Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wireless sensor networks for intrusion detection: packet traffic modeling., , , and . IEEE Communications Letters, 10 (1): 22-24 (2006)Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks., , , and . ISCIS, volume 3280 of Lecture Notes in Computer Science, page 363-372. Springer, (2004)WCOT: A Realistic Lifetime Metric for the Performance Evaluation of Wireless Sensor Networks., and . PIMRC, page 1-5. IEEE, (2007)Design and implementation of a QoS-aware MAC protocol for Wireless Multimedia Sensor Networks., , and . Comput. Commun., 34 (16): 1991-2001 (2011)How Laboratory Experiments Can Be Exploited for Monitoring Stress in the Wild: A Bridge Between Laboratory and Daily Life., , , , , and . Sensors, 20 (3): 838 (2020)Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours., , , and . Comput. Networks, 54 (3): 428-441 (2010)Sleep quality monitoring with ambient and mobile sensing., , and . SIU, page 507-510. IEEE, (2015)Long Short-Term Network Based Unobtrusive Perceived Workload Monitoring with Consumer Grade Smartwatches in the Wild., , and . CoRR, (2019)On the retrial and redial phenomena in GSM networks., , , and . WCNC, page 885-889. IEEE, (2000)RFID based indoor location determination for elderly tracking., and . SIU, page 1-4. IEEE, (2012)