Author of the publication

Secure Location Verification with Hidden and Mobile Base Stations

, , , and . IEEE Transactions on Mobile Computing, 7 (4): 470--483 (April 2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Sensor Networks in the Energy-Latency-Density Space, , , and . IEEE Transactions on Mobile Computing, 1 (1): 70--80 (2002)TinyOdom: Hardware-Aware Efficient Neural Inertial Navigation., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 71:1-71:32 (2022)PASA: A Software Architecture for Building Power Aware Embedded Systems, , and . In Proceedings of the IEEE CAS Workshop on Wireless Communication and Networking, (2002)A Case for Opportunistic Embedded Sensing In Presence of Hardware Power Variability, , , , and . Proceedings of the 2010 International Conference on Power aware computing and systems, page 1--8. (October 2010)Headar: Sensing Head Gestures for Confirmation Dialogs on Smartwatches with Wearable Millimeter-Wave Radar., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 7 (3): 138:1-138:28 (September 2023)Auritus: An Open-Source Optimization Toolkit for Training and Development of Human Movement Models and Filters Using Earables., , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 70:1-70:34 (2022)Human-machine collaboration in intelligence analysis: An expert evaluation., , , , , , and . Intell. Syst. Appl., (2023)Penetrative AI: Making LLMs Comprehend the Physical World., , , and . CoRR, (2023)Penetrative AI: Making LLMs Comprehend the Physical World., , , , and . HotMobile, page 1-7. ACM, (2024)In Sensors We Trust - A Realistic Possibility?. DCOSS, page 1. IEEE Computer Society, (2014)