Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic cluster scheduling for cluster-tree WSNs., , and . ISORC, page 1-8. IEEE Computer Society, (2013)FLASH: Video-Embeddable AR Anchors for Live Events., , , and . ISMAR, page 489-497. IEEE, (2021)Hybrid Conference Experiences in the ARENA., , , , , and . ISMAR Adjunct, page 449-450. IEEE, (2021)Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online?, and . Telematics Informatics, (2021)Building a Microscope for the Data Center., , and . WASA, volume 7405 of Lecture Notes in Computer Science, page 619-630. Springer, (2012)Cascode amplifiers with low-gain variability using body-biasing temperature and supply compensation., , , and . MIXDES, page 209-212. IEEE, (2013)Security Risk Analysis of LoRaWAN and Future Directions., , and . Future Internet, 11 (1): 3 (2019)Designing a Solver for Arithmetic Constraints to Support Education in Mathematics., , and . AIAI, volume 204 of IFIP, page 433-441. Springer, (2006)A two-step radio receiver architecture fully embedded into a charge-sharing SAR ADC., , and . ISCAS, page 1-4. IEEE, (2017)Security vulnerabilities and risks in industrial usage of wireless communication., , , , , and . ETFA, page 1-8. IEEE, (2014)