Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A distributed simulator for network resource management investigation., , , and . Comput. Commun., 26 (15): 1782-1791 (2003)Exploring sensor networks using mobile agents., , , , and . AAMAS, page 323-325. ACM, (2006)DrillSim: A Simulation Framework for Emergency Response Drills., , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 237-248. Springer, (2006)Practical experiences in enabling and ensuring quality sensing in emergency response applications., , , , , , , and . PerCom Workshops, page 388-393. IEEE Computer Society, (2010)Synthetic humans in emergency response drills., , , and . AAMAS, page 1469-1470. ACM, (2006)A semantic approach for building pervasive spaces., , and . Middleware Doctoral Symposium, page 2:1-2:6. ACM, (2009)An ATM Distributed Simulator for Network Management Researc., , , and . Annual Simulation Symposium, page 185-192. IEEE Computer Society, (2001)Design and Implementation of a Middleware for Sentient Spaces., , , , , , , and . ISI, page 137-144. IEEE, (2007)Middleware for Pervasive Spaces: Balancing Privacy and Utility., , , , and . Middleware, volume 5896 of Lecture Notes in Computer Science, page 247-267. Springer, (2009)Privacy-Preserving Event Detection in Pervasive Spaces., , , , and . PerCom, page 1-10. IEEE Computer Society, (2009)