Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mission-critical management of mobile sensors: or, how to guide a flock of sensors., , and . DMSN, volume 72 of ACM International Conference Proceeding Series, page 111-118. ACM, (2004)Moving Object Uncertainty., and . Encyclopedia of GIS, Springer, (2017)Dynamic Integration and Query Processing with Ranked Role Sets., , and . CoopIS, page 157-166. IEEE Computer Society, (1996)A Case for Meta-Triggers in Wireless Sensor Networks., , , and . NCA, page 171-178. IEEE Computer Society, (2009)Tracking-Based Trajectory Data Reduction in Wireless Sensor Networks., , and . SUTC/UMC, page 99-106. IEEE Computer Society, (2010)Protecting Private Data on Mobile Systems based on Spatio-temporal Analysis., , , and . PECCS, page 114-123. SciTePress, (2011)Modelling the Information Space in Physical Storage at Different Levels of Detail.. Comput. J., 20 (3): 248-256 (1977)Bypassing holes in sensor networks: Load-balance vs. latency., , , , , and . Ad Hoc Networks, (2017)Efficient location aware intrusion detection to protect mobile devices., , , , and . Personal and Ubiquitous Computing, 18 (1): 143-162 (2014)Targets and Shapes Tracking (Advanced Seminar)., and . MDM, page 7-10. IEEE Computer Society, (2018)