Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-organization algorithms for autonomic systems in the SelfLet approach., , , and . Autonomics, volume 302 of ACM International Conference Proceeding Series, page 26. ACM, (2007)When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers., , , , , and . Proc. Priv. Enhancing Technol., 2020 (4): 255-276 (2020)ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes., , , , , and . CoRR, (2021)DEPAS: a decentralized probabilistic algorithm for auto-scaling., , , , and . Computing, 94 (8-10): 701-730 (2012)ShAir: extensible middleware for mobile peer-to-peer resource sharing., , , and . ESEC/SIGSOFT FSE, page 687-690. ACM, (2013)How to Supercharge the Amazon T2: Observations and Suggestions., , , , , and . CLOUD, page 278-285. IEEE Computer Society, (2017)On exploiting decentralized bio-inspired self-organization algorithms to develop real systems., , and . SEAMS, page 68-75. IEEE Computer Society, (2009)Self-Aggregation Techniques for Load Balancing in Distributed Systems., , , , and . SASO, page 489-490. IEEE Computer Society, (2008)FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic., , , , , , , , and . NDSS, The Internet Society, (2020)Demo abstract: A proximity-based aerial survivor locator based on connectionless broadcast., , , , and . PerCom Workshops, page 184-186. IEEE Computer Society, (2015)