Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurement-based modeling of packet inter-reception time in presence of radio channel congestion., , and . SECON, page 432-440. IEEE, (2014)Evaluating multi-hop beaconing forwarding strategies for IEEE 802.11p vehicular networks., , and . VNC, page 31-38. IEEE, (2013)FPF-SB : A Scalable Algorithm for Microarray Gene Expression Data Clustering., , , , and . HCI (12), volume 4561 of Lecture Notes in Computer Science, page 606-615. Springer, (2007)Detecting fuzzy amino acid tandem repeats in protein sequences., , and . BCB, page 87-95. ACM, (2011)Quantifying the Tradeoff Between Cybersecurity and Location Privacy., , and . CoRR, (2021)IT in Biology & Medical Informatics: On the Challenge of Understanding the Data Ecosystem., , , and . ITBAM, volume 10443 of Lecture Notes in Computer Science, page 3-7. Springer, (2017)Web metasearch: rank vs. score based rank aggregation methods, and . SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, page 841--846. New York, NY, USA, ACM Press, (2003)MeshChord: A Location-Aware, Cross-Layer Specialization of Chord for Wireless Mesh Networks (concise contribution)., , , and . PerCom, page 206-212. IEEE Computer Society, (2008)The robustness of content-based search in hierarchical peer to peer networks., and . CIKM, page 562-570. ACM, (2004)A measurement-based study of beaconing performance in IEEE 802.11p vehicular networks., , , and . INFOCOM, page 1503-1511. IEEE, (2012)