Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Market-Based Model for Resource Allocation in Agent Systems., , , , , and . Coordination of Internet Agents: Models, Technologies, and Applications, Springer, (2001)Privacy in Location-Aware Computing Environments., , and . IEEE Pervasive Comput., 6 (4): 64-72 (2007)Securing Information Technology in Healthcare., , , , , , , , , and 1 other author(s). IEEE Secur. Priv., 11 (6): 25-33 (2013)Analysis of a Wi-Fi Hotspot Network., , and . WiTMeMo, USENIX Association, (2013)Performance analysis of mobile agents for filtering data streams on wireless networks., , , , and . MSWiM, page 85-94. ACM, (2000)D'Agents: Security in a Multiple-Language, Mobile-Agent System., , , and . Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, page 154-187. Springer, (1998)Toward Interoperability of Mobile-Agent Systems., , , , , , , , , and . Mobile Agents, volume 2535 of Lecture Notes in Computer Science, page 106-120. Springer, (2002)Low-Level Interfaces for High-Level Parallel I/O., and . Input/Output in Parallel and Distributed Computer Systems, Kluwer/Springer, (1996)CloseTalker: Secure, Short-Range Ad Hoc Wireless Communication., , , and . MobiSys, page 340-352. ACM, (2019)Detecting Receptivity for mHealth Interventions in the Natural Environment., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (2): 74:1-74:24 (2021)