G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications, vol.18, issue.3, pp.535-547, 2006.
DOI : 10.1109/49.840210

M. Buettner, G. V. Yee, E. Anderson, and R. Han, X-MAC, Proceedings of the 4th international conference on Embedded networked sensor systems , SenSys '06, pp.307-320, 2006.
DOI : 10.1145/1182807.1182838

F. Despaux, Y. Song, and A. Lahmadi, Markov Chain Results

F. Despaux, Y. Song, and A. Lahmadi, Towards performance analysis of wireless sensor networks using Process Mining Techniques, 2014 IEEE Symposium on Computers and Communications (ISCC), 2014.
DOI : 10.1109/ISCC.2014.6912522

URL : https://hal.archives-ouvertes.fr/hal-01093729

F. Despaux, Y. Song, and A. Lahmadi, On the gap between mathematical modeling and measurement analysis for performance evaluation of the 802.15.4 mac protocol, 12th International Workshop on Real Time Networks RTN13, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00877452

M. Doudou, D. Djenouri, and N. Badache, Survey on Latency Issues of Asynchronous MAC Protocols in Delay-Sensitive Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, vol.15, issue.2, pp.528-550, 2013.
DOI : 10.1109/SURV.2012.040412.00075

A. Dunkels, The ContikiMAC Radio Duty Cycling Protocol, 2011.

W. He, X. Liu, L. Zheng, and H. Yang, Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability, 2010 IEEE 30th International Conference on Distributed Computing Systems, pp.159-168, 2010.
DOI : 10.1109/ICDCS.2010.73

J. Herbst and D. Karagiannis, Workflow mining with InWoLvE, Computers in Industry, vol.53, issue.3, pp.245-264, 2004.
DOI : 10.1016/j.compind.2003.10.002

J. Misic and V. Misic, Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802.15.4, 2008.

P. Park, P. D. Marco, C. Fischione, and K. H. Johansson, Delay analysis of slotted IEEE 802.15. 4 with a finite retry limit and unsaturated traffic, IEEE Global Communications Conference, p.18, 2009.

W. M. Van-der-aalst, A. J. Weijter, and L. Maruster, Workflow mining: discovering process models from event logs, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.9, 2003.
DOI : 10.1109/TKDE.2004.47

F. Boudewijn, A. Van-dongen, A. Karla, H. M. De-medeiros, A. J. Verbeek et al., The prom framework: A new era in process mining tool support, Lecture Notes in Computer Science, vol.3536, pp.444-454, 2005.

M. Gabriel, D. R. Veiga, and . Ferreira, Understanding spaghetti models with sequence clustering for ProM, Business Process Management Workshops, p.92103, 2010.

Y. Wang, Z. Zhang, D. D. Yao, B. Qu, and L. Guo, Inferring Protocol State Machine from Network Traces: A Probabilistic Approach, pp.1-18, 2011.
DOI : 10.1002/9780470316801

Y. Wang, M. C. Vuran, and S. Goddard, Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks, IEEE/ACM Transactions on Networking, vol.20, issue.1, pp.305-318, 2012.
DOI : 10.1109/TNET.2011.2159845

W. Ye, J. Heidemann, and D. Estrin, An energyefficient MAC protocol for wireless sensor networks, INFOCOM 2002, p.15671576, 2002.

S. Zhuo, Z. Wang, Y. Song, Z. Wang, and L. Almeida, iQueue-MAC: A traffic adaptive duty-cycled MAC protocol with dynamic slot allocation, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), pp.95-103, 2013.
DOI : 10.1109/SAHCN.2013.6644967

URL : https://hal.archives-ouvertes.fr/hal-00905822