scispace - formally typeset
V

Vojislav B. Misic

Researcher at Ryerson University

Publications -  345
Citations -  4417

Vojislav B. Misic is an academic researcher from Ryerson University. The author has contributed to research in topics: Wireless sensor network & Computer science. The author has an hindex of 32, co-authored 312 publications receiving 3760 citations. Previous affiliations of Vojislav B. Misic include University of Belgrade & University of Winnipeg.

Papers
More filters
Journal ArticleDOI

Efficiency of Power Ramping During Random Access in LTE

TL;DR: It is shown that, under power ramping and default PDCCH capacity, increasing the number of retransmissions beyond 1 or at most 2 does not bring any benefits and, in fact, is detrimental to system capacity.
Journal ArticleDOI

Formal Specification of a Data Dictionary for an Extended ER Data Model

TL;DR: A formal definition of the data dictionary for an extended entity-relationship data model is described, and a simple transformation of the extended ER schema to a relational one is formally described.
Journal ArticleDOI

Talk and let talk: performance of Bluetooth piconets with synchronous traffic

TL;DR: It was found that the pseudo-SCO scheme allows asynchronous traffic to experience much lower access and end-to-end delays than with the regular SCO connection, while supporting the bandwidth requirements of SCO traffic.
Proceedings ArticleDOI

WSN05-5: On Node Population in a Multi-Level 802.15.4 Sensor Network

TL;DR: In this paper, the authors consider the problem of maintaining the prescribed event sensing reliability while maximizing cluster and network lifetime in a multi-cluster 802.154 sensor network and derive the probability distribution of the network lifetime.
Journal ArticleDOI

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives

TL;DR: The continuous-time Markov chain (CTMC) models are developed to capture the operational details of the 5G-AKA authentication services when facing the service failure and derive formulas for calculating metrics of interest, including Defects Per Million (DPM), authentication service’s first restoration time from failure and total cost of ownership (TCO).