Jelena Mišić
#167,088
Most Influential Person Now
Jelena Mišić's AcademicInfluence.com Rankings
Jelena Mišićcomputer-science Degrees
Computer Science
#10132
World Rank
#10627
Historical Rank
Cloud Computing
#47
World Rank
#48
Historical Rank
Database
#7088
World Rank
#7334
Historical Rank

Download Badge
Computer Science
Jelena Mišić's Degrees
- PhD Computer Science University of Belgrade
- Masters Computer Science University of Belgrade
- Bachelors Computer Science University of Belgrade
Similar Degrees You Can Earn
Why Is Jelena Mišić Influential?
(Suggest an Edit or Addition)Jelena Mišić's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Performance Analysis of Cloud Computing Centers Using M/G/m/m+r Queuing Systems (2012) (396)
- Vehicular telematics over heterogeneous wireless networks: A survey (2010) (200)
- Performance of a beacon enabled IEEE 802.15.4 cluster with downlink and uplink traffic (2006) (180)
- Close Binary Systems (2009) (125)
- The impact of MAC parameters on the performance of 802.15.4 PAN (2005) (124)
- A Fine-Grained Performance Model of Cloud Computing Centers (2013) (118)
- Performance of IEEE 802.15.4 beacon enabled PAN with uplink transmissions in non-saturation mode - access delay for finite buffers (2004) (101)
- Wireless Personal Area Networks: Performance, Interconnection and Security with IEEE 802.15.4 (2008) (82)
- Analysis of a Pool Management Scheme for Cloud Computing Centers (2013) (78)
- A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs (2013) (76)
- Performance analysis of IEEE 802.15.6 under saturation condition and error-prone channel (2011) (74)
- Performance of Cloud Centers with High Degree of Virtualization under Batch Task Arrivals (2013) (69)
- Modeling Bluetooth piconet performance (2003) (66)
- DDoS attack on WAVE-enabled VANET through synchronization (2012) (66)
- Bridges of Bluetooth county: topologies, scheduling, and performance (2003) (63)
- Performance Characterization for IEEE 802.11p Network With Single Channel Devices (2011) (62)
- Access delay for nodes with finite buffers in IEEE 802.15.4 beacon enabled PAN with uplink transmissions (2005) (62)
- Performance Evaluation of IEEE 802.15.6 under Non-Saturation Condition (2011) (61)
- Bridge performance in a multitier wireless network for healthcare monitoring (2010) (61)
- ID-based Safety Message Authentication for Security and Trust in Vehicular Networks (2011) (60)
- IEEE 802.15.6 under saturation: Some problems to be expected (2011) (60)
- Effects of access phases lengths on performance of IEEE 802.15.6 CSMA/CA (2012) (53)
- Analysis of CSMA/CA Mechanism of IEEE 802.15.6 under Non-Saturation Regime (2016) (51)
- Modelling of Cloud Computing Centers Using M/G/m Queues (2011) (50)
- Bridging between ieee 802.15.4 and IEEE 802.11b networks for multiparameter healthcare sensing (2009) (50)
- Maintaining reliability through activity management in an 802.15.4 sensor cluster (2006) (45)
- Cross-layer activity management in an 802-15.4 sensor network (2006) (43)
- Implementation of security policy for clinical information systems over wireless sensor networks (2007) (41)
- Investigating Public-Key Certificate Revocation in Smart Grid (2015) (41)
- Communication Aspects of the Star Graph Interconnection Network (1994) (40)
- Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples (2019) (39)
- IEEE 802.11e EDCA Under Bursty Traffic—How Much TXOP Can Improve Performance (2011) (39)
- Machine-to-Machine Communications : Architectures, Technology, Standards, and Applications (2014) (39)
- Avoiding the Bottlenecks in the MAC Layer in 802.15.4 Low Rate WPAN (2005) (38)
- Security and Privacy of Connected Vehicular Cloud Computing (2018) (38)
- Modeling of Bitcoin's Blockchain Delivery Network (2020) (36)
- Reliable and Secure Vehicular Fog Service Provision (2019) (36)
- Sharing It My Way: Efficient M2M Access in LTE/LTE-A Networks (2017) (35)
- Wireless sensor networks: Performance, reliability, security, and beyond (2006) (34)
- Performance analysis of Hyperledger Fabric platform: A hierarchical model approach (2020) (33)
- Performance Analysis of Cloud Centers under Burst Arrivals and Total Rejection Policy (2011) (33)
- Analysis of Impact of TXOP Allocation on IEEE 802.11e EDCA under Variable Network Load (2012) (33)
- Performance Evaluation of Heterogeneous IoT Nodes With Differentiated QoS in IEEE 802.11ah RAW Mechanism (2019) (32)
- Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control (2005) (32)
- Duty Cycle Management in Sensor Networks Based on 802.15.4 Beacon Enabled MAC (2005) (32)
- MAC layer security of 802.15.4-compliant networks (2005) (32)
- Fault Tolerance of the Star Graph Interconnection Network (1994) (31)
- Performance Analysis of Cloud Computing Centers (2010) (31)
- Availability analysis of cloud computing centers (2012) (30)
- Efficient Security Scheme for Disaster Surveillance UAV Communication Networks (2019) (30)
- Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks (2014) (29)
- Proxy signature-based RSU message broadcasting in VANETs (2010) (29)
- Tradeoff Issues for CCH/SCH Duty Cycle for IEEE 802.11p Single Channel Devices (2010) (29)
- Performance limitations of the MAC layer in 802.15.4 low rate WPAN (2006) (28)
- An intrusion detection system for smart grid neighborhood area network (2014) (28)
- Privacy and Anonymity in VANETs: A Contemporary Study (2010) (28)
- Performance modeling of safety message delivery in vehicular ad hoc networks (2010) (27)
- A framework for intrusion detection system in advanced metering infrastructure (2014) (27)
- Capillary Machine-to-Machine Communications: The Road Ahead (2012) (26)
- On virtual private networks security design issues (2002) (25)
- Routing Function and Deadlock Avoidance in a Star Graph Interconnection Network (1994) (24)
- Complete sharing versus partitioning: quality of service management for wireless multimedia networks (1998) (24)
- Performance of Cooperative Sensing at the MAC Level: Error Minimization Through Differential Sensing (2009) (24)
- Simple and Efficient MAC for Cognitive Wireless Personal Area Networks (2009) (23)
- The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network (2007) (21)
- Adaptive admission control in wireless multimedia networks under non-uniform traffic conditions (2000) (21)
- Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster (2007) (20)
- Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views (2020) (20)
- Maintaining reliability through activity management in 802.15.4 sensor networks (2005) (20)
- Enforcing patient privacy in healthcare WSNs through key distribution algorithms (2008) (20)
- Interconnecting 802.15.4 clusters in master-slave mode: queueing theoretic analysis (2005) (19)
- Relevance-based verification of VANET safety messages (2012) (19)
- The Cost of Security: Performance of ZigBee Key Exchange Mechanism in an 802.15.4 Beacon Enabled Cluster (2006) (19)
- On Bluetooth piconet traffic performance (2002) (18)
- On call level QoS guarantees under heterogeneous user mobilities in wireless multimedia networks (1999) (18)
- Minimizing end-to-end delays in Bluetooth scatternet with a slave/slave bridge (2002) (18)
- Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks (2014) (17)
- Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange (2008) (17)
- Extending LTE to support machine-type communications (2012) (17)
- Event based resource estimation in admission control for wireless networks with heterogeneous traffic (1997) (17)
- Efficient public-key certificate revocation schemes for smart grid (2013) (17)
- Location-based anonymous authentication for vehicular communications (2011) (17)
- Ef .cient polling schemes for bluetooth picocells revisited (2004) (17)
- Probabilistic vs. Sequence-Based Rendezvous in Channel-Hopping Cognitive Networks (2014) (17)
- Performance Analysis of Multithreaded IoT Gateway (2019) (17)
- Energy-Efficient Cluster-Head Rotation in Beacon-Enabled IEEE 802.15.4 Networks (2015) (17)
- Two-tier WBAN/WLAN healthcare networks; priority considerations (2012) (17)
- A polling MAC for wireless sensor networks with RF recharging of sensor nodes (2014) (17)
- MAC performance modeling of IEEE 802.15.6-based WBANs over Rician-faded channels (2012) (16)
- Performance of an IaaS cloud with live migration of virtual machines (2013) (16)
- Real-time admission control in 802.15.4 sensor clusters (2006) (16)
- On Forks and Fork Characteristics in a Bitcoin-Like Distribution Network (2019) (16)
- Architecture for IoT Domain With CoAP Observe Feature (2018) (15)
- A scalable public key infrastructure for smart grid communications (2013) (15)
- Block Delivery Time in Bitcoin Distribution Network (2019) (15)
- Bridging Between IEEE 802.15.6 and IEEE 802.11e for Wireless Healthcare Networks (2015) (15)
- Probability distribution of spectral hole duration in cognitive networks (2014) (14)
- Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing (2020) (14)
- Cost of secure sensing in IEEE 802.15.4 networks (2009) (14)
- Establishing Trust on VANET Safety Messages - (Invited Paper) (2010) (14)
- Admission control in Bluetooth piconets (2004) (14)
- Towards a Framework for Testing Distributed Multimedia Software Systems (1998) (14)
- Deploying Proxy Signature in VANETs (2010) (14)
- Adapting PBFT for Use With Blockchain-Enabled IoT Systems (2021) (14)
- Performance Analysis of Cloud Computing Centers UsingM/G/m/m + r Queueing Systems: Supplementary Materials (2012) (14)
- Networking for Big Data (2015) (13)
- Modeling the Performance of Heterogeneous IaaS Cloud Centers (2013) (13)
- A Novel Asynchronous, Energy Efficient, Low Transmission Delay MAC Protocol for Wireless Sensor Networks (2009) (13)
- Adaptive cycle-limited scheduling scheme for Bluetooth piconets (2003) (13)
- Quality of service management for wireless networks with heterogeneous traffic (1998) (13)
- Proxy Cache Maintenance Using Multicasting in CoAP IoT Domains (2018) (13)
- Recovery in Channel-Hopping Cognitive Networks Under Random Primary-User Activity (2014) (13)
- Stable operation of IEEE 802.11e EDCA: Interaction between offered load and MAC parameters (2012) (13)
- Cooperative Sensing at the MAC Level in Simple Cognitive Personal Area Networks (2012) (12)
- The Impact of Selfish Mining on Bitcoin Network Performance (2021) (12)
- Admission Control for Wireless Multimedia Networks with Hard Call Level Quality of Service Bounds (1999) (12)
- Performance Evaluation of Cloud Data Centers with Batch Task Arrivals (2014) (12)
- Reaching spatial or networking saturation in VANET (2011) (12)
- Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks (2021) (12)
- Detection of Sybil Attack in Beacon Enabled IEEE802.15.4 Networks (2008) (12)
- Activity scheduling based on cross-layer information in Bluetooth sensor networks (2006) (12)
- Slave-Slave Bridging in 802.15.4 Beacon Enabled Networks (2007) (12)
- Efficiency of Restricted Access Window Scheme of IEEE 802.11ah Under Non-Ideal Channel Condition (2018) (12)
- Performance of Bluetooth Bridges in Scatternets with Limited Service Scheduling (2004) (11)
- Modeling of Churn Process in Bitcoin Network (2020) (11)
- Characterization of idle periods in IEEE 802.11e networks (2011) (11)
- Performance of Bluetooth bridges in scatternets with exhaustive service scheduling (2003) (11)
- Performance modeling of cloud computing centers (2013) (11)
- Walk-In Bridge Scheduling in Bluetooth Scatternets (2005) (11)
- Self-optimizing control parameters for minimizing ping-pong handover in Long Term Evolution (LTE) (2014) (11)
- Adaptive inter-piconet scheduling in small scatternets (2003) (11)
- Polling and Bridge Scheduling Algorithms in Bluetooth (2003) (11)
- Reliable and Scalable Data Acquisition from IoT Domains (2017) (11)
- Bluetooth scatternet with a master/slave bridge: a queueing theoretic analysis (2002) (11)
- Measuring the weather’s impact on MAC layer over 2.4 GHz outdoor radio links (2015) (10)
- On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters (2007) (10)
- Emerging technologies and applications of wireless communication in healthcare (2011) (10)
- Cognitive MAC Protocol with Transmission Tax: Dynamically Adjusting Sensing and Data Performance (2010) (10)
- Wireless Sensor Networks for Clinical Information Systems: A Security Perspective (2006) (10)
- Channel and Error Modeling for Wireless Body Area Networks (2014) (10)
- Performance analysis of Bluetooth piconets with finite baseband buffers (2005) (10)
- Impact of Node Churn in the Bitcoin Network (2020) (10)
- Admission control for wireless networks with heterogeneous traffic using event based resource estimation (1997) (9)
- Capacity limits in a variable duty cycle IEEE 802.11p-based VANET (2012) (9)
- Towards an efficient rendezvous protocol for a cognitive PAN (2012) (9)
- Multicomputer interconnection network based on a star graph (1991) (9)
- Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters (2008) (9)
- On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network (2019) (9)
- On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies (2002) (9)
- Performance of simple polling MAC with wireless re-charging in the presence of noise (2014) (9)
- Performance of Incomplete Channel Sensing for Frequency Hopping Cognitive Personal Area Networks (2008) (9)
- On the Benefits of Compact Blocks in Bitcoin (2020) (9)
- MAC Layer Attacks in 802.15.4 Sensor Networks (2006) (9)
- Impact of Network Load on the Performance of a Polling MAC With Wireless Recharging of Nodes (2015) (8)
- Kernel Based Estimation of Domain Parameters at IoT Proxy (2018) (8)
- Talk and let talk: performance of Bluetooth piconets with synchronous traffic (2005) (8)
- Analysis of Slave–Slave Bridging in IEEE 802.15.4 Beacon-Enabled Networks (2008) (8)
- Bridging the Transition from IEEE 802.11ac to IEEE 802.11ax: Survival of EDCA in a Coexistence Environment (2019) (8)
- Performance Analysis of Downlink MU-TXOP Sharing in IEEE 802.11ac (2017) (8)
- On the selection of working channels in a channel-hopping cognitive PAN (2013) (8)
- An identity-based authentication scheme for safety messages in WAVE-enabled VANETs (2012) (8)
- Load and QoS-adaptive scheduling in Bluetooth piconets (2004) (7)
- Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification (2020) (7)
- Prioritized WAVE-based Parking Assistance with Security and User Anonymity (2012) (7)
- An analytical model for churn process in Bitcoin network with ordinary and relay nodes (2020) (7)
- WSN05-5: On Node Population in a Multi-Level 802.15.4 Sensor Network (2006) (7)
- VM2M: An overlay network to support Vehicular traffic over LTE (2016) (7)
- PBFT-based ordering service for IoT domains (2020) (7)
- Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud (2019) (7)
- Protocol Architectures for IoT Domains (2018) (7)
- Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network (2007) (7)
- Uplink Access Protocol in IEEE 802.11ac (2018) (7)
- Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies (2020) (6)
- Crawling ResearchGate.net to Measure Student/Supervisor Collaboration (2014) (6)
- Queueing analysis of delays in Bluetooth slave/slave bridge (2002) (6)
- An on-line hot-spot detection scheme in DS-CDMA networks - single traffic type (2004) (6)
- Vehicular Network Security (2012) (6)
- Trading Delay for Fairness in MAC Design for Cognitive Personal Area Networks (2009) (6)
- Fast, Seamless Rekeying In Wireless Sensor Networks (2009) (6)
- Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives (2020) (6)
- Networking for big data [Guest Editorial] (2014) (6)
- Adapting LTE/LTE-A to M2M and D2D Communications (2017) (6)
- Key Exchange in 802.15.4 Networks and Its Performance Implications (2006) (6)
- Comparison of single- and multiple entry point PBFT for IoT blockchain systems (2020) (6)
- On the performance of Bluetooth scatternets with finite buffers (2005) (6)
- Characterizing energy consumption of IaaS clouds in non-saturated operation (2014) (6)
- Performance Modeling of Linux Network System with Open vSwitch (2020) (6)
- On non-saturation regime in IEEE 802.11p based VANET with mobile nodes (2011) (6)
- IWA: Integrated gradient‐based white‐box attacks for fooling deep neural networks (2021) (6)
- Street Lighting Network Formation Mechanism Based on IEEE 802.15.4 (2011) (6)
- Performance of IEEE 802.15.4 Clusters with Power Management and Key Exchange (2008) (6)
- About the problem of hot-spots under adaptive admission control in wireless multimedia networks (1999) (6)
- TCP traffic in Bluetooth 1.2: performance and dimensioning of flow control (2005) (6)
- Guest Editorial Big Security Challenges in Big Data Era (2017) (6)
- Dynamic parameter adjustment in a cognitive MAC protocol with transmission tax (2011) (5)
- Impact of hidden nodes on uplink transmission in IEEE 802.11ax heterogeneous network (2018) (5)
- Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks (2020) (5)
- Non-Uniform Traffic Issues in DCA Wireless Multimedia Networks (2003) (5)
- Security Issues in Wireless Sensor Networks Used in Clinical Information Systems (2007) (5)
- Activity management through Bernoulli scheduling in 802.15.4 sensor clusters (2005) (5)
- Building multicluster 802.15.4 networks: issues and open problems (2008) (5)
- Student/supervisor collaboration and usage patterns of publications available on ResearchGate (2016) (5)
- The Impact of Inaccurate Sensing Information in Cognitive Wireless Personal Area Networks (2008) (5)
- Efficiency of Power Ramping During Random Access in LTE (2017) (5)
- Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks (2020) (5)
- Fixed cycles and adaptive bandwidth allocation can coexist in bluetooth (2004) (4)
- Performance of Bluetooth piconets with finite buffers (2004) (4)
- On Selfholding Attack Impact on Imperfect PoW Blockchain Networks (2021) (4)
- A novel access control framework for secure pervasive computing (2010) (4)
- Performance of Bluetooth Slave/Slave Bridge (2003) (4)
- Energy-Efficient Clustering in IEEE 802.15.4 Wireless Sensor Networks (2013) (4)
- Extending the Operational Range of UAV Communication Network using IEEE 802.11ah (2019) (4)
- Traffic Prioritisation in 802.15.6 MAC – Analysis of its CSMA/CA Algorithm and Proposals for Improvement (2015) (4)
- Performance of a Cognitive MAC Protocol with Transmission Tax (2010) (4)
- On bridge residence times in master-slave connected 802.15.4 clusters (2006) (4)
- On uplink call level QoS in DS-CDMA networks (2003) (4)
- Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications (2008) (4)
- Improving sensing accuracy in cognitive PANs through modulation of sensing probability (2009) (4)
- CSCD: A simple channel scan protocol to discover and join a cognitive PAN (2012) (4)
- Call admission control in DCA wireless network (1998) (4)
- Examining Permission Patterns in Android Apps using Kernel Density Estimation (2020) (4)
- Performance analysis of heterogeneous cloud-edge services: A modeling approach (2020) (4)
- The MAC Layer of VANETs (2015) (4)
- Evaluation of Single Dimensional Sensor Network Implemented Using Slave-Slave Bridging in IEEE 802.15.4 Technology (2015) (4)
- Admission control in 802.15.4 beacon enabled clusters (2006) (4)
- Performance of Bluetooth scatternets under E-limited polling and walk-in bridge scheduling (2006) (4)
- Special issue: performance evaluation of wireless networks (2004) (3)
- Performance of bridging in cognitive wireless personal area networks (2015) (3)
- Towards a Blockchain-Based Healthcare Information System : Invited Paper (2019) (3)
- Multiple Leader PBFT Based Blockchain Architecture for IoT Domains: Invited Paper (2021) (3)
- Differentiated QoS to Heterogeneous IoT Nodes in IEEE 802.11ah RAW Mechanism (2018) (3)
- Integration of an IEEE 802.15.4 RFID network with mobile readers with a 802.11 WLAN (2015) (3)
- Properties of Blind Rendezvous in Channel Hopping Cognitive Piconets (2013) (3)
- Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability (2020) (3)
- Medium Access in Ad Hoc and Sensor Networks (2011) (3)
- A polling MAC with reliable RF recharging of sensor nodes (2015) (3)
- Impact of priority differentiation on the bridged WBAN/WLAN healthcare networks (2014) (3)
- Access Point Controlled MAC (A-MAC) Protocol for Uplink Multi-User Transmission in IEEE 802.11ac (2017) (3)
- Stochastic Modeling Approaches for Analyzing Blockchain: A Survey (2020) (3)
- Evaluation of MU-TXOP sharing probabilities in IEEE 802.11ac (2017) (3)
- Performance of Bluetooth bridge scheduling algorithms (2004) (3)
- Adaptive management of Bluetooth master/slave bridge (2003) (3)
- Impacts of node population and TXOP on stable operation of IEEE 802.11e EDCA (2010) (3)
- Recovery Using Backup Channels in Channel-Hopping Cognitive Networks (2013) (3)
- Performance of Key Distribution in 802.15.4 Beacon Enabled Cluster (2007) (3)
- IEEE 802.15.4: Signature-Based Intrusion Detection in Wireless Sensor Networks (WSNs) (2008) (3)
- Task filtering as a task admission control policy in cloud server pools (2015) (3)
- To Shout or Not to Shout: Performance of Power Ramping during Random Access in LTE/LTE-A (2016) (3)
- Access anomaly of emergency traffic in CSMA/CA of IEEE 802.15.6 (2015) (3)
- A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording (2021) (3)
- Performance of adaptive bridge scheduling in a scatternet with a slave-slave bridge (2004) (3)
- Priority-Based Machine-To-Machine Overlay Network over LTE for a Smart City (2018) (3)
- Analysis of Selfish Miner Behavior in the Bitcoin Network (2021) (2)
- Efficient wireless communication in healthcare systems; design and performance evaluation (2012) (2)
- Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis (2006) (2)
- Mobile Software Agents for Wireless Network Mapping and Dynamic Routing (2010) (2)
- An RSU Controlled IEEE 802.11ac Based MAC Protocol for Multi-Vehicle Uplink Transmission in VANET (2017) (2)
- LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X (2021) (2)
- Interaction of clustering period and event sensing reliability in IEEE 802.15.4 based WSNs (2013) (2)
- Towards an M2M Overlay Network on PRACH in LTE/LTE-A (2016) (2)
- Performance of Bluetooth piconets with finite size buffers : a queueing theoretic analysis (2005) (2)
- Multicast communication algorithm on a wormhole-routed star graph interconnection network (1996) (2)
- Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum (2021) (2)
- Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications (2021) (2)
- Sensing with One or with Four? A Comparison of Two IEEE 802.15.x Protocols for Use in Sensor Networks (2007) (2)
- Improving Dual-UAV Aided Ground-UAV Bi-directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization (2022) (2)
- R&D/Technology: ZigBee: A long way to go? (2007) (2)
- Charging schemes for ATM networks based on virtual effective bandwidths (1997) (2)
- Analyzing the Cost and Benefit of Pair Programming Revisited (2012) (2)
- Reducing Sensing Error in Cognitive PANs through Modulation of Sensing Probability (2008) (2)
- Joint Optimization of UAV Trajectory and Task Scheduling in SAGIN: Delay Driven (2021) (2)
- Design of Proof-of-Stake PBFT Algorithm for IoT Environments (2023) (2)
- Improving the performance of Bluetooth piconets with synchronous and asynchronous traffic (2003) (2)
- Network lifetime equalization in interconnected 802.15.4 clusters (2006) (2)
- Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack (2022) (2)
- Modeling of RF Recharging in a Wireless Sensor Network with Coordinated Node Sleep (2015) (2)
- Editorial for the special issue of Ad Hoc Networks journal on Recent advances in analysis and deployment of IEEE 802.11e and IEEE 802.11p protocol families (2012) (2)
- Design and performance issues of slave–slave cluster interconnection in 802.15.4 beacon enabled networks (2007) (2)
- Adaptive low-energy clustering in slotted beacon-enabled IEEE 802.15.4 networks (2016) (2)
- On Slave-Slave Bridging with Non-Acknowledged GTS Access in 802.15.4 Beacon Enabled Networks (2007) (2)
- Zoning and Relaying-Based MAC Protocol With RF Recharging (2017) (2)
- Zoning Based MAC with Support for Recharging Process in WSN (2014) (2)
- Task admission control policy in cloud server pools based on task arrival dynamics (2016) (2)
- Correction to "adaptive admission control in wireless multimedia networks under nonuniform traffic conditions" (2001) (2)
- Two-way Communications in Cognitive Personal Area Networks (2015) (2)
- Performance analysis of IEEE 802.11ax heterogeneous network in the presence of hidden terminals (2019) (2)
- Multiparameter qos admission control for atm queues with partial buffer sharing mechanism (1996) (2)
- Analysis of Cluster Interconnection Schemes in 802.15.4 Beacon Enabled Networks (2008) (2)
- Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT (2022) (2)
- Proof of Stake Voting in Multiple Entry PBFT System (2022) (2)
- Prologue: Wireless Personal Area Networks (2008) (2)
- Differential sensing in cognitive personal area networks with bursty secondary traffic and varying primary activity factor (2009) (2)
- Task admission control for cloud server pools (2015) (2)
- Intra-Piconet Polling Algorithms in Bluetooth (2005) (2)
- Lightweight Data Streaming from IoT Devices (2018) (2)
- Performance analysis of Hyperledger Fabric platform: A hierarchical model approach (2020) (2)
- Guest EditorialIntroduction to the Special Section on Blockchain for Vehicles and Intelligent Communications (2021) (2)
- Networking for big data: part 2 [Guest Editorial] (2015) (1)
- Tradeoffs in PRACH Bandwidth Partitioning for VM2M Overlay Network in LTE (2016) (1)
- On the duration of blackouts due to primary user activity in cognitive networks (2013) (1)
- Operation of the IEEE 802.15.4 Network (2008) (1)
- Data Lifetime Estimation in a Multicast-Based CoAP Proxy (2019) (1)
- Multiple entry point PBFT for IoT systems (2020) (1)
- Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm (2022) (1)
- Mal-LSGAN: An Effective Adversarial Malware Example Generation Model (2021) (1)
- Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin (2020) (1)
- Establishing security and privacy in wave-enabled vehicular ad hoc networks (2013) (1)
- To Acknowledge or Not To Acknowledge: The Case of Interconnected 802.15.4 Clusters (2007) (1)
- Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO Based Approach (2023) (1)
- Towards efficient monitoring in a sensor cloud (2017) (1)
- Evaluating fork after withholding (FAW) attack in Bitcoin (2022) (1)
- Interconnecting 802.15.4 clusters in slotted CSMA-CA mode (2006) (1)
- Bridge Performance in Asynchronous Cognitive Personal Area Networks (2016) (1)
- Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF (2019) (1)
- Call Level QoS Performance under Variable User Mobilities in Wireless Networks (2004) (1)
- Adaptive Management of Bluetooth Slave/Slave Bridge (2003) (1)
- Formation of Cognitive Personal Area Networks (CPANs) Using Probabilistic Rendezvous (2017) (1)
- Performance of simple cognitive personal area networks with finite buffers (2011) (1)
- Performance of TCP traffic in Bluetooth piconets : a queueing theoretic analysis (2004) (1)
- Optimum Zoning in RF-Recharged Sensor Networks (2016) (1)
- Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks (2020) (1)
- Modeling a Beacon Enabled 802.15.4 Cluster with Bidirectional Traffic (2005) (1)
- On block delivery time in Ethereum network (2022) (1)
- On slave-slave bridging with non-acknowledged GTS access in 802.15.4 beacon enabled networks (2007) (1)
- Activity Scheduling in Bluetooth Sensor Networks (2006) (1)
- Controlling Sensing Error for Cognitive PANs with 1-Limited Packet Scheduling (2010) (1)
- Performance of Caching in a Layered CoAP Proxy (2018) (1)
- Impact of Bluetooth MAC layer on the performance of TCP traffic (2006) (1)
- Video communications over IEEE 802.11p using single channel devices (2011) (1)
- Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT (2022) (1)
- Unicast-Based Multicast Algorithm in Wormhole-Routed Star Graph Interconnection Networks (1998) (1)
- Understanding MEC empowered vehicle task offloading performance in 6G networks (2022) (1)
- Bluetooth master/slave bridge scheduling with and without rendezvous points (2004) (1)
- Impact of Node Churn in the Bitcoin Network with Compact Blocks (2020) (1)
- Guest EditorialIntroduction to the Special Section on Vehicular Networks in the Era of 6G: End-Edge-Cloud Orchestrated Intelligence (2021) (1)
- How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach (2022) (1)
- Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis (2023) (1)
- Reducing sensing error in cognitive PANs through reduction of the channel set and split sensing (2009) (1)
- Performance of the MAC protocol in wireless recharging under E-limited scheduling (2016) (1)
- E-limited scheduling in Bluetooth piconets: performance and admission control (2003) (1)
- Priority differentiation in cognitive radio networks (2015) (1)
- Explicit Power Ramping during Random Access in LTE#x002F;LTE-A (2017) (1)
- Revisiting FAW attack in an imperfect PoW blockchain system (2022) (1)
- Priority-Based Caching Policy at a Hybrid IoT Proxy (2018) (1)
- The impact of primary user activity on the performance of sequence-based rendezvous (2013) (1)
- Simple solutions may still be best: on the selection of working channels in a channel-hopping cognitive network (2015) (1)
- Analyzing the impact of provisioning overhead time in cloud computing centers (2014) (1)
- Activity Management through Bernoulli Scheduling (2008) (1)
- Performance analysis of Bluetooth piconets with finite baseband buffers: Research Articles (2005) (1)
- ON INTRUSION DETECTION IN A NEIGHBOURHOOD AREA NETWORK IN THE SMART GRID (2012) (1)
- Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment (2022) (1)
- Sensing After Transmission in Cognitive Wireless Personal Area Networks (2009) (0)
- Scalable Self-Sovereign Identity Architecture (2022) (0)
- Voting control in multiple entry PBFT blockchain systems for IoT (2021) (0)
- Reducing sensing error in cognitive PANs through differential sensing (2008) (0)
- Differential Sensing Under Varying Primary Activity Factor in Cognitive PANs (2008) (0)
- Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network (2023) (0)
- Performance of sensing-after-transmission policy in cognitive personal area networks (2010) (0)
- Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting (2022) (0)
- MAC Layer Performance Limitations (2008) (0)
- Hot-spot behavior of DCA wireless networks (2001) (0)
- DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics (2022) (0)
- Cluster with Uplink Traffic (2008) (0)
- Performance of DCA wireless multimedia networks under high offered loads (2001) (0)
- Appendix A: An Overview of ZigBee (2008) (0)
- Cluster with Uplink and Downlink Traffic (2008) (0)
- Editorial for the Special Issue of Ad hoc networks "Security issues in sensor and Ad hoc networks" (2007) (0)
- A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System (2021) (0)
- Performance of adaptive bridge scheduling in a scatternet with a slave–slave bridge: Research Articles (2004) (0)
- Protocol Enhancements And Performance Analysis Of WiFi Networks (0)
- Performance analysis of heterogeneous cloud-edge services: A modeling approach (2020) (0)
- Cognitive wireless personal area network for monitoring and control (2011) (0)
- Network Configuration and Flow Scheduling for Big Data Applications (2015) (0)
- Handoff performance in wireless DS-CDMA networks (2003) (0)
- Connecting physical layer and networks layer QoS in DS-CDMA networks-multiple traffic case (2002) (0)
- Equalization of Cluster Lifetimes (2008) (0)
- HWISE 2006 Committees and Reviewers (2006) (0)
- Performance of MAC in Wireless Recharging under E-limited Scheduling (2015) (0)
- Can we use Acknowledged Transfer in Large Multi-Cluster Beacon Enabled 802.15.4 Networks? (2007) (0)
- Lifetime Properties in Cluster-Based IEEE 802.15.4WSNs (2013) (0)
- Editorial for the special issue of Wiley Security and Communication Networks Journal devoted to security in smart grid (2014) (0)
- Lifetime Equalization with Key Exchanges in IEEE 802.15.4 Networks (2007) (0)
- Improving QoS using Adaptive TXOP Allocation in IEEE 802. 11e WLAN (2020) (0)
- Model-based Performance Evaluation of a Moving Target Defense System (2020) (0)
- ◾ A User Data Profile-Aware Policy-Based Network Management Framework in the Era of Big Data (2015) (0)
- Performance of Data Caching in Cloud Sensing (2017) (0)
- An analytical model for churn process in Bitcoin network with ordinary and relay nodes (2020) (0)
- Adaptive bandwidth allocation for bridge downlink operation (2008) (0)
- Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model (2023) (0)
- Session details: Software and applications (general symposium) (2010) (0)
- Hot-spot Behavior of DCA Wireless Multimedia Networks (2001) (0)
- Providing QoS in the Integration of RFID and Wi-Fi WLAN (2012) (0)
- Session details: M2-D: next generation mobile networks symposium (2006) (0)
- Making the best of limited resources: differential sensing in cognitive PANs (2008) (0)
- Zoning based block service policy in a MAC protocol with RF recharging (2016) (0)
- Admission control issues in 802 . 15 . 4 sensor clusters (2006) (0)
- Channel and Error Modeling for Wireless Body Area Networks (2013) (0)
- Editorial for the Special Issue of ACM/Springer Mobile Networks and Applications - Selected Papers from Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2007) (2007) (0)
- Maintaining handoff QoS in TD-CDMA networks (2003) (0)
- Trade-offs in large blockchain-based IoT system design (2021) (0)
- Two-hop communications in a cognitive radio network* (2016) (0)
- Lifetime of a linear IEEE 802.15.4 sensor field with randomized sleep and bridge rotation (2016) (0)
- Analysis of non-acknowledged, CSMA-CA, slave-slave bridging in 802.15.4 beacon enabled networks (2007) (0)
- Dual-UAV Aided Secure Dynamic G2U Communication (2022) (0)
- PATIENT PRIVACY IN HEALTHCARE WIRELESS SENSOR NETWORKS (2011) (0)
- Faster Lanes, Longer Lifetimes: Activity Management in Interconnected 802.15.4 Sensor Clusters (2006) (0)
- Cluster Interconnection with Master‐Slave Bridges (2008) (0)
- Prioritizing transaction delivery in Ethereum network (2023) (0)
- HWISE 2011 Reviewer List (2011) (0)
- DCA wireless networks under high offered loads: the need for bandwidth reservation (2002) (0)
- Online Supplement for Energy-Efficient Cluster-Head Rotation in Beacon-Enabled IEEE 802 . 15 . 4 Networks (2013) (0)
- IEEE 802.15.6-Based LTE Overlay Network with Priority Support (2018) (0)
- Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh (2018) (0)
- On Bandwidth Reservation Policies in Broadband Wireless Networks (1999) (0)
- Performance of Bridging Algorithms in IEEE 802.15.3 Multi-Piconet Networks (2010) (0)
- Guest Editorial Introduction to the Special Section on Cybertwin-Driven 6G for V2X Applications (2022) (0)
- Analytical Model for Key Distribution in 802.15.4 Beacon Enabled Cluster (2007) (0)
- UNC 2009 Organizing and Program Committees (2009) (0)
- Session details: Network layer protocols (general symposium) (2010) (0)
- MAC protocol for wireless sensor networks with on-demand RF recharging of sensor nodes (2015) (0)
- Trust and Rewards in a Two-Tier Consensus Architecture (2023) (0)
- Admission control in TD-CDMA networks (2003) (0)
- Practical Solutions in Fully Homomorphic Encryption - A Survey Analyzing Existing Acceleration Methods (2023) (0)
- Prioritized Access in a Channel-Hopping Network with Spectrum Sensing (2015) (0)
- Group joining time for Cognitive Personal Area Networks (CPANs) with independent node arrivals (2017) (0)
- Stability Boundaries between Non-Saturation and Saturation Regimes for IEEE 802.11e EDCA (2010) (0)
- Reducing the number of transaction messages in bitcoin (2022) (0)
- Security of Vehicular Networks : A Comparative Study (2009) (0)
- Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain (2022) (0)
- Prioritized Access in a Channel-Hopping Cognitive Network with Spectrum Sensing (2014) (0)
- Performance of simple cognitive personal area networks with finite buffers and adaptive superframe duration (2011) (0)
- Admission Control Issues (2008) (0)
- A high performance two-layer consensus architecture for blockchain-based IoT systems (2022) (0)
- Special section: topics in performance evaluation of wireless networks (2004) (0)
- Performance Modeling of Linux Network System with Open vSwitch (2019) (0)
- Sensor Pooling for Differential Sensing of Active and Idle Channels in Cognitive WPANs (2008) (0)
- Cognitive MAC Protocol with Transmission Tax: Probabilistic Analysis and Performance Improvements (2011) (0)
- Energy Consumption of Key Distribution in 802.15.4 Beacon Enabled Cluster with Sleep Management (2007) (0)
- The Cost of Secure and Reliable Sensing (2008) (0)
- Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach (2022) (0)
- Reducing the number of transaction messages in bitcoin (2022) (0)
- A Two-Stage PBFT Architecture with Trust and Reward Incentive Mechanism (2023) (0)
- Inter-piconet communications in Cognitive Personal Area Networks with prioritized exchange of synchronization information (2017) (0)
- Session details: QoS and scheduling in wireless networks (WLAN/WPAN symposium) (2010) (0)
- Priority based VM2M communications over LTE (2016) (0)
- Probability generating functions and Laplace transforms (2005) (0)
- Cost-effective migration-based dynamic platform defense technique: a CTMDP approach (2021) (0)
- Security in 802.15.4 Specification (2008) (0)
- Session details: Energy-aware protocols and algorithms in wireless networks (2007) (0)
- Issues in Wireless Sensor Networks used in Clinical Information Systems (2005) (0)
- Special issue: performance evaluation of wireless networks: Editorials (2004) (0)
- Chapter 2 Activity Scheduling in Bluetooth Sensor Networks (2006) (0)
- Variable probability modulation policies for sensing in cognitive PANs (2009) (0)
- Making the best of limited resources: Optimized differential sensing in cognitive PANs (2010) (0)
- Call for Nominations for IEEE ComSoc Career and Service Awards (2022) (0)
- Adaptive Bandwidth Allocation in an 802.15.3 Master-Slave Bridge (2008) (0)
- Impact of Reliable and Secure Sensing on Cluster Lifetime in IEEE 802.15.4 Networks (2008) (0)
- Editorial for the special issue of computer communications 'performance issues of wireless LANs, PANs, and Ad Hoc networks' (2005) (0)
- Cluster Interconnection with Slave‐Slave Bridges (2008) (0)
- Performance of G-limited scheduling in a cognitive MAC with transmission tax (2010) (0)
- Recharge Interval and Packet Delay in Wireless Sensor Network with RF Recharging (2016) (0)
- The cost of secure and reliable sensing in 802.15.4 networks (2007) (0)
- Chapter 1 Piconet interconnection strategies in IEEE 802 . 15 . 3 networks (2013) (0)
- The Impact of Vote Counting Policy on the Performance of PBFT: Invited Paper (2021) (0)
- Signature-based intrusion detection in healthcare wireless sensor networks implemented over IEEE 802 . 15 . 4 beacon enabled clusters (2006) (0)
- Intrusion Detection System for Machine-to-Machine Communication in the Smart Grid (2014) (0)
- Adaptive Cycle-Controlled E-Limited Polling in Bluetooth Piconets (2005) (0)
- Guest Editorial for the Special Series on Smart Grid Communications (2014) (0)
- Special section: topics in performance evaluation of wireless networks: Editorials (2004) (0)
- Impact of Bluetooth MAC layer on the performance of TCP traffic: Research Articles (2006) (0)
- IEEE802.15.4簇的能量管理和密钥交换机制性能分析 (2008) (0)
- Modeling of Loosely Coupled Scatternets with Finite Buffers (2005) (0)
- Android Malware Detection using Feature Ranking of Permissions (2022) (0)
- Appendix B: Probability Generating Functions and Laplace Transforms (2008) (0)
- Tradeoff Between CPAN Size and the Number of Working Channels (2008) (0)
- Cluster interactions in large 802.15.4 networks — experiments with non-acknowledged transfer (2007) (0)
- Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems (2022) (0)
- Session details: Wireless personal area networks (Wireless LANs and Wireless PANs symp.) (2009) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Jelena Mišić?
Jelena Mišić is affiliated with the following schools: