Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Case for VM-Based Cloudlets in Mobile Computing., , , and . IEEE Pervasive Computing, 8 (4): 14-23 (2009)Statistical inference of internal network loss and topology., , , , and . SIGMETRICS Perform. Evaluation Rev., 27 (3): 5-6 (1999)Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments., and . Mobidata, volume 353 of The Kluwer International Series in Engineering and Computer Science, page 207-228. Kluwer / Springer, (1994)Trustworthy and personalized computing on public kiosks., , , , , and . MobiSys, page 199-210. ACM, (2008)Impromptu Measurement Infrastructures using RTP., , and . INFOCOM, page 1490-1499. IEEE Computer Society, (2002)The use of end-to-end multicast measurements for characterizing internal network behavior., , , , , , , , , and . IEEE Commun. Mag., 38 (5): 152-159 (2000)TVDc: managing security in the trusted virtual datacenter., , , , , , , and . ACM SIGOPS Oper. Syst. Rev., 42 (1): 40-47 (2008)Reincarnating PCs with portable SoulPads., , , and . MobiSys, page 65-78. ACM, (2005)Deriving Long-Term Value from Context-Aware Computing., , , , , and . IS Management, 22 (4): 32-42 (2005)Bar Codes Everywhere You Look., and . IEEE Pervasive Comput., 9 (2): 4-5 (2010)