The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jens B. Schmitt: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jens B. Schmitt, Utz Roedig
    Sensor Network Calculus - A Framework for Worst Case Analysis. [Citation Graph (0, 0)][DBLP]
    DCOSS, 2005, pp:141-154 [Conf]
  2. Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
    On lower bounds for MAC layer contention in CSMA/CA-based wireless networks. [Citation Graph (0, 0)][DBLP]
    DIALM-POMC, 2005, pp:8-16 [Conf]
  3. Frank A. Zdarsky, Jens B. Schmitt
    Handover in Mobile Communication Networks: Who is in Control Anyway?. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2004, pp:205-212 [Conf]
  4. Ivan Martinovic, Christof Leng, Frank A. Zdarsky, Andreas Mauthe, Ralf Steinmetz, Jens B. Schmitt
    Self-protection in P2P Networks: Choosing the Right Neighbourhood. [Citation Graph (0, 0)][DBLP]
    IWSOS/EuroNGI, 2006, pp:23-33 [Conf]
  5. Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
    The Case for Virtualized Wireless Access Networks. [Citation Graph (0, 0)][DBLP]
    IWSOS/EuroNGI, 2006, pp:90-104 [Conf]
  6. Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
    On Self-coordination in Wireless Community Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:251-262 [Conf]
  7. Oliver Heckmann, Jens B. Schmitt
    Best-Effort Versus Reservations Revisited. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2005, pp:151-163 [Conf]
  8. Frank A. Zdarsky, Jens B. Schmitt
    Enhancing mobile QoS based on movement contracts. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2004, pp:3-9 [Conf]
  9. Matthias Hollick, Parag S. Mogre, Tronje Krop, Hans-Peter Huth, Jens B. Schmitt, Ralf Steinmetz
    M^2 DR: A Near-optimal Multiclass Minimum-delay Routing Algorithm for Smart Radio Access Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:366-373 [Conf]
  10. Markus Fidler, Jens B. Schmitt
    On the way to a distributed systems calculus: an end-to-end network calculus with data scaling. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS/Performance, 2006, pp:287-298 [Conf]
  11. Matthias Hollick, Jens B. Schmitt, Christian Seipl, Ralf Steinmetz
    The Ad Hoc On-Demand Distance Vector Protocol: An Analytical Model of the Route Acquisition Process. [Citation Graph (0, 0)][DBLP]
    WWIC, 2004, pp:201-212 [Conf]
  12. Jens B. Schmitt, Frank A. Zdarsky
    The DISCO network calculator: a toolbox for worst case analysis. [Citation Graph (0, 0)][DBLP]
    VALUETOOLS, 2006, pp:8- [Conf]
  13. Utz Roedig, Jens B. Schmitt
    Multimedia and firewalls: a performance perspective. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:1, pp:19-33 [Journal]
  14. Martin Karsten, Jens C. Schmitt
    Packet marking for integrated load control. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2005, pp:499-512 [Conf]

  15. Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch... [Citation Graph (, )][DBLP]


  16. A New Service Curve Model to Deal with Non-FIFO Systems. [Citation Graph (, )][DBLP]


  17. Turning the Tables: Using Wireless Communication Against an Attacker. [Citation Graph (, )][DBLP]


  18. Firewalling wireless sensor networks: Security by wireless. [Citation Graph (, )][DBLP]


  19. Self-organized sink placement in large-scale wireless sensor networks. [Citation Graph (, )][DBLP]


  20. Placing Multiple Sinks in Time-Sensitive Wireless Sensor Networks using a Genetic Algorithm. [Citation Graph (, )][DBLP]


  21. Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once. [Citation Graph (, )][DBLP]


  22. The DISCO Network Calculator. [Citation Graph (, )][DBLP]


  23. Searching for Tight Performance Bounds in Feed-Forward Networks. [Citation Graph (, )][DBLP]


  24. Regional-based authentication against dos attacks in wireless networks. [Citation Graph (, )][DBLP]


  25. Demultiplexing in Network Calculus- A Stochastic Scaling Approach. [Citation Graph (, )][DBLP]


  26. A Comprehensive Worst-Case Calculus for Wireless Sensor Networks with In-Network Processing. [Citation Graph (, )][DBLP]


  27. Phishing in the Wireless: Implementation and Analysis. [Citation Graph (, )][DBLP]


  28. Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs. [Citation Graph (, )][DBLP]


  29. Secret keys from entangled sensor motes: implementation and analysis. [Citation Graph (, )][DBLP]


  30. Wireless client puzzles in IEEE 802.11 networks: security by wireless. [Citation Graph (, )][DBLP]


  31. Jamming for good: a fresh approach to authentic communication in WSNs. [Citation Graph (, )][DBLP]


  32. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis [Citation Graph (, )][DBLP]


Search in 0.000secs, Finished in 0.320secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002