Author of the publication

Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge

, , , , , , , and . International Conference on Computer Communications and Networks (ICCCN'17): Posters, IEEE, (July 2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PNet: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks., , , , and . MobiQuitous, page 60-69. ACM, (2019)A Methodology for Model-Driven Development of Crisis Management Applications using Solverational., , and . GI Jahrestagung, volume P-154 of LNI, page 1407-1419. GI, (2009)TrackItPipe: A Fabrication Pipeline To Incorporate Location and Rotation Tracking Into 3D Printed Objects., , , , , , and . UIST (Adjunct Volume), page 30:1-30:5. ACM, (2022)Immersive-Labeler: Immersive Annotation of Large-Scale 3D Point Clouds in Virtual Reality., , , , and . SIGGRAPH Posters, page 27:1-27:2. ACM, (2022)Tracking Criminal Events through IoT Devices and an Edge Computing Approach., , and . ICCCN, page 1-6. IEEE, (2019)On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources., , and . ICCS (2), volume 12138 of Lecture Notes in Computer Science, page 453-467. Springer, (2020)Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media., , , and . NCA, page 1-10. IEEE, (2018)Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone., , and . Networking, page 564-568. IEEE, (2020)IoT dataset generation framework for evaluating anomaly detection mechanisms., , , and . ARES, page 30:1-30:6. ACM, (2020)Understanding Stationary and Moving Direct Skin Vibrotactile Stimulation on the Palm., , , , , , , and . CoRR, (2023)