Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding population displacements on location-based call records using road data., , , and . MobiGIS, page 17-21. ACM, (2013)Gauging human mobility characteristics and its impact on mobile routing performance., , , and . Int. J. Sens. Networks, 11 (3): 179-191 (2012)Human Behavior and Challenges of Anonymizing WLAN Traces., and . GLOBECOM, page 1-6. IEEE, (2009)Polite: A policy framework for building managed mobile apps., , , and . MILCOM, page 1-6. IEEE, (2012)Proximity based trust-advisor using encounters for mobile societies: Analysis of four filters., , and . Wirel. Commun. Mob. Comput., 10 (12): 1605-1619 (2010)PROTECT: proximity-based trust-advisor using encounters for mobile societies., , and . IWCMC, page 636-645. ACM, (2010)Gender-based feature analysis in campus-wide WLANs., , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 12 (1): 40-42 (2008)Proximity-based trust-advisor using encounters., and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (4): 22-24 (2010)On the efficacy of mobility modeling for DTN evaluation: Analysis of encounter statistics and spatio-temporal preferences., , , and . IWCMC, page 510-515. IEEE, (2011)Comparing wireless network usage: laptop vs smart-phones., , and . MobiCom, page 243-246. ACM, (2013)