Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Measurement Study of Path Capacity in 802.11b-based Wireless Networks., , , , and . WiTMeMo, USENIX Association, (2013)Why is Short-Time PM2.5 Forecast Difficult? The Effects of Sudden Events., , , and . IEEE Access, (2020)Using known vectors to improve data dissemination in opportunistic networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 17 (1): 59-69 (2014)Exploring Sequential Probability Tree for Movement-Based Community Discovery., , , , and . IEEE Trans. Knowl. Data Eng., 26 (11): 2717-2730 (2014)The design of puzzle selection strategies for GWAP systems., , and . Concurr. Comput. Pract. Exp., 22 (7): 890-908 (2010)User-centric radio power control for opportunistic mountain hiking networks., , , , , , , and . IPSN, page 396-397. ACM, (2010)Demo: Magnetic Positioning Sphere - A Single-Source 3D Positioning System using Rotating Magnetic Fields., and . MobiSys (Companion Volume), page 100. ACM, (2016)Bluetooth: carrying voice over ACL links., , , and . MWCN, page 379-383. IEEE, (2002)Wireless location tracking by a sensor-assisted particle filter and floor plans in a 2.5-D space., , , , and . WCNC, page 1-6. IEEE, (2018)An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions., , , , , and . ICC, page 2351-2356. IEEE, (2006)