1. Abramson, N.: Development of the alohanet. IEEE Trans. Inf. Theor. 31(2), 119–123 (2006)
2. Awerbuch, B., Richa, A.W., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In Bazzi, R.A., Patt-Shamir, B., (eds.) Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, PODC 2008, Toronto, Canada, August 18–21, 2008, pp. 45–54. ACM (2008)
3. Bender, M.A., Fineman, J.T., Gilbert, S., Young, M.: How to scale exponential backoff: constant throughput, polylog access attempts, and robustness. In: Krauthgamer, R. (ed.) Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10–12, 2016, pp. 636–654. SIAM (2016)
4. Brandes, P., Kardas, M., Klonowski, M., Pajak, D., Wattenhofer, R.: Approximating the size of a radio network in beeping model. In Suomela, J. (ed.) Structural Information and Communication Complexity—23rd International Colloquium, SIROCCO 2016, Helsinki, Finland, July 19–21, 2016, Revised Selected Papers, Volume 9988 of Lecture Notes in Computer Science, pp.358–373 (2016)
5. Chen, B., Zhou, Z., Yu, H.: Understanding RFID counting protocols. In: Helal, S., Chandra, R., Kravets, R. (eds.) The 19th Annual International Conference on Mobile Computing and Networking, MobiCom’13, Miami, FL, USA, September 30–October 04, 2013, pp. 291–302. ACM (2013)