[1] J. Wilson and N. Patwari, “See-Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks”, <em>IEEE Transactions on Mobile Computing</em>, vol. 10, no. 5, pp. 612-621, 2011.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TMC.2010.175" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TMC.2010.175</a></dgdoi:pub-id>
[2] C. Wu <em>et al</em>, “Non-Invasive Detection of Moving and Stationary Human with WiFi”, <em>IEEE Journal on Selected Areas in Communications</em>, vol. 33, no. 11, pp. 2329-2342, 2015.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/JSAC.2015.2430294" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/JSAC.2015.2430294</a></dgdoi:pub-id>
[4] W.Y. Choi and M. Chatterjee, “Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs”, <em>Frequenz</em>, vol. 69, no. 3/4, pp. 141-147, 2015.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1515/freq-2014-0104" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1515/freq-2014-0104</a></dgdoi:pub-id>
[6] C. Sarr, C. Chaudet, G. Chelius, and I. G. Lassous, “Bandwidth Estimation for IEEE 802. 11-based Ad Hoc Networks”, <em>IEEE Transactions onMobile Computing</em>, vol. 7, no. 10, pp. 1228-1241, 2008.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TMC.2008.41" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TMC.2008.41</a></dgdoi:pub-id>