Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments., , , , , , and . ISORC, page 141-149. IEEE Computer Society, (2014)Cooperative red teaming of a prototype surivable service-oriented system., , , , , , , and . MILCOM, page 1-6. IEEE, (2012)Early Results on Hydra: A Flexible MAC/PHY Multihop Testbed., , , , , , , and . VTC Spring, page 1896-1900. IEEE, (2007)Safe configuration of TLS connections., , , , , and . CNS, page 415-422. IEEE, (2013)An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems., , , , , , , , , and . INFOCOM, page 2313-2321. IEEE, (2009)Are Firms Superior to Alliances and Markets? An Empirical Test of Cross-Border Knowledge Building., , and . Organ. Sci., 13 (2): 147-161 (2002)Eusebius as church historian. Oxford, (1980)bibtex: Grant1980.Early Christianity and Society. San Francisco, (1977)Image and video noise - a comparison of noise in images and video with regards to detection and removal., , and . VISAPP (1), page 153-156. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2007)Limitations of Linear and Semidefinite Programs.. University of California, Berkeley, USA, (2010)base-search.net (ftcdlib:qt8x80d8f2).