Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Data-Driven Examination of Hotelling's Linear City Model., and . WebSci, page 165-169. ACM, (2019)Decoupling trust and wireless channel induced effects on collaborative sensing attacks., , , , , and . DySPAN, page 224-235. IEEE, (2014)DeepHoops: Evaluating Micro-Actions in Basketball Using Deep Feature Representations of Spatio-Temporal Data., , and . KDD, page 2096-2104. ACM, (2019)Collaborative assessment of information provider's reliability and expertise using subjective logic., , and . CollaborateCom, page 352-361. ICST / IEEE, (2011)Reports of the Workshops Held at the 2016 International AAAI Conference on Web and Social Media., , , , , , , , , and 1 other author(s). AI Mag., 37 (4): 89-93 (2016)Security and Performance Considerations in Wireless Networks.. University of California, Riverside, USA, (2010)Modeling and simulation of wireless link quality (ETT) through principal component analysis of trace data., , , and . PE-WASUN, page 89-96. ACM, (2011)Detecting Route Attraction Attacks in Wireless Networks., , , , , and . MASS, page 371-380. IEEE Computer Society, (2011)A simple conceptual generator for the Internet graph., , , and . LANMAN, page 1-6. IEEE, (2010)Quantifying the Overhead Due to Routing Probes in Multi-Rate WMNs., , , , and . WCNC, page 1-6. IEEE, (2010)