default search action
Mehmet Yunus Donmez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c9]Ihsan Mert Ozcelik
, Mehmet Yunus Donmez:
A Wi-Fi fingerprinting-based indoor localization approach: M-Weighted position estimation (m-WPE). SIU 2017: 1-4 - 2015
- [j10]Can Tunca
, Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Ring Routing: An Energy-Efficient Routing Protocol for Wireless Sensor Networks with a Mobile Sink. IEEE Trans. Mob. Comput. 14(9): 1947-1960 (2015) - [c8]Yekta Said Can
, Mehmet Yunus Donmez:
Sport Sense: A mobile sensor data collection, labeling and display application for sport centers. SIU 2015: 624-627 - 2014
- [j9]Can Tunca
, Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutorials 16(2): 877-897 (2014) - [j8]Cagatay Sonmez, Özlem Durmaz Incel
, Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Fuzzy-based congestion control for wireless multimedia sensor networks. EURASIP J. Wirel. Commun. Netw. 2014: 63 (2014) - [j7]Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy
:
Analysis of a prioritized contention model for multimedia wireless sensor networks. ACM Trans. Sens. Networks 10(2): 36:1-36:31 (2014) - [c7]Can Tunca
, Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
How to fine tune the route update parameters of a mobile sink routing protocol. WCNC 2014: 2219-2223 - 2013
- [j6]Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy
:
Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks. Comput. Networks 57(5): 1101-1112 (2013) - [c6]Sinan Isik, Mehmet Yunus Donmez, Can Tunca
, Cem Ersoy
:
Performance evaluation of wireless sensor networks in realistic wildfire simulation scenarios. MSWiM 2013: 109-118 - [c5]Can Tunca
, Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Performance evaluation of heterogeneous wireless sensor networks for forest fire detection. SIU 2013: 1-4 - 2012
- [j5]Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Multi-sink load balanced forwarding with a multi-criteria fuzzy sink selection for video sensor networks. Comput. Networks 56(2): 615-627 (2012) - [j4]Can Komar, Mehmet Yunus Donmez, Cem Ersoy
:
Detection quality of border surveillance wireless sensor networks in the existence of trespassers' favorite paths. Comput. Commun. 35(10): 1185-1199 (2012) - [c4]Cagatay Sonmez, Sinan Isik, Mehmet Yunus Donmez, Özlem Durmaz Incel
, Cem Ersoy
:
SUIT: A Cross Layer Image Transport Protocol with Fuzzy Logic Based Congestion Control for Wireless Multimedia Sensor Networks. NTMS 2012: 1-6 - [c3]Can Tunca
, Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy
:
Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink. SIU 2012: 1-4 - 2011
- [b1]Mehmet Yunus Donmez:
Quality of service aware contention and deployment quality analysis in multimedia wireless sensor networks (Çoklu ortam kablosuz algılayıcı ağlarında servis kalitesi bilinçli çekişme ve yerleştirme kalitesi analizi). Boğaziçi University, Turkey, 2011 - [j3]Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Cross layer load balanced forwarding schemes for video sensor networks. Ad Hoc Networks 9(3): 265-284 (2011) - 2010
- [j2]Mehmet Yunus Donmez, Rabun Kosar, Cem Ersoy
:
An analytical approach to the deployment quality of surveillance wireless sensor networks considering the effect of jammers and coverage holes. Comput. Networks 54(18): 3449-3466 (2010)
2000 – 2009
- 2006
- [j1]Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Itinerant Delivery of Popular Data via WIDE Hot Spots. Mob. Networks Appl. 11(2): 297-307 (2006) - 2004
- [c2]Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy
:
WIDE: Wireless Information Delivery Environment in Distributed Hot Spots. WONS 2004: 315-328 - [c1]Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy
:
Reliable Delivery of Popular Data Services in WIDE. ISCIS 2004: 289-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint