implementation and analysis. [Citation Graph (, )][DBLP ] Wireless client puzzles in IEEE 802.11 networks: security by wireless. [Citation Graph (, )][DBLP ] Jamming for good: a fresh approach to authentic communication in WSNs. [Citation Graph (, )][DBLP ] Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis [Citation Graph (, )][DBLP ] Search in 0.000secs, Finished in 0.320secs