Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Trusted Edge.. CoRR, (2021)Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge, , , , , , , and . International Conference on Computer Communications and Networks (ICCCN'17): Posters, IEEE, (July 2017)Noisemap: multi-tier incentive mechanisms for participative urban sensing, , , , and . Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones, page 9:1--9:5. New York, NY, USA, ACM, (2012)PDSProxy: Trusted IoT Proxies for Confidential Ad-hoc Personalization of AI Services., , , and . ICCCN, page 1-2. IEEE, (2020)Enhanced Detection of Crisis-Related Microblogs by Spatiotemporal Feedback Loops., , , and . COMPSAC (1), page 507-512. IEEE, (2019)Complex Services Offloading in Opportunistic Networks., , , , , and . Networking, page 505-513. IFIP, (2018)Data Protection in Personalized AI Services: A Decentralized Approach.. Technical University of Darmstadt, Germany, (2021)Intelligent personal guidance of human behavior utilizing anticipatory models.. UbiComp Adjunct, page 441-445. ACM, (2016)AssistantGraph: An Approach for Reusable and Composable Data-Driven Assistant Components., , and . COMPSAC (1), page 513-522. IEEE, (2019)UPA'19: 4th international workshop on ubiquitous personal assistance., , , , , , , , , and 1 other author(s). UbiComp/ISWC Adjunct, page 1099-1101. ACM, (2019)