Apostolos Traganitis

According to our database1, Apostolos Traganitis authored at least 63 papers between 1977 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Semantics-Aware Active Fault Detection in Status Updating Systems.
IEEE Open J. Commun. Soc., 2024

2022
Semantics-Aware Active Fault Detection in Status Updating Systems.
CoRR, 2022

Semantics-Aware Active Fault Detection in IoT.
Proceedings of the 20th International Symposium on Modeling and Optimization in Mobile, 2022

2021
Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement Learning.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2020
Optimal Policies for Status Update Generation in an IoT Device With Heterogeneous Traffic.
IEEE Internet Things J., 2020

2019
Control of Status Updates for Energy Harvesting Devices That Monitor Processes with Alarms.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Controlling Status Updates in a Wireless System with Heterogeneous Traffic and Age of Information Constraints.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Jamming in Multiple Independent Gaussian Channels as a Game.
Proceedings of the Game Theory for Networks, 2019

2018
Energy Efficient Policies for Data Transmission in Disruption Tolerant Heterogeneous IoT Networks.
Sensors, 2018

Wireless network-level partial relay cooperation: A stable throughput analysis.
J. Commun. Networks, 2018

Optimal Policies for Status Update Generation in a Wireless System with Heterogeneous Traffic.
CoRR, 2018

2017
Flow Allocation for Maximum Throughput and Bounded Delay on Multiple Disjoint Paths for Random Access Wireless Multihop Networks.
IEEE Trans. Veh. Technol., 2017

The Gaussian interference channel revisited as a non-cooperative game with transmission cost.
Proceedings of the 15th International Symposium on Modeling and Optimization in Mobile, 2017

2016
Effect of energy harvesting on stable throughput in cooperative relay systems.
J. Commun. Networks, 2016

2015
Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection.
Wirel. Commun. Mob. Comput., 2015

Relay-Assisted Multiple Access With Full-Duplex Multi-Packet Reception.
IEEE Trans. Wirel. Commun., 2015

On the performance of network coding and forwarding schemes with different degrees of redundancy for wireless mesh networks.
Comput. Commun., 2015

Network-level performance evaluation of a two-relay cooperative random access wireless system.
Comput. Networks, 2015

A two-stage power and QoS aware dynamic spectrum assignment scheme for cognitive wireless sensor networks.
Proceedings of the Seventh International Workshop on Quality of Multimedia Experience, 2015

Periodic collection of spectrum occupancy data by energy constrained cognitive IoT devices.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A Two-Stage Spectrum Assignment Scheme for Power and QoS Constrained Cognitive CSMA/CA Networks.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Performance of Flow Allocation with Successive Interference Cancelation for Random Access WMNs.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

A Pattern-Based Approach for Designing Reliable Cyber-Physical Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Cross Layer Interference Management in Wireless Biomedical Networks.
Entropy, 2014

TOFRA: Throughput Optimal Flow Rate Allocation with Bounded Delay for Random Access Wireless Mesh Networks.
CoRR, 2014

Performance Evaluation of Flow Allocation with Successive Interference Cancelation for Random Access WMNs.
CoRR, 2014

The Benefits of Deploying a Second Relay in Multi-User Cooperative Wireless Systems: A Networking Perspective.
CoRR, 2014

Stability and performance issues of a relay assisted multiple access scheme with MPR capabilities.
Comput. Commun., 2014

Energy efficient collection of spectrum occupancy data in wireless cognitive sensor networks.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Lightweight and secure encryption using channel measurements.
Proceedings of the 4th International Conference on Wireless Communications, 2014

On the delay of a throughput optimal flow allocation scheme for random access WMNs.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

A Rapid Emergency Deployment mobile communication node.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

2013
On the stability region of a relay-assisted multiple access scheme.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

Performance issues of multiple-relay cooperation.
Proceedings of IEEE International Conference on Communications, 2013

A Privacy-Level Model of User-Centric Cyber-Physical Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Throughput optimal flow allocation on multiple paths for random access wireless multi-hop networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

Network-level cooperation in energy harvesting wireless networks.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

2012
Optimal utilization of a cognitive shared channel with a rechargeable primary source node.
J. Commun. Networks, 2012

Wireless network-level partial relay cooperation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Evaluating forwarding schemes exploiting path diversity and degrees of redundancy in a realistic wireless environment.
Proceedings of the 17th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2012

2011
A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking.
EURASIP J. Wirel. Commun. Netw., 2011

Adjacent channel interference in 802.11a is harmful: Testbed validation of a simple quantification model.
IEEE Commun. Mag., 2011

Relay-assisted multiple access with multi-packet reception capability and simultaneous transmission and reception.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
Path diversity gain with network coding and multipath transmission in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Delay and throughput of network coding with path redundancy for wireless mesh networks.
Proceedings of the 3rd Joint IFIP Wireless and Mobile Networking Conference, 2010

A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Wireless positioning using the Signal Strength Difference on Arrival.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Stability and Performance Issues of a Relay Assisted Multiple Access Scheme.
Proceedings of the Global Communications Conference, 2010

2009
Management of Future Mesh-Based Radio Access Networks.
ERCIM News, 2009

Business opportunities and considerations on wireless mesh networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Mobile Lightweight Wireless Systems, 2009

Rate region and power considerations in a simple 2×2 interference channel.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

2008
The effect of using directional antennas on adjacent channel interference in 802.11a: Modeling and experience with an outdoors testbed.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks.
Proceedings of the Second International Conference on Emerging Security Information, 2008

On the alphabet size of a linear network code.
Proceedings of the 5th International ICST Conference on Broadband Communications, 2008

2006
SINR-Based Ad-Hoc Networking.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

An efficient authentication scheme for contactless smartcards using elliptic curve cryptography.
Proceedings of the Third IASTED International Conference on Communication, 2006

Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks.
Proceedings of the Third IASTED International Conference on Communication, 2006

2004
Scheduling objects in broadcast systems with energy-limited clients.
Comput. Commun., 2004

2003
Algorithms for Scalable Content Distribution.
Proceedings of the Quality of Future Internet Services, COST Action 263 Final Report, 2003

2002
Object scheduling in broadcast systems for energy-limited clients.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

1977
The estimation of a probability density function from measurements corrupted by Poisson noise (Corresp.).
IEEE Trans. Inf. Theory, 1977

The effect of a memoryless nonlinearity on the spectrum of a random process.
IEEE Trans. Inf. Theory, 1977


  Loading...