Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Object Motion Using Passive RFID: A Trauma Resuscitation Case Study., and . IEEE Trans. Instrumentation and Measurement, 62 (9): 2430-2437 (2013)Non-intrusive localization of passive RFID tagged objects in an indoor workplace., and . RFID-TA, page 181-187. IEEE, (2011)Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations., and . Comput. Networks, 54 (15): 2674-2687 (2010)Message caching for local and global resource optimization in shared virtual environments., and . VRST, page 97-102. ACM, (2000)MAC-layer proactive mixing for network coding in multi-hop wireless networks., , and . Comput. Networks, 54 (2): 196-207 (2010)Capacity compatible 2-level link state routing for ad hoc networks with mobile clusterheads., and . WCNC, page 1196-1201. IEEE, (2003)Time-Domain Mapping Based Single-Channel Speech Separation With Hierarchical Constraint Training., , and . CoRR, (2021)Leadership structures in emergency care settings: A study of two trauma centers., , , , and . Int. J. Medical Informatics, 80 (4): 227-238 (2011)Online People Tracking and Identification with RFID and Kinect., , , and . CoRR, (2017)Privacy Preserving Dynamic Room Layout Mapping., , , and . ICISP, volume 9680 of Lecture Notes in Computer Science, page 61-70. Springer, (2016)