Author of the publication

Fast and Accurate Detection of Unknown Tags for RFID Systems - Hash Collisions are Desirable.

, , , , , , , and . IEEE/ACM Trans. Netw., 28 (1): 126-139 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Superpoints Using a Vector Bloom Filter., , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 514-527 (2016)Performance modelling of a fault-tolerant agent-driven system., and . ICC, page 153-157. IEEE, (2005)MVSS: Mobile Visual Search Based on Saliency., , , , , and . HPCC/EUC, page 922-928. IEEE, (2013)The Probability of Success of Mobile Agents When Routing in Faulty Networks., and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 76-84. Springer, (2006)Cache Side-Channel Attacks: Flush+Flush and the Countermeasures Time Gap., , and . ICPADS, page 880-887. IEEE, (2019)AITurbo: Unified Compute Allocation for Partial Predictable Training in Commodity Clusters., , , , and . HPDC, page 133-145. ACM, (2021)BULB: Lightweight and Automated Load Balancing for Fast Datacenter Networks., , , and . ICPP, page 60:1-60:11. ACM, (2022)An Execution Prototype of Mobile Agent-Based Peer-to-Peer Systems., , , and . IMSCCS (2), page 330-338. IEEE Computer Society, (2006)0-7695-2581-4.Multi-user Cooperative Computation Offloading in Mobile Edge Computing., , , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 182-193. Springer, (2020)Object Oriented Property Attestation for Trusted Storage., , , and . CIT (2), page 93-97. IEEE Computer Society, (2009)978-0-7695-3836-5.