default search action
Frank A. Zdarsky
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j8]Faqir Zarrar Yousaf, Paulo Loureiro, Frank A. Zdarsky, Tarik Taleb, Marco Liebsch:
Cost analysis of initial deployment strategies for virtualized mobile core network functions. IEEE Commun. Mag. 53(12): 60-66 (2015) - [j7]Frank A. Zdarsky, Andreas Mäder, Stefan Schmid:
Local mobility and service access for enterprise femtocell networks. Trans. Emerg. Telecommun. Technol. 26(4): 650-663 (2015) - 2014
- [j6]Antonio de la Oliva, Albert Banchs, Pablo Serrano, Frank A. Zdarsky:
Providing throughput guarantees in heterogeneous wireless mesh networks. Wirel. Commun. Mob. Comput. 14(4): 435-449 (2014) - 2013
- [c23]John Fitzpatrick, Frank A. Zdarsky:
Enabling multi-homed femtocells using SCTP. ICC Workshops 2013: 1183-1188 - 2012
- [j5]Jaime Ferragut, Josep Mangues-Bafalluy, José Núñez-Martínez, Frank A. Zdarsky:
Traffic and Mobility Management in Networks of Femtocells. Mob. Networks Appl. 17(5): 662-673 (2012) - 2011
- [j4]Frank A. Zdarsky, Sebastian Robitzsch, Albert Banchs:
Security analysis of wireless mesh backhauls for mobile networks. J. Netw. Comput. Appl. 34(2): 432-442 (2011) - [c22]Alexander Tyrrell, Frank A. Zdarsky, Emilio Mino, Mariano Lopez:
Use Cases, Enablers and Requirements for Evolved Femtocells. VTC Spring 2011: 1-5 - [c21]Frank A. Zdarsky, Andreas Mäder, Sabah Al-Sabea, Stefan Schmid:
Localization of Data and Control Plane Traffic in Enterprise Femtocell Networks. VTC Spring 2011: 1-5 - 2010
- [c20]Fang-Chun Kuo, Frank A. Zdarsky, Johannes Lessmann, Stefan Schmid:
Cost-Efficient Wireless Mobile Backhaul Topologies: An Analytical Study. GLOBECOM 2010: 1-5 - [c19]Johannes Lessmann, Marcus Schoeller, Frank A. Zdarsky:
Rope ladder routing: Position-based multipath routing for wireless mesh networks. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [b1]Frank A. Zdarsky:
Self-Coordinated Radio Resource Management for Dense and Chaotic Wireless Networks. University of Kaiserslautern, 2009, ISBN 978-3-86853-090-2, pp. 1-298 - [j3]Arturo Azcorra, T. Banniza, David Chieng, John Fitzpatrick, Dirk von Hugo, Marek Natkaniec, Sebastian Robitzsch, Frank A. Zdarsky:
Supporting carrier grade services over wireless mesh networks: The approach of the European FP-7 STREP CARMEN [Very Large Projects]. IEEE Commun. Mag. 47(4): 14-16 (2009) - [j2]Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens B. Schmitt:
Bringing law and order to IEEE 802.11 networks - A case for DiscoSec. Pervasive Mob. Comput. 5(5): 510-525 (2009) - [j1]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
Minimizing contention through cooperation between densely deployed wireless LANs. Wirel. Networks 15(6): 741-754 (2009) - 2008
- [c18]Jens B. Schmitt, Frank A. Zdarsky, Markus Fidler:
Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch... INFOCOM 2008: 1669-1677 - [c17]Jens B. Schmitt, Frank A. Zdarsky, Ivan Martinovic:
Improving Performance Bounds in Feed-Forward Networks by Paying Multiplexing Only Once. MMB 2008: 13-28 - [c16]Nicos Gollan, Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
The DISCO Network Calculator. MMB 2008: 291-294 - [c15]Albert Banchs, Nico Bayer, David Chieng, Antonio de la Oliva, Bernd Gloss, Mathias Kretschmer, Seán Murphy, Marek Natkaniec, Frank A. Zdarsky:
CARMEN: Delivering carrier grade services over wireless mesh networks. PIMRC 2008: 1-6 - [c14]Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegmann, Jens B. Schmitt:
Wireless client puzzles in IEEE 802.11 networks: security by wireless. WISEC 2008: 36-45 - [c13]Ivan Martinovic, Paul Pichota, Matthias Wilhelm, Frank A. Zdarsky, Jens B. Schmitt:
Design, implementation, and performance analysis of DiscoSec - Service pack for securing WLANs. WOWMOM 2008: 1-10 - 2007
- [c12]Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt:
Regional-based authentication against dos attacks in wireless networks. Q2SWinet 2007: 176-179 - [c11]Jens B. Schmitt, Frank A. Zdarsky, Lothar Thiele:
A Comprehensive Worst-Case Calculus for Wireless Sensor Networks with In-Network Processing. RTSS 2007: 193-202 - [c10]Ivan Martinovic, Frank A. Zdarsky, Adam Bachorek, Christian Jung, Jens B. Schmitt:
Phishing in the Wireless: Implementation and Analysis. SEC 2007: 145-156 - 2006
- [c9]Ivan Martinovic, Christof Leng, Frank A. Zdarsky, Andreas Mauthe, Ralf Steinmetz, Jens B. Schmitt:
Self-protection in P2P Networks: Choosing the Right Neighbourhood. IWSOS/EuroNGI 2006: 23-33 - [c8]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
The Case for Virtualized Wireless Access Networks. IWSOS/EuroNGI 2006: 90-104 - [c7]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
On Self-coordination in Wireless Community Networks. PWC 2006: 251-262 - [c6]Jens B. Schmitt, Frank A. Zdarsky:
The DISCO network calculator: a toolbox for worst case analysis. VALUETOOLS 2006: 8 - 2005
- [c5]Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt:
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks. DIALM-POMC 2005: 8-16 - 2004
- [c4]Frank A. Zdarsky, Jens B. Schmitt:
Handover in Mobile Communication Networks: Who is in Control Anyway?. EUROMICRO 2004: 205-212 - [c3]Jens B. Schmitt, Frank A. Zdarsky:
A case for simplicity in providing network quality of service: class-based strict priority queueing. ICON 2004: 809-813 - [c2]Frank A. Zdarsky, Jens B. Schmitt:
Enhancing mobile QoS based on movement contracts. IWQoS 2004: 3-9 - 2001
- [c1]Johannes Schmitt, Frank A. Zdarsky, Martin Karsten, Ralf Steinmetz:
Heterogeneous multicast in heterogeneous QoS networks. ICON 2001: 349-354
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-19 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint