Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Users and Batteries: Interactions and Adaptive Energy Management in Mobile Systems, , , , and . International Conference on Ubiquitous Computing, page 217--237. (September 2007)An efficient multi-objective QoS-routing algorithm for wireless multicasting., , and . VTC Spring, page 1160-1164. IEEE, (2002)Cross-Level Detection Framework for Attacks on Cyber-Physical Systems., , , , , , , and . J. Hardw. Syst. Secur., 1 (4): 356-369 (2017)Mirage: Mitigating illicit inventorying in a RFID enabled retail environment., and . COMSNETS, page 1-9. IEEE, (2011)Fast determination of QoS-based multicast routes in wireless networks using genetic algorithm., and . ICC, page 2588-2592. IEEE, (2001)Concurrent Wi-Fi for mobile users: analysis and measurements., , , , , and . CoNEXT, page 4. ACM, (2011)KARMA: Improving WiFi-based indoor localization with dynamic causality calibration., , , , , and . SECON, page 90-98. IEEE, (2014)Analysis of SIP-based mobility management in 4G wireless networks., , , and . Comput. Commun., 27 (8): 697-707 (2004)Non-intrusive transaction monitoring using system logs., , , and . NOMS, page 879-882. IEEE, (2008)SunaPlayer: high-accuracy emulation of solar cells., , , , , and . IPSN, page 59-70. ACM, (2015)