G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications, vol.18, issue.3, pp.535-547, 2006.
DOI : 10.1109/49.840210

F. Despaux, Y. Song, and A. Lahmadi, On the gap between mathematical modeling and measurement analysis for performance evaluation of the 802.15.4 mac protocol, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00877452

A. Dunkels, The ContikiMAC Radio Duty Cycling Protocol, 2011.

J. Hauer, An ieee 802.15.4 mac implementation for tinyos 2, Tkn15, vol.4, 2009.

W. He, X. Liu, L. Zheng, and H. Yang, Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability, 2010 IEEE 30th International Conference on Distributed Computing Systems, pp.159-168, 2010.
DOI : 10.1109/ICDCS.2010.73

J. Herbst and D. Karagiannis, Workflow mining with InWoLvE, Computers in Industry, vol.53, issue.3, pp.245-264, 2004.
DOI : 10.1016/j.compind.2003.10.002

J. Misic and V. Misic, Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4, 2008.

P. Park, P. D. Marco, C. Fischione, and K. H. Johansson, Delay analysis of slotted IEEE 802.15. 4 with a finite retry limit and unsaturated traffic, IEEE Global Communications Conference, p.18, 2009.

Y. Song, Réseaux de Capteurs Sans Fil : Comment Fournir La Qualité de Service Tout En Economisant l'Energie ?, Ecole d'´ eté temps réel 2013, 2013.

W. M. Van-der-aalst, A. J. Weijter, and L. Maruster, Workflow mining: discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, 2003.
DOI : 10.1109/TKDE.2004.47

F. Boudewijn, A. Van-dongen, A. Karla, H. M. De-medeiros, A. J. Verbeek et al., The prom framework: A new era in process mining tool support, ICATPN, pp.444-454, 2005.

M. Gabriel, D. R. Veiga, and . Ferreira, Understanding spaghetti models with sequence clustering for ProM, Business Process Management Workshops, p.92103, 2010.

Y. Wang, Z. Zhang, D. D. Yao, B. Qu, and L. Guo, Inferring Protocol State Machine from Network Traces: A Probabilistic Approach, Proceedings of the 9th International Conference on Applied Cryptography and Network Security, pp.1-18, 2011.
DOI : 10.1002/9780470316801

Y. Wang, M. C. Vuran, and S. Goddard, Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks, IEEE/ACM Transactions on Networking, vol.20, issue.1, pp.305-318, 2012.
DOI : 10.1109/TNET.2011.2159845