Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Contrail approach to cloud federations, , , , , , , and . Proceedings of the International Symposium on Grids and Clouds (ISGC'12), (2012)Knowledge-Based Engineering for Production Planning and Control.. COMPCON, page 430. IEEE Computer Society, (1987)Ant-Based Topology Convergence Algorithms for Resource Management in VANETs., , , and . EUROCAST, volume 4739 of Lecture Notes in Computer Science, page 992-1000. Springer, (2007)Principles and Applications of Frequency Splitting in Inductive Communications and Wireless Power Transfer Systems., and . Wireless Personal Communications, 107 (2): 987-1017 (2019)VIP: a visual approach to user authentication., , , , , and . AVI, page 316-323. ACM, (2002)Power Equations and Capacity Performance of Magnetic Induction Communication Systems., and . Wireless Personal Communications, 64 (4): 831-845 (2012)Which Entropy Coder?, , , , , and . ISSPA, page 499-500. IEEE, (1996)Hughes Aircraft's Widespread Deployment of a Continuously Improving Software Process, , , , , , , and . CMU/SEI-98-TR-006. Raytheon Systems Company, (May 1998)Using Adaptive Flashcards for Automotive Maintenance Training in the Wild., , , and . HCI (31), volume 12792 of Lecture Notes in Computer Science, page 466-480. Springer, (2021)On the Performance of Load Balancing Algorithms in Distributed Systems., and . IFIP Congress, page 175-180. North-Holland/IFIP, (1989)