The SCEAS System
Navigation Menu

Search the dblp DataBase


Jerzy Konorski: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jerzy Konorski
    Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2005, pp:127-140 [Conf]
  2. Jerzy Konorski, Krzysztof Nowicki, Jozef Wozniak
    Performance of the Cooperative Random Token Protocol for High-Speed Radio LANs. [Citation Graph (0, 0)][DBLP]
    Data Communication Networks and their Performance, 1993, pp:47-60 [Conf]
  3. Jerzy Konorski
    Store-and-Forward Deadlock Prevention in Packet Networks: A Circulating Token Approach and Performance Considerations. [Citation Graph (0, 0)][DBLP]
    ICC, 1986, pp:119-123 [Conf]
  4. Jerzy Konorski
    Anonymous Agreed Order Multicast: Performance and Free Riding. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2006, pp:128-135 [Conf]
  5. Jerzy Konorski
    Packet Scheduling in Wireless LANs - A Framework for a Noncooperative Paradigm. [Citation Graph (0, 0)][DBLP]
    PWC, 2000, pp:29-42 [Conf]
  6. Jerzy Konorski
    Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:262-274 [Conf]
  7. Jerzy Konorski
    Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2005, pp:491-498 [Conf]
  8. Jerzy Konorski
    CSMA/CA Performance under Backoff Attacks: A Game-Theoretic Context. [Citation Graph (0, 0)][DBLP]
    MMB, 2004, pp:349-358 [Conf]
  9. Jerzy Konorski
    Quality of service games in an IEEE 802.11 ad hoc wireless LAN. [Citation Graph (0, 0)][DBLP]
    MSWiM, 2006, pp:265-272 [Conf]
  10. Jerzy Konorski
    Membership-Insensitive Totally Ordered Multicast: Properties and Performance. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2000, pp:201-212 [Conf]
  11. Jerzy Konorski
    Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2002, pp:1141-1146 [Conf]
  12. Jerzy Konorski
    Fair Packet Forwarding in MANETs with Anonymous Stations: A Game-Theoretic Approach. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:418-429 [Conf]
  13. Jerzy Konorski
    Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting. [Citation Graph (0, 0)][DBLP]
    PROMS, 2001, pp:116-129 [Conf]
  14. Jerzy Konorski
    An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICDCN, 2006, pp:582-593 [Conf]
  15. Jerzy Konorski
    A game-theoretic study of CSMA/CA under a backoff attack. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:16, n:6, pp:1167-1178 [Journal]
  16. Jerzy Konorski
    An Incentive-Based Forwarding Protocol for Mobile Ad Hoc Networks with Anonymous Packets. [Citation Graph (0, 0)][DBLP]
    NEW2AN, 2007, pp:316-329 [Conf]

  17. Wireless multihoming modeled as a multi-WLAN game. [Citation Graph (, )][DBLP]

  18. Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations. [Citation Graph (, )][DBLP]

  19. Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs. [Citation Graph (, )][DBLP]

Search in 0.050secs, Finished in 0.051secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002