An analysis of the backoff mechanism used in IEEE 802.11 networks M Natkaniec, AR Pach Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications …, 2000 | 131 | 2000 |
A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions K Kosek-Szott, M Natkaniec, AR Pach Computer Networks 55 (3), 622-635, 2011 | 85 | 2011 |
Management of security in quantum cryptography M Niemiec, AR Pach IEEE Communications Magazine 51 (8), 36-41, 2013 | 47 | 2013 |
Broadbandloop: A full-service access network for residential and small business users NE Andersen, PMN Nordeste, AMDO Duarte, HE Lassen, A Ekblad, ... IEEE communications magazine 35 (12), 88-93, 1997 | 31 | 1997 |
An analysis of modified backoff mechanism in IEEE 802.11 networks M Natkaniec, AR Pach Proceedings of the Polish–German Teletraffic Symposium (PGTS 2000), 89-96, 2000 | 30 | 2000 |
The measure of security in quantum cryptography M Niemiec, AR Pach 2012 IEEE Global Communications Conference (GLOBECOM), 967-972, 2012 | 28 | 2012 |
An IEEE 802.11 EDCA model with support for analysing networks with misbehaving nodes S Szott, M Natkaniec, AR Pach EURASIP Journal on Wireless Communications and Networking 2010, 1-13, 2010 | 28 | 2010 |
3D Markov chain-based saturation throughput model of IEEE 802.11 EDCA M Gas, K Kosek-Szott, M Natkaniec, AR Pach Electronics letters 47 (14), 1, 2011 | 26 | 2011 |
Impact of contention window cheating on single-hop IEEE 802.11 e MANETs S Szott, M Natkaniec, R Canonico, AR Pach 2008 IEEE Wireless Communications and Networking Conference, 1356-1361, 2008 | 26 | 2008 |
PUMA-a new channel access protocol for wireless LANs M Natkaniec, AR Pach The 5th International Symposium on Wireless Personal Multimedia …, 2002 | 24 | 2002 |
An analysis of the influence of the threshold parameter on the IEEE 802.11 network performance M Natkaniec, AR Pach 2000 IEEE Wireless Communications and Networking Conference. Conference …, 2000 | 21 | 2000 |
An analysis of star topology IEEE 802.11 e networks in the presence of hidden nodes K Kosek, M Natkaniec, L Vollero, AR Pach 2008 International Conference on Information Networking, 1-5, 2008 | 17 | 2008 |
Dystrybucja danych w sieci Internet A Chodorek, R Chodorek, AR Pach Wydawnictwa Komunikacji i Łączności, 2007 | 17 | 2007 |
Transmisja multikastowa w sieciach IP R Chodorek, AR Pach Wydaw. Fundacji Postępu Telekomunikacji, 2003 | 14 | 2003 |
Slot pre-using in IEEE 802.6 metropolitan area networks AR Pach, S Palazzo, D Panno IEEE Journal on Selected areas in Communications 11 (8), 1249-1258, 1993 | 14 | 1993 |
Engineering education in Poland J Filipiak, AR Pach IEEE Communications Magazine 30 (11), 58-64, 1992 | 14 | 1992 |
BusySiMOn-a new protocol for IEEE 802.11 EDCA-based ad-hoc networks with hidden nodes K Kosek-Szott, M Natkaniec, AR Pach 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 13 | 2010 |
A new busy signal-based MAC protocol supporting QoS for ad-hoc networks with hidden nodes K Kosek-Szott, M Natkaniec, AR Pach Wireless networks 19, 1135-1153, 2013 | 11 | 2013 |
Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game‐theoretic approach S Szott, M Natkaniec, AR Pach Security and Communication Networks 6 (4), 509-522, 2013 | 11 | 2013 |
Performance analysis of 802.11 e networks with hidden nodes in a star topology K Kosek, M Natkaniec, L Vollero, AR Pach 2008 5th IEEE Consumer Communications and Networking Conference, 440-441, 2008 | 11 | 2008 |