Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices., , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 85:1-85:23 (2019)QUEST ON BEXUS 27, , , , , , , , , and 7 other author(s). 24th ESA Symposium on European Rocket & Balloon Programmes and Related, (October 2019)Reallocation strategies for user processing tasks in future cloud-RAN architectures., and . PIMRC, page 1-6. IEEE, (2016)Diversity in locked and unlocked mobile device usage., , , , and . UbiComp Adjunct, page 379-384. ACM, (2014)Processing of Flow Accounting Data in Java: Framework Design and Performance Evaluation., and . EUNICE, volume 6164 of Lecture Notes in Computer Science, page 177-187. Springer, (2010)Delay improved Media Access Control for Passive Optical Networks.. ICC, page 1012-1018. IEEE, (2015)Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage, , , and . Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, page 105-114. New York, NY, USA, Association for Computing Machinery (ACM), (2014)Energy-aware decision support models in production environments: A systematic literature review., , , , , , and . Comput. Ind. Eng., (2021)Task assignment strategies for pools of baseband computation units in 4G cellular networks., , , and . ICC Workshops, page 2714-2720. IEEE, (2015)Politik - Selbstverständnis - Selbstdarstellung. volume 26. Stuttgart, (2006)