Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disassembling real-time fault-tolerant programs., , and . EMSOFT, page 169-178. ACM, (2008)On biased link sampling in data-driven link estimation and routing in low-power wireless networks., , and . WICON, page 52. ICST, (2008)On the Security and Vulnerability of PING., , and . WSS, volume 2194 of Lecture Notes in Computer Science, page 124-135. Springer, (2001)Stabilization-Preserving Atomicity Refinement., and . DISC, volume 1693 of Lecture Notes in Computer Science, page 254-268. Springer, (1999)Keynote: Primitives for Physical Trust.. SSS, volume 5340 of Lecture Notes in Computer Science, page 1. Springer, (2008)A Pursuer-Evader Game for Sensor Networks., , and . Self-Stabilizing Systems, volume 2704 of Lecture Notes in Computer Science, page 1-16. Springer, (2003)Stabilization in Dynamic Systems with Varying Equilibrium., and . SSS, volume 4838 of Lecture Notes in Computer Science, page 67-81. Springer, (2007)Trail: A Distance Sensitive WSN Service for Distributed Object Tracking., , , and . EWSN, volume 4373 of Lecture Notes in Computer Science, page 83-100. Springer, (2007)Design of a wireless sensor network platform for detecting rare, random, and ephemeral events., , , , and . IPSN, page 497-502. IEEE, (2005)EdgeL^3: Compressing L^3-Net for Mote Scale Urban Noise Monitoring., , , , and . IPDPS Workshops, page 877-884. IEEE, (2019)