Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless Epidemic Spread in Dynamic Human Networks Bio-Inspired Computing and Communication, , , , , and . Bio-Inspired Computing and Communication, volume 5151 of Lecture Notes in Computer Science, chapter 11, Springer Berlin / Heidelberg, Berlin, Heidelberg, (2008)A Survey of Incentive Mechanisms for Participatory Sensing., , , , , , , and . IEEE Commun. Surv. Tutorials, 17 (2): 918-943 (2015)An Impact and Risk Assessment Framework for National Electronic Identity (eID) Systems., , , and . CoRR, (2023)Probabilistic event resolution with the pairwise random protocol., and . NOSSDAV, page 67-72. ACM, (2009)Distributed community detection in delay tolerant networks, , , and . Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, page 1--8. New York, NY, USA, ACM, (2007)Personal data: thinking inside the box., , , , , , and . Aarhus Conference on Critical Alternatives, page 29-32. Aarhus University Press / ACM, (2015)The near-term feasibility of P2P MMOG's., and . NETGAMES, page 1-6. IEEE, (2010)Delivery Properties of Human Social Networks., , and . INFOCOM, page 2586-2590. IEEE, (2009)LiteLab: Efficient large-scale network experiments., , , and . CCNC, page 60-66. IEEE, (2016)Vigilante: end-to-end containment of internet worms., , , , , , and . SOSP, page 133-147. ACM, (2005)