Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CenWits: a sensor-based loosely coupled search and rescue system using witnesses., , and . SenSys, page 180-191. ACM, (2005)Experiences from deploying a heart rate monitoring system in a senior center., , , , and . ICTC, page 383-388. IEEE, (2013)Using known vectors to improve data dissemination in opportunistic networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 17 (1): 59-69 (2014)User-centric radio power control for opportunistic mountain hiking networks., , , , , , , and . IPSN, page 396-397. ACM, (2010)Support for Security and Privacy in SenSearch., , and . IPCCC, page 456-461. IEEE Computer Society, (2008)Support for Mobility and Fault Tolerance in Mykil., and . DSN, page 537-. IEEE Computer Society, (2004)Toward Hypertension Prediction Based on PPG-Derived HRV Signals: a Feasibility Study., , , and . J. Medical Systems, 42 (6): 103:1-103:7 (2018)Fine-grained time synchronization for mission-critical DTSNs., , , , , , , , and . INSS, page 1-2. IEEE, (2012)Design and deployment of a heart rate monitoring system in a senior center., , , and . SECON, page 71-75. IEEE, (2013)Improving Opportunistic Data Dissemination via Known Vector., , , , and . AINA Workshops, page 838-843. IEEE Computer Society, (2009)