Author of the publication

Static and Dynamic Polling Mechanisms for Fieldbus Networks.

, and . ACM SIGOPS Oper. Syst. Rev., 27 (3): 34-45 (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Error Control Codes to Reduce the Communication Complexity of Voting in NMR Systems., and . PDPTA, page 675-686. CSREA Press, (1996)On the performance of multi-layer superposition coding scheme under constrained jamming., , and . CISS, page 1-6. IEEE, (2013)Demo: SNEAP: a social network-enabled EAP method no more open hotspots., , , , and . MobiSys, page 351-352. ACM, (2011)Cascading Attacks on Wi-Fi Networks: Theory and Experiments., , and . IEEE Trans. Control. Netw. Syst., 7 (4): 1757-1768 (2020)Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning., , and . WISEC, page 201-212. ACM, (2014)EPiC: Efficient Privacy-Preserving Counting for MapReduce., , and . NETYS, volume 9466 of Lecture Notes in Computer Science, page 426-443. Springer, (2015)Packetized wireless communication under jamming, a constrained bimatrix game., , and . GLOBECOM, page 740-745. IEEE, (2014)A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication., , , and . NDSS, The Internet Society, (2013)A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link., , , , , , and . USENIX Security Symposium, page 37-54. USENIX Association, (2019)Wideband, Real-time Spectro-Temporal RF Identification., , , and . MobiWac, page 77-86. ACM, (2021)