Author of the publication

Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks.

, , , and . BIBE, page 914-921. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StrokeTrack: wireless inertial motion tracking of human arms for stroke telerehabilitation., , and . mHealthSys@SenSys, page 4:1-4:6. ACM, (2011)Adaptive Video Streaming in Presence of Wireless Errors., , and . MMNS, volume 3271 of Lecture Notes in Computer Science, page 26-38. Springer, (2004)Improving the Efficiency of High Speed Implicit Token FOLANs., and . IFIP Congress, page 645-650. North-Holland/IFIP, (1989)CapProbe: a simple and accurate capacity estimation technique for wired and wireless environments., , , , and . SIGMETRICS, page 390-391. ACM, (2004)Optimal loop topologies for distributed systems., and . SIGCOMM, page 218-223. ACM, (1981)CapProbe: a simple and accurate capacity estimation technique., , , , and . SIGCOMM, page 67-78. ACM, (2004)Automated Configuration of Vehicular Communication Services., , , , and . ICCVE, page 128-129. IEEE Computer Society, (2012)Parallel Simulation Environment for Mobile Wireless Networks., , , , , and . WSC, page 605-612. IEEE Computer Society, (1996)ZRESTORE: A Link Restoration Scheme with High Aggregation and No Reservation., , , and . ONDM, volume 242 of IFIP Conference Proceedings, page 295-310. Kluwer, (2002)Real-time support in multihop wireless networks., and . Wireless Networks, 5 (2): 125-135 (1999)