Author of the publication

BurstProbe: Debugging Time-Critical Data Delivery in Wireless Sensor Networks.

, , , , and . EWSN, volume 6567 of Lecture Notes in Computer Science, page 195-210. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facilitative and rememberative: novel incentive structures for increased exercise in interactive media., , , and . SIGCAS Comput. Soc., 44 (2): 11-15 (2014)Adversarial Authorship, AuthorWebs, and Entropy-Based Evolutionary Clustering., , , , , and . ICCCN, page 1-6. IEEE, (2016)Implementation and Evaluation of Combined Positioning and Communication., , and . REALWSN, volume 6511 of Lecture Notes in Computer Science, page 126-137. Springer, (2010)Towards multiprocessor sensor nodes., , , and . HotEmNets, page 16:1-16:5. ACM, (2010)Detection of Mobile Malware: An Artificial Immunity Approach., , and . IEEE Symposium on Security and Privacy Workshops, page 74-80. IEEE Computer Society, (2016)Blockchained Post-Quantum Signatures., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 1196-1203. IEEE, (2018)Personal Knowledge Management: Framework for Integration and Partnerships, , , , and . ASCUE 2001 Conference Proceedings, (June 2001)Low-Power Radio Communication in Industrial Outdoor Deployments: The Impact of Weather Conditions and ATEX-Compliance., , , , and . SENSAPPEAL, volume 29 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 159-176. Springer, (2009)An artificial immunity approach to malware detection in a mobile platform., , and . EURASIP J. Information Security, (2017)Translating the human microbiome, , , , , , , , and . Nat Biotech, 31 (4): 304--308 (Apr 5, 2013)