default search action
Robert Bestak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j23]Emmanuel Song Shombot, Gilles Dusserre, Robert Bestak, Nasir Baba Ahmed:
An application for predicting phishing attacks: A case of implementing a support vector machine learning model. Cyber Secur. Appl. 2: 100036 (2024) - [j22]Zagroz Aziz, Robert Bestak:
Insight into Anomaly Detection and Prediction and Mobile Network Security Enhancement Leveraging K-Means Clustering on Call Detail Records. Sensors 24(6): 1716 (2024) - 2022
- [j21]A. Pasumponpandian, Robert Bestak, Klimis S. Ntalianis, Ram Palanisamy:
Guest editorial. Int. J. Pervasive Comput. Commun. 18(1): 1-4 (2022) - 2021
- [j20]S. Smys, Robert Bestak, Joy Iong-Zong Chen:
Guest editorial: Introduction to the special section on AI-based intelligent networks - Models and applications (VSI-ain). Comput. Electr. Eng. 92: 107149 (2021) - [j19]V. Suma, Xavier Fernando, Ram Palanisamy, Robert Bestak:
Special issue on "Ubiquitous clouds and communication networks". Int. J. Commun. Syst. 34(6) (2021) - 2020
- [j18]Kulandairaj Martin Sagayam, Alex J. Timothy, Chiung Ching Ho, Lawrence Edward Henesey, Robert Bestak:
Augmented reality-based solar system for e-magazine with 3-D audio effect. Int. J. Simul. Process. Model. 15(6): 524-534 (2020) - 2019
- [j17]S. Smys, Robert Bestak, Joy Iong-Zong Chen:
Special issue on evolutionary computing and intelligent sustainable systems. Soft Comput. 23(18): 8333 (2019) - [j16]Marek Sedlacek, Robert Bestak:
Evaluation of Random Physical Cell Id Assignment to Femtocells Under Dense Cell Deployment. Wirel. Pers. Commun. 104(2): 753-769 (2019) - 2017
- [j15]S. Smys, Joy Iong-Zong Chen, Robert Bestak:
Introduction to the special section on software-defined control for next-generation wireless systems. Comput. Electr. Eng. 57: 91-92 (2017) - [j14]Chithra Reghuvaran, Robert Bestak, Sarat Kumar Patra:
Efficient resource allocation for network-assisted multi-link device-to-device communication. Int. J. Commun. Syst. 30(7) (2017) - [j13]Marek Sedlacek, Robert Bestak:
Analysis of Neighbourhood Relations for Femtocell Networks. Wirel. Pers. Commun. 96(4): 5239-5252 (2017) - 2016
- [j12]Chithra Reghuvaran, Robert Bestak, Sarat Kumar Patra:
An interference cancellation scheme for D2D multi-link communication underlaying cellular network. Ann. des Télécommunications 71(1-2): 47-60 (2016) - [j11]Andrea Bianco, Robert Bestak, Ilkka Norros:
Special session on selected papers from Networking 2015. Comput. Commun. 84: 39 (2016) - [j10]S. Smys, Kamel A. Khaled, Robert Bestak:
ACM/Springer Mobile Networks & Applications (MONET) Guest Editorial for Special Issue on Innovative Computing Structures for Future Wireless Personal Networks. Mob. Networks Appl. 21(3): 467-468 (2016) - [j9]S. Smys, Robert Bestak:
Introduction to the Special Issue on Inventive Network Structures for Next Generation Wireless Personal Systems. Wirel. Pers. Commun. 90(2): 421-422 (2016) - 2015
- [j8]Homero Toral-Cruz, Albena Dimitrova Mihovska, Miroslav Voznák, Kamaljit I. Lakhtaria, Robert Bestak:
Research Trends and Challenges for Network-Based ICT Systems. Wirel. Pers. Commun. 85(1): 1-7 (2015) - 2013
- [j7]Pavel Mach, Robert Bestak, Zdenek Becvar:
Optimization of association procedure in WiMAX networks with relay stations. Telecommun. Syst. 52(3): 1697-1704 (2013) - [j6]Ardian Ulvan, Robert Bestak, Melvi Ulvan:
Handover procedure and decision strategy in LTE-based femtocell network. Telecommun. Syst. 52(4): 2733-2748 (2013) - [j5]Pavel Mach, Zdenek Becvar, Robert Bestak:
Handover of relay stations for load balancing in IEEE 802.16. Wirel. Commun. Mob. Comput. 13(2): 170-183 (2013) - 2011
- [j4]Zdenek Becvar, Robert Bestak:
Overhead of ARQ mechanism in IEEE 802.16 networks. Telecommun. Syst. 46(4): 353-367 (2011) - [j3]Pavel Mach, Robert Bestak:
Radio resources allocation for decentrally controlled relay stations. Wirel. Networks 17(1): 133-148 (2011) - 2008
- [j2]Robert Bestak:
Editorial. Telecommun. Syst. 38(1-2): 1-2 (2008) - [j1]Pavel Mach, Robert Bestak:
WiMAX throughput evaluation of conventional relaying. Telecommun. Syst. 38(1-2): 11-17 (2008)
Conference and Workshop Papers
- 2023
- [c34]Hayyan Ali, Robert Bestak:
Position-Time Pattern Based Method for Analyzing Users' Mobility. VTC2023-Spring 2023: 1-5 - 2019
- [c33]Zagroz Aziz, Robert Bestak:
Mobile Voice Traffic Load Characteristics. CN 2019: 193-207 - [c32]Iyad Khuder, Robert Bestak:
Cells Interrelation in Mobile Networks. CN 2019: 242-255 - [c31]Zagroz Aziz, Robert Bestak:
Dependency Between the Distance and International Voice Traffic. UNet 2019: 193-204 - 2018
- [c30]Zagroz Aziz, Robert Bestak:
Analysis of Call Detail Records of International Voice Traffic in Mobile Networks. ICUFN 2018: 475-480 - 2017
- [c29]Robert Bestak, Jiri Hlavacek:
A Videoconferencing System Based on WebRTC Technology. CN 2017: 245-255 - 2015
- [c28]Chithra Reghuvaran, Robert Bestak, Sarat Kumar Patra:
Hungarian Method Based Joint Transmission Mode and Relay Selection in Device-to-Device Communication. WMNC 2015: 261-268 - [c27]Chithra Reghuvaran, Robert Bestak, Sarat Kumar Patra:
Orthogonal MIMO precoding schemes for device-to-device communication in LTE networks. TSP 2015: 1-5 - 2013
- [c26]Robert Bestak, Marek Sedlacek:
Overlapping cells in femtocell environment. WMNC 2013: 1-5 - [c25]Ardian Ulvan, Melvi Ulvan, Robert Bestak:
Integrated IMS-femtocell testbed. TSP 2013: 100-104 - [c24]Marek Sedlacek, Robert Bestak:
Probability of cell overlapping in femtocell environment. TSP 2013: 244-248 - [c23]Jan Oppolzer, Robert Bestak:
Cell Identifier Assignment in Two-Tier Femtocell Networks. VTC Spring 2013: 1-5 - 2012
- [c22]Jan Oppolzer, Robert Bestak:
Physical Cell Identifier assignment in LTE-advanced networks. WMNC 2012: 70-74 - [c21]Jan Oppolzer, Robert Bestak:
Physical Cell Identifier Assignment in Dense Home Evolved NodeB Deployment. NGMAST 2012: 170-174 - [c20]Jan Oppolzer, Robert Bestak:
Distributed pHysical Cell Identifier assignment algorithm in femtocell networks. Wireless Days 2012: 1-3 - 2011
- [c19]Robert Bestak, Zuzana Vranova, Vojtech Ondryhal:
Testing of Transmission Channels Quality for Different Types of Communication Technologies. DICTAP (1) 2011: 13-23 - 2010
- [c18]Ardian Ulvan, Robert Bestak, Melvi Ulvan:
The study of handover procedure in LTE-based femtocell network. WMNC 2010: 1-6 - 2009
- [c17]Pavel Mach, Zdenek Becvar, Robert Bestak:
Acquisition of Channel State Information for Routing Purposes in Relay-Based WiMAX Networks. ICN 2009: 170-175 - [c16]Zdenek Becvar, Pavel Mach, Robert Bestak:
Impact of Handover on VoIP Speech Quality in WiMAX Networks. ICN 2009: 281-286 - [c15]Robert Bestak:
Parameter Setting of Protocol MAC-hs in HSDPA. ICN 2009: 292-296 - [c14]Jaroslav Vrana, Petr Vlácil, Robert Bestak:
Enhancement of managed roaming procedure in GSM. IWCMC 2009: 547-551 - [c13]Melvi Ulvan, Robert Bestak:
Analysis of Session Establishment Signaling Delay in IP Multimedia Subsystem. WMNC/PWC 2009: 44-55 - [c12]Pavel Mach, Robert Bestak:
Optimization of Frame Structure for WiMAX Multi-hop Networks. WMNC/PWC 2009: 106-116 - [c11]Ardian Ulvan, Robert Bestak:
The Efficiency Performance on Handover's Scanning Process of IEEE802.16m. WMNC/PWC 2009: 321-331 - 2008
- [c10]Zdenek Becvar, Pavel Mach, Robert Bestak:
Optimization of handover scanning procedure in WiMAX networks with relay stations. ISWPC 2008: 581-585 - [c9]Ardian Ulvan, Diogo Ribeiro, Robert Bestak:
Multiple Cell Partitions for Increasing the CDMA-Based Cell Capacity. MWCN/PWC 2008: 383-394 - 2007
- [c8]Robert Bestak:
Influence of Release Timer on MAC-hs Performance. ICN 2007: 14 - [c7]Pavel Mach, Robert Bestak:
WiMAX Performance Evaluation. ICN 2007: 17 - [c6]Pavel Mach, Robert Bestak:
WiMAX Throughput Evaluation of Conventional Relaying. PWC 2007: 75-86 - [c5]Ardian Ulvan, Robert Bestak:
Transmission Performance of Flexible Relay-based Networks on The Purpose of Extending Network Coverage. PWC 2007: 99-106 - 2006
- [c4]Robert Bestak:
Influence of Window Size on MAC-hs performance. ICN/ICONS/MCL 2006: 29 - 2005
- [c3]Robert Bestak:
Performance Analysis of MAC-hs Protocol. ICN (1) 2005: 100-108 - 2002
- [c2]Robert Bestak, Philippe Godlewski, Philippe Martins:
RLC buffer occupancy when using a TCP connection over UMTS. PIMRC 2002: 1161-1165 - [c1]Robert Bestak, Philippe Godlewski, Philippe Martins:
A TCP connection over uplink UMTS radio access bearer in RLC acknowledged mode. VTC Spring 2002: 972-976
Editorship
- 2012
- [e5]Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin:
NETWORKING 2012 - 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I. Lecture Notes in Computer Science 7289, Springer 2012, ISBN 978-3-642-30044-8 [contents] - [e4]Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin:
NETWORKING 2012 - 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part II. Lecture Notes in Computer Science 7290, Springer 2012, ISBN 978-3-642-30053-0 [contents] - [e3]Zdenek Becvar, Robert Bestak, Lukas Kencl:
NETWORKING 2012 Workshops - International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague, Czech Republic, May 25, 2012. Proceedings. Lecture Notes in Computer Science 7291, Springer 2012, ISBN 978-3-642-30038-7 [contents] - 2009
- [e2]Robert Bestak, Laurent George, Vladimir S. Zaborovsky, Cosmin Dini:
The Eighth International Conference on Networks, ICN 2009, 1-6 March 2009, Gosier, Guadeloupe, France. IEEE Computer Society 2009, ISBN 978-0-7695-3552-4 [contents] - 2007
- [e1]Robert Bestak, Boris Simák, Ewa Kozlowska:
Personal Wireless Communications, The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007. IFIP 245, Springer 2007, ISBN 978-0-387-74158-1 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-06 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint