Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining smart phone and infrastructure sensors to improve security in enterprise settings., , , , and . UbiComp (Adjunct Publication), page 1151-1158. ACM, (2013)Security through Collaboration in MANETs., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 696-714. Springer / ICST, (2008)StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's., and . VTC Spring, page 11-15. IEEE, (2007)Information retrieval on the semantic web., , and . CIKM, page 461-468. ACM, (2002)A Domain Independent Framework for Extracting Linked Semantic Data from Tables., , and . SeCO Book, volume 7538 of Lecture Notes in Computer Science, Springer, (2012)Using elastic nets for correspondence in range data., and . ICNN, page 1908-1913. IEEE, (1993)Profile Driven Data Management for Pervasive Environments., , , , and . DEXA, volume 2453 of Lecture Notes in Computer Science, page 361-370. Springer, (2002)Neighborhood-Consistent Transaction Management for Pervasive Computing Environments., , , and . DEXA, volume 2736 of Lecture Notes in Computer Science, page 276-286. Springer, (2003)A declarative approach for secure and robust routing., , , and . SafeConfig, page 45-52. ACM, (2010)On the problem of correspondence in range data and some inelastic uses for elastic nets., and . IEEE Trans. Neural Networks, 6 (3): 716-723 (1995)