Vojislav B. Misic

Orcid: 0000-0001-7760-9920

Affiliations:
  • Toronto Metropolitan University, Canada


According to our database1, Vojislav B. Misic authored at least 334 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
Cybersecur., December, 2024

Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake.
IEEE Trans. Netw. Serv. Manag., April, 2024

An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus.
IEEE Trans. Netw. Serv. Manag., February, 2024

PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack.
IEEE Internet Things J., January, 2024

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
IEEE Trans. Netw. Sci. Eng., 2024

Block and Transaction Delivery in Ethereum Network.
IEEE Trans. Netw. Sci. Eng., 2024

Progress in Privacy Protection: A Review of Privacy Preserving Techniques in Recommender Systems, Edge Computing, and Cloud Computing.
CoRR, 2024

2023
Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.
Comput. J., October, 2023

Networks for Blockchain-Enabled Applications.
IEEE Commun. Mag., August, 2023

A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism.
IEEE Internet Things J., July, 2023

BERT4Loc: BERT for Location - POI Recommender System.
Future Internet, June, 2023

Design of Proof-of-Stake PBFT Algorithm for IoT Environments.
IEEE Trans. Veh. Technol., February, 2023

Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach.
IEEE Internet Things J., 2023

RSMS: Towards Reliable and Secure Metaverse Service Provision.
CoRR, 2023

PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning.
CoRR, 2023

CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning.
CoRR, 2023

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
CoRR, 2023

Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis.
CoRR, 2023

Performance of IEEE802.11bd for Legacy and NGV Devices with Channel Bonding and No Fallback.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Trust and Rewards in a Two-Tier Consensus Architecture.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Prioritizing transaction delivery in Ethereum network.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain.
Proceedings of the IEEE International Conference on Communications, 2023

DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse.
Proceedings of the IEEE International Conference on Communications, 2023

PBFT with Gated Prioritized Block Cycles.
Proceedings of the IEEE International Conference on Communications, 2023

Fast Cycle Multiple Entry PBFT Consensus.
Proceedings of the IEEE International Conference on Communications, 2023

Analytical evaluation of three attacks on Ethereum.
Proceedings of the IEEE Global Communications Conference, 2023

SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data.
Proceedings of the IEEE Global Communications Conference, 2023

Performance of IEEE 802.11bd Channel Bonding with Fallback.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT.
IEEE Trans. Veh. Technol., 2022

Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization.
IEEE Trans. Veh. Technol., 2022

Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack.
IEEE Trans. Netw. Serv. Manag., 2022

Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment.
IEEE Trans. Green Commun. Netw., 2022

Revisiting FAW attack in an imperfect PoW blockchain system.
Peer-to-Peer Netw. Appl., 2022

A high performance two-layer consensus architecture for blockchain-based IoT systems.
Peer-to-Peer Netw. Appl., 2022

Reducing the number of transaction messages in bitcoin.
Peer-to-Peer Netw. Appl., 2022

Understanding MEC empowered vehicle task offloading performance in 6G networks.
Peer-to-Peer Netw. Appl., 2022

DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics.
Peer-to-Peer Netw. Appl., 2022

Scalable Self-Sovereign Identity Architecture.
IEEE Netw., 2022

IWA: Integrated gradient-based white-box attacks for fooling deep neural networks.
Int. J. Intell. Syst., 2022

BERT4Loc: BERT for Location - POI Recommender System.
CoRR, 2022

Android Malware Detection using Feature Ranking of Permissions.
CoRR, 2022

Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
Proceedings of the IEEE Smartworld, 2022

Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Dual-UAV Aided Secure Dynamic G2U Communication.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach.
Proceedings of the IEEE International Conference on Communications, 2022

Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT.
Proceedings of the IEEE International Conference on Communications, 2022

Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Proof of Stake Voting in Multiple Entry PBFT System.
Proceedings of the IEEE International Conference on Communications, 2022

Improving Rating and Relevance with Point-of-Interest Recommender System.
Proceedings of the IEEE International Conference on Communications, 2022

Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
Proceedings of the IEEE Global Communications Conference, 2022

On block delivery time in Ethereum network.
Proceedings of the IEEE Global Communications Conference, 2022

Evaluating fork after withholding (FAW) attack in Bitcoin.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

2021
Adapting PBFT for Use With Blockchain-Enabled IoT Systems.
IEEE Trans. Veh. Technol., 2021

Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks.
IEEE Trans. Netw. Serv. Manag., 2021

On Selfholding Attack Impact on Imperfect PoW Blockchain Networks.
IEEE Trans. Netw. Sci. Eng., 2021

The Impact of Selfish Mining on Bitcoin Network Performance.
IEEE Trans. Netw. Sci. Eng., 2021

Cost-effective migration-based dynamic platform defense technique: a CTMDP approach.
Peer-to-Peer Netw. Appl., 2021

Performance analysis of heterogeneous cloud-edge services: A modeling approach.
Peer-to-Peer Netw. Appl., 2021

Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum.
CoRR, 2021

LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X.
Ad Hoc Networks, 2021

Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System.
Proceedings of the ICC 2021, 2021

A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording.
Proceedings of the ICC 2021, 2021

Analysis of Selfish Miner Behavior in the Bitcoin Network.
Proceedings of the ICC 2021, 2021

Mal-LSGAN: An Effective Adversarial Malware Example Generation Model.
Proceedings of the IEEE Global Communications Conference, 2021

Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications.
Proceedings of the IEEE Global Communications Conference, 2021

Trade-offs in large blockchain-based IoT system design.
Proceedings of the IEEE Global Communications Conference, 2021

Multiple Leader PBFT Based Blockchain Architecture for IoT Domains: Invited Paper.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

Voting control in multiple entry PBFT blockchain systems for IoT.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

The Impact of Vote Counting Policy on the Performance of PBFT: Invited Paper.
Proceedings of the 34th IEEE Canadian Conference on Electrical and Computer Engineering, 2021

Detecting Fake Points of Interest from Location Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing.
IEEE Trans. Veh. Technol., 2020

Impact of Node Churn in the Bitcoin Network.
IEEE Trans. Netw. Sci. Eng., 2020

Modeling of Bitcoin's Blockchain Delivery Network.
IEEE Trans. Netw. Sci. Eng., 2020

Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks.
IEEE Trans. Netw. Sci. Eng., 2020

Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks.
IEEE Trans. Cogn. Commun. Netw., 2020

Performance Modeling of Linux Network System with Open vSwitch.
Peer-to-Peer Netw. Appl., 2020

An analytical model for churn process in Bitcoin network with ordinary and relay nodes.
Peer-to-Peer Netw. Appl., 2020

Performance analysis of Hyperledger Fabric platform: A hierarchical model approach.
Peer-to-Peer Netw. Appl., 2020

Stochastic Modeling Approaches for Analyzing Blockchain: A Survey.
CoRR, 2020

Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views.
Comput. Secur., 2020

Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies.
Comput. J., 2020

Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification.
IEEE Access, 2020

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives.
IEEE Access, 2020

PBFT-based ordering service for IoT domains.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Comparison of single- and multiple entry point PBFT for IoT blockchain systems.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Examining Permission Patterns in Android Apps using Kernel Density Estimation.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Modeling of Churn Process in Bitcoin Network.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

On the Benefits of Compact Blocks in Bitcoin.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Impact of Node Churn in the Bitcoin Network with Compact Blocks.
Proceedings of the IEEE Global Communications Conference, 2020

Multiple entry point PBFT for IoT systems.
Proceedings of the IEEE Global Communications Conference, 2020

Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin.
Proceedings of the IEEE Global Communications Conference, 2020

Model-based Performance Evaluation of a Moving Target Defense System.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Performance Evaluation of Heterogeneous IoT Nodes With Differentiated QoS in IEEE 802.11ah RAW Mechanism.
IEEE Trans. Veh. Technol., 2019

Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud.
IEEE Trans. Cloud Comput., 2019

Data Lifetime Estimation in a Multicast-Based CoAP Proxy.
Open J. Internet Things, 2019

Bridging the Transition from IEEE 802.11ac to IEEE 802.11ax: Survival of EDCA in a Coexistence Environment.
IEEE Netw., 2019

BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services.
IEEE Internet Things J., 2019

Reliable and Secure Vehicular Fog Service Provision.
IEEE Internet Things J., 2019

Performance Analysis of Multithreaded IoT Gateway.
IEEE Internet Things J., 2019

Efficient Security Scheme for Disaster Surveillance UAV Communication Networks.
Inf., 2019

Performance analysis of IEEE 802.11ax heterogeneous network in the presence of hidden terminals.
CoRR, 2019

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples.
IEEE Access, 2019

Towards a Blockchain-Based Healthcare Information System : Invited Paper.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Block Delivery Time in Bitcoin Distribution Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Extending the Operational Range of UAV Communication Network using IEEE 802.11ah.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

On Forks and Fork Characteristics in a Bitcoin-Like Distribution Network.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Uplink Access Protocol in IEEE 802.11ac.
IEEE Trans. Wirel. Commun., 2018

Formation of Cognitive Personal Area Networks (CPANs) Using Probabilistic Rendezvous.
IEEE Trans. Veh. Technol., 2018

Efficiency of Power Ramping During Random Access in LTE.
IEEE Trans. Veh. Technol., 2018

Protocol Architectures for IoT Domains.
IEEE Netw., 2018

Priority-Based Machine-To-Machine Overlay Network over LTE for a Smart City.
J. Sens. Actuator Networks, 2018

Proxy Cache Maintenance Using Multicasting in CoAP IoT Domains.
IEEE Internet Things J., 2018

Architecture for IoT Domain With CoAP Observe Feature.
IEEE Internet Things J., 2018

Performance of Caching in a Layered CoAP Proxy.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Impact of hidden nodes on uplink transmission in IEEE 802.11ax heterogeneous network.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

IEEE 802.15.6-Based LTE Overlay Network with Priority Support.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel Condition.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Lightweight Data Streaming from IoT Devices.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Priority-Based Caching Policy at a Hybrid IoT Proxy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Kernel Based Estimation of Domain Parameters at IoT Proxy.
Proceedings of the IEEE Global Communications Conference, 2018

Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh.
Proceedings of the IEEE Global Communications Conference, 2018

Differentiated QoS to Heterogeneous IoT Nodes in IEEE 802.11ah RAW Mechanism.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Sharing It My Way: Efficient M2M Access in LTE/LTE-A Networks.
IEEE Trans. Veh. Technol., 2017

Zoning and Relaying-Based MAC Protocol With RF Recharging.
IEEE Trans. Veh. Technol., 2017

Performance Analysis of Downlink MU-TXOP Sharing in IEEE 802.11ac.
IEEE Trans. Veh. Technol., 2017

Adapting LTE/LTE-A to M2M and D2D Communications.
IEEE Netw., 2017

Explicit Power Ramping during Random Access in LTE#x002F;LTE-A.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Performance of Data Caching in Cloud Sensing.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

An RSU Controlled IEEE 802.11ac Based MAC Protocol for Multi-Vehicle Uplink Transmission in VANET.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Towards efficient monitoring in a sensor cloud.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Inter-piconet communications in Cognitive Personal Area Networks with prioritized exchange of synchronization information.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Group joining time for Cognitive Personal Area Networks (CPANs) with independent node arrivals.
Proceedings of the IEEE International Conference on Communications, 2017

Evaluation of MU-TXOP sharing probabilities in IEEE 802.11ac.
Proceedings of the IEEE International Conference on Communications, 2017

Reliable and Scalable Data Acquisition from IoT Domains.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Access Point Controlled MAC (A-MAC) Protocol for Uplink Multi-User Transmission in IEEE 802.11ac.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Adaptive low-energy clustering in slotted beacon-enabled IEEE 802.15.4 networks.
Wirel. Commun. Mob. Comput., 2016

Bridge Performance in Asynchronous Cognitive Personal Area Networks.
IEEE Trans. Veh. Technol., 2016

Analysis of CSMA/CA Mechanism of IEEE 802.15.6 under Non-Saturation Regime.
IEEE Trans. Parallel Distributed Syst., 2016

Performance of the MAC protocol in wireless recharging under E-limited scheduling.
Comput. Commun., 2016

Student/supervisor collaboration and usage patterns of publications available on ResearchGate.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Optimum Zoning in RF-Recharged Sensor Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Towards an M2M Overlay Network on PRACH in LTE/LTE-A.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Tradeoffs in PRACH Bandwidth Partitioning for VM2M Overlay Network in LTE.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Lifetime of a linear IEEE 802.15.4 sensor field with randomized sleep and bridge rotation.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

VM2M: An overlay network to support Vehicular traffic over LTE.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

To Shout or Not to Shout: Performance of Power Ramping during Random Access in LTE/LTE-A.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Recharge Interval and Packet Delay in Wireless Sensor Network with RF Recharging.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Priority based VM2M communications over LTE.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

2015
Simple solutions may still be best: on the selection of working channels in a channel-hopping cognitive network.
Wirel. Commun. Mob. Comput., 2015

Integration of an IEEE 802.15.4 RFID network with mobile readers with a 802.11 WLAN.
Wirel. Commun. Mob. Comput., 2015

Energy-Efficient Cluster-Head Rotation in Beacon-Enabled IEEE 802.15.4 Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Impact of Network Load on the Performance of a Polling MAC With Wireless Recharging of Nodes.
IEEE Trans. Emerg. Top. Comput., 2015

Guest Editorial: Special Issue of IEEE Transactions on Emerging Topics in Computing on Emerging Mobile and Ubiquitous Systems Part - II.
IEEE Trans. Emerg. Top. Comput., 2015

Special Issue of the IEEE Transactions on Emerging Topics in Computing on Emerging Mobile and Ubiquitous Systems Part I.
IEEE Trans. Emerg. Top. Comput., 2015

Modeling of RF Recharging in a Wireless Sensor Network with Coordinated Node Sleep.
J. Commun., 2015

Special section on business process analytics.
Inf. Syst. Frontiers, 2015

Evaluation of Single Dimensional Sensor Network Implemented Using Slave-Slave Bridging in IEEE 802.15.4 Technology.
Ad Hoc Sens. Wirel. Networks, 2015

Performance of bridging in cognitive wireless personal area networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Task admission control for cloud server pools.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

A polling MAC with reliable RF recharging of sensor nodes.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Two-way Communications in Cognitive Personal Area Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Task filtering as a task admission control policy in cloud server pools.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Priority differentiation in cognitive radio networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

MAC protocol for wireless sensor networks with on-demand RF recharging of sensor nodes.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Prioritized Access in a Channel-Hopping Cognitive Network with Spectrum Sensing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Zoning Based MAC with Support for Recharging Process in WSN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Crawling ResearchGate.net to Measure Student/Supervisor Collaboration.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Recovery in Channel-Hopping Cognitive Networks Under Random Primary-User Activity.
IEEE Trans. Veh. Technol., 2014

Probabilistic vs. Sequence-Based Rendezvous in Channel-Hopping Cognitive Networks.
IEEE Trans. Parallel Distributed Syst., 2014

A framework for intrusion detection system in advanced metering infrastructure.
Secur. Commun. Networks, 2014

Performance of simple polling MAC with wireless re-charging in the presence of noise.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Probability distribution of spectral hole duration in cognitive networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Characterizing energy consumption of IaaS clouds in non-saturated operation.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

An intrusion detection system for smart grid neighborhood area network.
Proceedings of the IEEE International Conference on Communications, 2014

Analyzing the impact of provisioning overhead time in cloud computing centers.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

2013
The Effects of Test-Driven Development on External Quality and Productivity: A Meta-Analysis.
IEEE Trans. Software Eng., 2013

Guest Editors' Introduction: Special Issue on Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2013

Analysis of a Pool Management Scheme for Cloud Computing Centers.
IEEE Trans. Parallel Distributed Syst., 2013

Performance of Cloud Centers with High Degree of Virtualization under Batch Task Arrivals.
IEEE Trans. Parallel Distributed Syst., 2013

A Fine-Grained Performance Model of Cloud Computing Centers.
IEEE Trans. Parallel Distributed Syst., 2013

Lifetime Properties in Cluster-Based IEEE 802.15.4WSNs.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Properties of Blind Rendezvous in Channel Hopping Cognitive Piconets.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Interaction of clustering period and event sensing reliability in IEEE 802.15.4 based WSNs.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

On the selection of working channels in a channel-hopping cognitive PAN.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Energy-Efficient Clustering in IEEE 802.15.4 Wireless Sensor Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Modeling the Performance of Heterogeneous IaaS Cloud Centers.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Performance of an IaaS cloud with live migration of virtual machines.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Recovery Using Backup Channels in Channel-Hopping Cognitive Networks.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

2012
Capacity limits in a variable duty cycle IEEE 802.11p-based VANET.
Wirel. Commun. Mob. Comput., 2012

Analysis of Impact of TXOP Allocation on IEEE 802.11e EDCA under Variable Network Load.
IEEE Trans. Parallel Distributed Syst., 2012

Performance Analysis of Cloud Computing Centers Using M/G/m/m+r Queuing Systems.
IEEE Trans. Parallel Distributed Syst., 2012

An identity-based authentication scheme for safety messages in WAVE-enabled VANETs.
Int. J. Parallel Emergent Distributed Syst., 2012

Editorial for the special issue of Ad Hoc Networks journal on Recent advances in analysis and deployment of IEEE 802.11e and IEEE 802.11p protocol families.
Ad Hoc Networks, 2012

CSCD: A simple channel scan protocol to discover and join a cognitive PAN.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A two-tier integrated RFID/sensor network with a WiFi WLAN.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

MAC performance modeling of IEEE 802.15.6-based WBANs over Rician-faded channels.
Proceedings of IEEE International Conference on Communications, 2012

Extending LTE to support machine-type communications.
Proceedings of IEEE International Conference on Communications, 2012

Towards an efficient rendezvous protocol for a cognitive PAN.
Proceedings of IEEE International Conference on Communications, 2012

Availability analysis of cloud computing centers.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

DDoS attack on WAVE-enabled VANET through synchronization.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Capillary Machine-to-Machine Communications: The Road Ahead.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

Providing QoS in the Integration of RFID and Wi-Fi WLAN.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Performance of simple cognitive personal area networks with finite buffers and adaptive superframe duration.
Wirel. Commun. Mob. Comput., 2011

Cognitive wireless personal area network for monitoring and control.
Wirel. Commun. Mob. Comput., 2011

Performance Characterization for IEEE 802.11p Network With Single Channel Devices.
IEEE Trans. Veh. Technol., 2011

Dynamic parameter adjustment in a cognitive MAC protocol with transmission tax.
Int. J. Auton. Adapt. Commun. Syst., 2011

Reaching spatial or networking saturation in VANET.
EURASIP J. Wirel. Commun. Netw., 2011

Characterization of idle periods in IEEE 802.11e networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Video communications over IEEE 802.11p using single channel devices.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Performance of simple cognitive personal area networks with finite buffers.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Modelling of Cloud Computing Centers Using M/G/m Queues.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

ID-based Safety Message Authentication for Security and Trust in Vehicular Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Performance Analysis of Cloud Centers under Burst Arrivals and Total Rejection Policy.
Proceedings of the Global Communications Conference, 2011

2010
Bridge performance in a multitier wireless network for healthcare monitoring.
IEEE Wirel. Commun., 2010

Best papers from the WWASN2009 workshop.
Int. J. Parallel Emergent Distributed Syst., 2010

Making the best of limited resources: Optimized differential sensing in cognitive PANs.
Comput. Networks, 2010

Performance Analysis of Cloud Computing Centers.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

Performance of G-limited scheduling in a cognitive MAC with transmission tax.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Mobile Software Agents for Wireless Network Mapping and Dynamic Routing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Stability Boundaries between Non-Saturation and Saturation Regimes for IEEE 802.11e EDCA.
Proceedings of IEEE International Conference on Communications, 2010

Controlling Sensing Error for Cognitive PANs with 1-Limited Packet Scheduling.
Proceedings of IEEE International Conference on Communications, 2010

Cognitive MAC Protocol with Transmission Tax: Dynamically Adjusting Sensing and Data Performance.
Proceedings of the Global Communications Conference, 2010

Tradeoff Issues for CCH/SCH Duty Cycle for IEEE 802.11p Single Channel Devices.
Proceedings of the Global Communications Conference, 2010

2009
Performance of Cooperative Sensing at the MAC Level: Error Minimization Through Differential Sensing.
IEEE Trans. Veh. Technol., 2009

Improving sensing accuracy in cognitive PANs through modulation of sensing probability.
Mob. Inf. Syst., 2009

Bridging between ieee 802.15.4 and IEEE 802.11b networks for multiparameter healthcare sensing.
IEEE J. Sel. Areas Commun., 2009

Differential sensing in cognitive personal area networks with bursty secondary traffic and varying primary activity factor.
Int. J. Auton. Adapt. Commun. Syst., 2009

Reducing sensing error in cognitive PANs through reduction of the channel set and split sensing.
Comput. Commun., 2009

Variable probability modulation policies for sensing in cognitive PANs.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

A Novel Asynchronous, Energy Efficient, Low Transmission Delay MAC Protocol for Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Simple and Efficient MAC for Cognitive Wireless Personal Area Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Vehicular Network Security.
Encyclopedia of Wireless and Mobile Communications, 2008

IEEE 802.15.4: MAC Layer Attacks in Sensor Clusters.
Encyclopedia of Wireless and Mobile Communications, 2008

Building multicluster 802.15.4 networks: issues and open problems.
IEEE Wirel. Commun., 2008

Enforcing patient privacy in healthcare WSNs through key distribution algorithms.
Secur. Commun. Networks, 2008

Best papers from the WWASN2007 workshop.
Int. J. Parallel Emergent Distributed Syst., 2008

Reducing sensing error in cognitive PANs through differential sensing.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Making the best of limited resources: differential sensing in cognitive PANs.
Proceedings of the 11th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2008

Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Reducing Sensing Error in Cognitive PANs through Modulation of Sensing Probability.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Tradeoff Between CPAN Size and the Number of Working Channels.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Sensor Pooling for Differential Sensing of Active and Idle Channels in Cognitive WPANs.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
A holistic architecture assessment method for software product lines.
Inf. Softw. Technol., 2007

Sensing with One or with Four? A Comparison of Two IEEE 802.15.x Protocols for Use in Sensor Networks.
Int. J. Distributed Sens. Networks, 2007

Editorial for the special issue on Recent Developments in Ad Hoc and Sensor Networks: Selected Papers from the Ad Hoc and Sensor Network Track of the AINA-07 Conference.
Ad Hoc Sens. Wirel. Networks, 2007

Editorial: Workshop on Wireless Ad Hoc and Sensor Networks WWASN 2006.
Ad Hoc Sens. Wirel. Networks, 2007

Implementation of security policy for clinical information systems over wireless sensor networks.
Ad Hoc Networks, 2007

The cost of secure and reliable sensing in 802.15.4 networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Lifetime Equalization with Key Exchanges in IEEE 802.15.4 Networks.
Proceedings of the Global Communications Conference, 2007

Evaluating the Feasibility of Traffic-Based Intrusion Detection in an 802.15.4 Sensor Cluster.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Impact of Bluetooth MAC layer on the performance of TCP traffic.
Wirel. Commun. Mob. Comput., 2006

Maintaining reliability through activity management in an 802.15.4 sensor cluster.
IEEE Trans. Veh. Technol., 2006

Performance of a Beacon Enabled IEEE 802.15.4 Cluster with Downlink and Uplink Traffic.
IEEE Trans. Parallel Distributed Syst., 2006

Perceptions of extreme programming: an exploratory study.
ACM SIGSOFT Softw. Eng. Notes, 2006

Faster Lanes, Longer Lifetimes: Activity Management in Interconnected 802.15.4 Sensor Clusters.
Mob. Networks Appl., 2006

Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis.
J. Interconnect. Networks, 2006

Real-time admission control in 802.15.4 sensor clusters.
Int. J. Sens. Networks, 2006

Performance limitations of the MAC layer in 802.15.4 low rate WPAN.
Comput. Commun., 2006

Activity scheduling based on cross-layer information in Bluetooth sensor networks.
Comput. Commun., 2006

Wireless sensor networks: Performance, reliability, security, and beyond.
Comput. Commun., 2006

Cross-layer activity management in an 802-15.4 sensor network.
IEEE Commun. Mag., 2006

Network lifetime equalization in interconnected 802.15.4 clusters.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

The Cost of Security: Performance of ZigBee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Admission control in 802.15.4 beacon enabled clusters.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Wireless Sensor Networks for Clinical Information Systems: A Security Perspective.
Proceedings of the 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 2006

Interconnecting 802.15.4 clusters in slotted CSMA-CA mode.
Proceedings of IEEE International Conference on Communications, 2006

On Node Population in a Multi-Level 802.15.4 Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Designing Service-Based Applications: Teaching the Old Dogs New Tricks ...or Is It the Other Way Around?
Proceedings of the Advances in Conceptual Modeling - Theory and Practice, 2006

Preface for CoSS 2006.
Proceedings of the Advances in Conceptual Modeling - Theory and Practice, 2006

On Bridge Residence Times in Master-Slave Connected 802.15.4 Clusters.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Service Views: a Coherent View Model of the SOA in the Enterprise.
Proceedings of the 2006 IEEE International Conference on Services Computing (SCC 2006), 2006

2005
Intra-Piconet Polling Algorithms in Bluetooth.
Proceedings of the Handbook of Algorithms for Wireless Networking and Mobile Computing., 2005

Performance analysis of Bluetooth piconets with finite baseband buffers.
Wirel. Commun. Mob. Comput., 2005

Modeling of Loosely Coupled Scatternets with Finite Buffers.
Simul., 2005

Access delay for nodes with finite buffers in IEEE 802.15.4 beacon enabled PAN with uplink transmissions.
Comput. Commun., 2005

Editorial for the special issue of computer communications 'performance issues of wireless LANs, PANs, and Ad Hoc networks'.
Comput. Commun., 2005

Walk-In Bridge Scheduling in Bluetooth Scatternets.
Clust. Comput., 2005

Duty Cycle Management in Sensor Networks Based on 802.15.4 Beacon Enabled MAC.
Ad Hoc Sens. Wirel. Networks, 2005

The impact of MAC parameters on the performance of 802.15.4 PAN.
Ad Hoc Networks, 2005

Talk and let talk: performance of Bluetooth piconets with synchronous traffic.
Ad Hoc Networks, 2005

Extending the ATAM Architecture Evaluation to Product Line Architectures.
Proceedings of the Fifth Working IEEE / IFIP Conference on Software Architecture (WICSA 2005), 2005

TCP traffic in Bluetooth 1.2: performance and dimensioning of flow control.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Maintaining Reliability Through Activity Management in 802.15.4 Sensor Networks.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

Modeling a Beacon Enabled 802.15.4 Cluster with Bidirectional Traffic.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

MAC layer security of 802.15.4-compliant networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Interconnecting 802.15.4 clusters in master-slave mode: queueing theoretic analysis.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

Avoiding the Bottlenecks in the MAC Layer in 802.15.4 Low Rate WPAN.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

On the Performance of Bluetooth Scatternets with Finite Buffers.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Activity management through bernoulli scheduling in 802.15.4 sensor clusters.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

Adaptive Cycle-Controlled E-Limited Polling in Bluetooth Piconets.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Performance of adaptive bridge scheduling in a scatternet with a slave-slave bridge.
Wirel. Commun. Mob. Comput., 2004

Admission control in Bluetooth piconets.
IEEE Trans. Veh. Technol., 2004

Performance of Bluetooth Bridges in Scatternets with Limited Service Scheduling.
Mob. Networks Appl., 2004

Performance of Bluetooth bridge scheduling algorithms.
Comput. Commun., 2004

Performance of Bluetooth Piconets with Finite Buffers.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

Bluetooth Master/Slave Bridge Scheduling with and without Rendezvous Points.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

Load and QoS-Adaptive Scheduling in Bluetooth Piconets.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Efficient Polling Schemes for Bluetooth Picocells Revisited.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Performance of IEEE 802.15.4 Beacon Enabled PAN with Uplink Transmissions in Non-Saturation Mode - Access Delay for Finite Buffers.
Proceedings of the 1st International Conference on Broadband Networks (BROADNETS 2004), 2004

2003
Admission control in TD-CDMA networks.
Wirel. Commun. Mob. Comput., 2003

Handoff performance in wireless DS-CDMA networks.
Wirel. Commun. Mob. Comput., 2003

Performance of Bluetooth Slave/Slave Bridge.
Telecommun. Syst., 2003

Adaptive inter-piconet scheduling in small scatternets.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Bridges of Bluetooth county: topologies, scheduling, and performance.
IEEE J. Sel. Areas Commun., 2003

Modeling Bluetooth piconet performance.
IEEE Commun. Lett., 2003

On uplink call level QoS in DS-CDMA networks.
Comput. Networks, 2003

Measuring the Coherence of Software Product Line Architectures.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Adaptive cycle-limited scheduling scheme for Bluetooth piconets.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Adaptive management of Bluetooth master/slave bridge.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Maintaining Hando .QoS in TD-CDMA Networks.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Performance of Bluetooth Bridges in Scatternets With Exhaustive Service Scheduling.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic.
Proceedings of the Global Telecommunications Conference, 2003

2002
On Bluetooth piconet traffic performance.
Proceedings of the 13th IEEE International Symposium on Personal, 2002

Queueing Analysis of Delays in Bluetooth Slave/Slave Bridge.
Proceedings of the 10th International Workshop on Modeling, 2002

Minimizing end-to-end delays in Bluetooth scatternet with a slave/slave bridge.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002

Connecting physical layer and networks layer QoS in DS-CDMA networks-multiple traffic case.
Proceedings of the Global Telecommunications Conference, 2002

Bluetooth scatternet with a master/slave bridge: a queueing theoretic analysis.
Proceedings of the Global Telecommunications Conference, 2002

On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

2001
Cohesion is Structural, Coherence is Functional: Different Views, Different Measures.
Proceedings of the 7th IEEE International Software Metrics Symposium (METRICS 2001), 2001

2000
Evaluating the Quality of Reference Models.
Proceedings of the Conceptual Modeling, 2000

Coherence equals cohesion-or does it?
Proceedings of the 7th Asia-Pacific Software Engineering Conference (APSEC 2000), 2000

1999
Cost estimation based on business models.
J. Syst. Softw., 1999

1998
Estimation of effort and complexity: An object-oriented case study.
J. Syst. Softw., 1998

Downsizing the Estimation of Software Quality: A Small Object-Oriented Case Study.
Proceedings of the TOOLS 1998: 27th International Conference on Technology of Object-Oriented Languages and Systems, 1998

1997
Measuring Object-Oriented Business Models.
Proceedings of the TOOLS 1997: 25th International Conference on Technology of Object-Oriented Languages and Systems, 1997

From Formal Metamodels to Metrics: An Object-Oriented Approach.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997

A Formal Approach to Metamodeling: A Generic Object-Oriented Perspective.
Proceedings of the Conceptual Modeling, 1997

Measuring Class Coupling and Cohesion: A Formal Metamodel Approach.
Proceedings of the 4th Asia-Pacific Software Engineering and International Computer Science Conference (APSEC '97 / ICSC '97), 1997

1992
Formal Specification of a Data Dictionary for an Extended ER Data Model.
Comput. J., 1992


  Loading...