default search action
Marek Natkaniec
- > Home > Persons > Marek Natkaniec
Publications
- 2013
- [j13]Szymon Szott, Marek Natkaniec, Andrzej R. Pach:
Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach. Secur. Commun. Networks 6(4): 509-522 (2013) - [j12]Katarzyna Kosek-Szott, Marek Natkaniec, Andrzej R. Pach:
A new busy signal-based MAC protocol supporting QoS for ad-hoc networks with hidden nodes. Wirel. Networks 19(6): 1135-1153 (2013) - 2011
- [j10]Katarzyna Kosek-Szott, Marek Natkaniec, Andrzej R. Pach:
A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions. Comput. Networks 55(3): 622-635 (2011) - 2010
- [j7]Szymon Szott, Marek Natkaniec, Andrzej R. Pach:
An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c16]Katarzyna Kosek-Szott, Marek Natkaniec, Andrzej R. Pach:
BusySiMOn - A New Protocol for IEEE 802.11 EDCA-Based Ad-Hoc Networks with Hidden Nodes. GLOBECOM 2010: 1-6 - 2008
- [c12]Szymon Szott, Marek Natkaniec, Andrzej R. Pach:
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks. ADHOC-NOW 2008: 176-188 - [c11]Katarzyna Kosek, Marek Natkaniec, Andrzej R. Pach:
Analysis of IEEE 802.11e Line Topology Scenarios in the Presence of Hidden Nodes. ADHOC-NOW 2008: 380-390 - [c10]Katarzyna Kosek, Marek Natkaniec, Luca Vollero, Andrzej R. Pach:
Performance Analysis of 802.11e Networks with Hidden Nodes in a Star Topology. CCNC 2008: 440-441 - [c9]Katarzyna Kosek, Marek Natkaniec, Luca Vollero, Andrzej R. Pach:
An Analysis of Star Topology IEEE 802.11e Networks in the Presence of Hidden Nodes. ICOIN 2008: 1-5 - [c6]Szymon Szott, Marek Natkaniec, Roberto Canonico, Andrzej R. Pach:
Impact of Contention Window Cheating on Single-Hop IEEE 802.11e MANETs. WCNC 2008: 1356-1361 - 2000
- [c3]Marek Natkaniec, Andrzej R. Pach:
A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations. PWC 2000: 157-168 - [c2]Marek Natkaniec, Andrzej R. Pach:
An Analysis of the Back-Off Mechanism Used in IEEE 802.11 Networks. ISCC 2000: 444-449 - [c1]Marek Natkaniec, Andrzej R. Pach:
An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance. WCNC 2000: 819-823
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint