Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment., , and . EUNICE, volume 7479 of Lecture Notes in Computer Science, page 41-51. Springer, (2012)YouQoS - A New Concept for Quality of Service in DSL Based Access Networks., , and . EUNICE, volume 8846 of Lecture Notes in Computer Science, page 109-120. Springer, (2014)Provisioning and operation of virtual networks, , , , , , , , , and 1 other author(s). Electronic Communications of the EASST, (2011)Softwarized Adaptive Control of Network Monitoring Systems., and . NetSys, page 1-6. IEEE, (2019)To Classify is to Interpret: Building Taxonomies from Heterogeneous Data through Human-AI Collaboration., and . MuC, page 395-401. ACM, (2023)Enhancing Location Recommendation Through Proximity Indicators, Areal Descriptors, and Similarity Clusters.. LBS, page 273-291. (2016)Towards patient-individual blood flow simulations based on PC-MRI measurements., , , , , and . GI-Jahrestagung, volume P-192 of LNI, page 447. GI, (2011)A comparison of location search UI patterns on mobile devices., , and . Mobile HCI, page 465-470. ACM, (2014)The Micro Smart Grid Tabletop - A Real World Case Study for Tangible Multitouch Technologies for Communicating Complex Concepts.. TacTT@ITS, volume 1324 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)COntrol and Management of COexisting Networks (COMCON), , , , , , , , , and 2 other author(s). (March 2011)