Jens B. Schmitt
Jens B. Schmitt
Professor of Computer Science, University of Kaiserslautern
Geverifieerd e-mailadres voor
Geciteerd door
Geciteerd door
Short paper: reactive jamming in wireless networks: how realistic is the threat?
M Wilhelm, I Martinovic, JB Schmitt, V Lenders
Proceedings of the fourth ACM conference on Wireless network security, 47-52, 2011
Sensor network calculus–a framework for worst case analysis
JB Schmitt, U Roedig
International Conference on Distributed Computing in Sensor Systems, 141-154, 2005
Subjective impression of variations in layer encoded videos
M Zink, O Künzel, J Schmitt, R Steinmetz
international Workshop on Quality of Service, 137-154, 2003
Node deployment in large wireless sensor networks: coverage, energy consumption, and worst-case delay
WY Poe, JB Schmitt
Asian Internet Engineering Conference, 77-84, 2009
Delay bounds under arbitrary multiplexing: When network calculus leaves you in the lurch...
JB Schmitt, FA Zdarsky, M Fidler
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1669-1677, 2008
On realistic network topologies for simulation
O Heckmann, M Piringer, J Schmitt, R Steinmetz
Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for …, 2003
Who do you sync you are? smartphone fingerprinting via application behaviour
T Stöber, M Frank, J Schmitt, I Martinovic
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
The disco network calculator: a toolbox for worst case analysis
JB Schmitt, FA Zdarsky
Proceedings of the 1st international conference on Performance evaluation …, 2006
Layer-encoded video in scalable adaptive streaming
M Zink, J Schmitt, R Steinmetz
IEEE Transactions on Multimedia 7 (1), 75-84, 2005
On the effect of node misbehavior in ad hoc networks
M Hollick, J Schmitt, C Seipl, R Steinmetz
2004 IEEE International Conference on Communications (IEEE Cat. No …, 2004
Handover in mobile communication networks: who is in control anyway?
FA Zdarsky, JB Schmitt
Proceedings. 30th Euromicro Conference, 2004., 205-212, 2004
Secure key generation in sensor networks based on frequency-selective channels
M Wilhelm, I Martinovic, JB Schmitt
IEEE Journal on Selected Areas in Communications 31 (9), 1779-1790, 2013
Detection of reactive jamming in DSSS-based wireless communications
M Spuhler, D Giustiniano, V Lenders, M Wilhelm, JB Schmitt
IEEE Transactions on Wireless Communications 13 (3), 1593-1603, 2014
A comprehensive worst-case calculus for wireless sensor networks with in-network processing
JB Schmitt, FA Zdarsky, L Thiele
28th IEEE International Real-Time Systems Symposium (RTSS 2007), 193-202, 2007
Jamming for good: a fresh approach to authentic communication in WSNs
I Martinovic, P Pichota, JB Schmitt
Proceedings of the second ACM conference on Wireless network security, 161-168, 2009
Perspectives on network calculus: no free lunch, but still good value
F Ciucu, J Schmitt
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies …, 2012
Secret keys from entangled sensor motes: implementation and analysis
M Wilhelm, I Martinovic, JB Schmitt
Proceedings of the third ACM conference on Wireless network security, 139-144, 2010
Improving performance bounds in feed-forward networks by paying multiplexing only once
JB Schmitt, FA Zdarsky, I Martinovic
14th GI/ITG Conference-Measurement, Modelling and Evalutation of Computer …, 2008
Implementation and Evaluation of the KOM RSVP Engine
M Karsten, J Schmitt, R Steinmetz
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
Heterogeneous network quality of service systems
JB Schmitt
Springer Science & Business Media, 2012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20