Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending TFWC towards higher throughput., , and . CCNC, page 79-83. IEEE, (2012)Interprocess Communication in Distributed Systems: One View., , and . IFIP Congress, page 513-520. (1980)uPhoto: A Design and Implementation of a Snapshot Based Method for Capturing Contextual Information, , , , , and . The Second International Conference on Pervasive Computing (Pervasive2004) Advances in Pervasive Computing, Linz/Vienna, Austria, (2004)Detection, classification and visualization of place-triggered geotagged tweets., , , and . UbiComp, page 956-963. ACM, (2012)Damage Detector: The Damage Automatic Detection of Compartment Lines Using A Public Vehicle and A Camera., , , , , , and . MobiQuitous (Adjunct Proceedings), page 53-58. ACM, (2016)Life2Guard: A Physical Disorder Detection in Private Rooms., , , and . SAINT, page 177-180. IEEE Computer Society, (2008)ELA: A Fully Distributed VPN System over Peer-to-Peer Network., , , , and . SAINT, page 89-92. IEEE Computer Society, (2005)Help Me!: Valuing and Visualizing Participatory Sensing Tasks with Physical Sensors., , , , and . IWWISS, page 3:1-3:6. ACM, (2014)TCP-R: TCP mobility support for continuous operation., , and . ICNP, page 229-. IEEE Computer Society, (1997)An evaluation of priority consistency in protocol architectures., and . LCN, page 386-398. IEEE Computer Society, (1991)