Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding fraudulence in online qualitative studies: From the researcher's perspective., , , , , , , , and . CHI, page 824:1-824:17. ACM, (2024)Forms of Fraudulence in Human-Centered Design: Collective Strategies and Future Agenda for Qualitative HCI Research., , , , , , , and . CHI Extended Abstracts, page 469:1-469:5. ACM, (2024)Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks., and . ACM DEV, page 33:1-33:4. ACM, (2016)Poster: Power Attack in Body Area Networks: Dream or Reality?, and . MobiSys (Companion Volume), page 66. ACM, (2016)Channel Assignment Techniques for Multi-Radio Wireless Mesh Networks: A Survey., , , and . IEEE Commun. Surv. Tutorials, 18 (2): 988-1017 (2016)HEliOS: huffman coding based lightweight encryption scheme for data transmission., , , , and . MobiQuitous, page 70-79. ACM, (2019)Pro-AODV (Proactive AODV): Simple modifications to AODV for proactively minimizing congestion in VANETs., , and . NSysS, page 1-6. IEEE, (2015)Older Adults' Experiences of Autonomy During COVID-19 Pandemic., , and . CHI Extended Abstracts, page 250:1-250:6. ACM, (2021)"I hope I never need one": Unpacking Stigma in Aging in Place Technology., , and . CHI, page 264:1-264:12. ACM, (2022)Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs)., , , , and . NSysS, page 152-157. IEEE, (2018)