


default search action
Martin Drozda
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Maros Cavojsky, Martin Drozda, Martin Nehéz:
Social Pattern Discovery for GPS Datasets. KES 2024: 890-899 - 2023
- [c22]Zoltán Balogh, Kristián Fodor
, Jan Francisti, Martin Drozda, Maros Cavojský:
Modelling and Use of Adaptive Control Using Petri Nets. KES 2023: 1438-1447 - [c21]Maros Cavojsky, Martin Drozda:
User Experience Meets GPS Trajectory Search. SMC 2023: 1235-1240 - 2022
- [c20]Maros Cavojsky
, Martin Drozda
:
Search by Pattern in GPS Trajectories. MobiCASE 2022: 117-132 - 2021
- [j7]Maros Cavojský
, Martin Drozda
, Zoltán Balogh
:
Analysis and experimental evaluation of the Needleman-Wunsch algorithm for trajectory comparison. Expert Syst. Appl. 165: 114068 (2021)
2010 – 2019
- 2019
- [c19]Maros Cavojský
, Martin Drozda
:
Comparison of User Trajectories with the Needleman-Wunsch Algorithm. MobiCASE 2019: 141-154 - 2018
- [c18]Maros Cavojsky
, Marek Uhlar, Marian Ivanis, Martin Molnar, Martin Drozda
:
User Trajectory Extraction Based on WiFi Scanning. FiCloud Workshops 2018: 115-120 - 2017
- [j6]Markus Rokicki, Martin Drozda
:
Evaluating trade-offs in energy-efficient error detection. Int. J. Commun. Syst. 30(7) (2017) - 2016
- [c17]Maros Cavojsky
, Martin Drozda
:
Energy Efficient Trajectory Recording of Mobile Devices Using WiFi Scanning. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 1079-1085 - 2015
- [c16]Mei-Chen Lo, Yi-Chuan Hsu, Martin Drozda
:
Entrepreneur's priority traits on creative and innovative behavior in technology era - case of innovative new start-up businesses. IEEM 2015: 455-459 - [c15]Mei-Chen Lo, Yi-Chuan Hsu, Martin Drozda
:
Building priority strategies of brand equity measurement with AHP - case of mobile companies in Taiwan. IEEM 2015: 514-518 - 2011
- [j5]Martin Drozda
, Sven Schaust, Sebastian Schildt
, Helena Szczerbicka:
Priming: making the reaction to intrusion or fault predictable. Nat. Comput. 10(1): 243-274 (2011) - [c14]Martin Drozda
, Iain Bate, Jon Timmis
:
Bio-inspired Error Detection for Complex Systems. PRDC 2011: 154-163 - 2010
- [c13]Sven Schaust, Martin Drozda
, Helena Szczerbicka:
Is Receptor Degeneracy Suitable for Automatic Response Decisions in Ad Hoc Networks? ICARIS 2010: 317-319 - [p1]Martin Drozda
, Sven Schaust, Helena Szczerbicka:
Immuno-inspired Knowledge Management for Ad Hoc Wireless Networks. Smart Information and Knowledge Management 2010: 1-26 - [i2]Martin Drozda
, Sebastian Schildt, Sven Schaust, Helena Szczerbicka:
An Immuno-Inspired Approach to Misbehavior Detection in Ad Hoc Wireless Networks. CoRR abs/1001.3113 (2010)
2000 – 2009
- 2009
- [j4]Matthias Becker
, Martin Drozda
, Sven Schaust, Sebastian Bohlmann, Helena Szczerbicka:
On Classification Approaches for Misbehavior Detection in Wireless Sensor Networks. J. Comput. 4(5): 357-365 (2009) - [c12]Martin Drozda
, Sven Schaust, Sebastian Schildt
, Helena Szczerbicka:
An Error Propagation Algorithm for Ad Hoc Wireless Networks. ICARIS 2009: 260-273 - [i1]Martin Drozda, Sven Schaust, Helena Szczerbicka:
AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design Principles. CoRR abs/0906.3461 (2009) - 2008
- [j3]Fedor Lehocki
, Gabriel Juhás
, Robert Lorenz, Helena Szczerbicka, Martin Drozda
:
Decision Support with Logical and Fuzzy Petri Nets. Cybern. Syst. 39(6): 617-640 (2008) - [j2]Martin Drozda
, Sebastian Schildt
, Sven Schaust, Sandra Einhellinger, Helena Szczerbicka:
A Tool for Prototyping AIS Based Protection Systems for Ad Hoc and Sensor Networks. Cybern. Syst. 39(7): 719-742 (2008) - [c11]Matthias Becker
, Martin Drozda
, Sebastian Jaschke, Sven Schaust:
Comparing performance of misbehavior detection based on Neural Networks and AIS. SMC 2008: 757-762 - 2007
- [c10]Martin Drozda:
Sensor and Ad HocWireless Networks. ACSD 2007: 223-230 - [c9]Martin Drozda
, Sven Schaust, Helena Szczerbicka:
AIS for misbehavior detection in wireless sensor networks: Performance and design principles. IEEE Congress on Evolutionary Computation 2007: 3719-3726 - [c8]Sven Schaust, Martin Drozda
, Helena Szczerbicka:
Impact of Packet Injection Models on Misbehaviour Detection Performance in Wireless Sensor Networks. MASS 2007: 1-6 - [c7]Martin Drozda
, Sven Schaust, Helena Szczerbicka:
Is AIS Based Misbehavior Detection Suitable for Wireless Sensor Networks? WCNC 2007: 3128-3133 - 2005
- [b1]Martin Drozda:
Performance analysis of wireless ad hoc networks. University of Hanover, Hannover, Germany, 2005, pp. 1-139 - [c6]Christopher L. Barrett, Martin Drozda
, D. Charles Engelhart, V. S. Anil Kumar, Madhav V. Marathe, Monique Morin, S. S. Ravi, James P. Smith:
Understanding protocol performance and robustness of ad hoc networks through structural analysis. WiMob (3) 2005: 65-72 - 2004
- [j1]Christopher L. Barrett, Martin Drozda
, Madhav V. Marathe, S. S. Ravi, James P. Smith:
A mobility and traffic generation framework for modeling and simulating ad hoc communication networks. Sci. Program. 12(1): 1-23 (2004) - 2003
- [c5]Christopher L. Barrett, Martin Drozda
, Achla Marathe, Madhav V. Marathe:
Analyzing interaction between network protocols, topology and traffic in wireless radio networks. WCNC 2003: 1760-1766 - 2002
- [c4]Christopher L. Barrett, Achla Marathe, Madhav V. Marathe, Martin Drozda:
Characterizing the interaction between routing and MAC protocols in ad-hoc networks. MobiHoc 2002: 92-103 - [c3]Christopher L. Barrett, Martin Drozda
, Madhav V. Marathe:
A comparative experimental study of media access protocols for wireless radio networks. WCNC 2002: 405-411 - 2001
- [c2]Martin Drozda:
Electric power exchanges with sensitivity matrices: an experimental analysis. SMC 2001: 1942-1947 - 2000
- [c1]L. Jonathan Dowell, Martin Drozda
, Dale B. Henderson, Verne Loose, Madhav V. Marathe, Doug J. Roberts:
Scalability of ELISIMS: comprehensive detailed simulation of the electric power industry. SMC 2000: 393-398
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 01:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint