Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A microscopic look at WiFi fingerprinting for indoor mobile phone localization in diverse environments., , , and . IPIN, page 1-10. IEEE, (2013)ReasoNet: Inferring Network Policies Using Ontologies., , , , , , , and . NetSoft, page 159-167. IEEE, (2018)Security vulnerabilities and risks in industrial usage of wireless communication., , , , , and . ETFA, page 1-8. IEEE, (2014)Poster: energy consumption impact of UHF RFID reader integration with mobile phones., , , and . MobiSys, page 399-400. ACM, (2011)The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective., , , and . IEEE J. Sel. Areas Commun., 35 (11): 2586-2595 (2017)Characterization of 802.11n wireless LAN performance via testbed measurements and statistical analysis., , and . SECON, page 158-166. IEEE, (2013)Comparison of Virtual Machines and Bare Metal for CNFs at Resource-Constrained Network Edge., , and . NetSoft, page 192-196. IEEE, (2023)Baguette: Towards End-to-End Service Orchestration in Heterogeneous Networks., , , , , , , , , and 2 other author(s). IUCC-CSS, page 196-203. IEEE Computer Society, (2016)On the impact of 802.11n frame aggregation on end-to-end available bandwidth estimation., , , and . SECON, page 108-116. IEEE, (2014)Experimental investigation of coexistence interference on multi-radio 802.11 platforms., , and . WiOpt, page 293-298. IEEE, (2012)