Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accuracy characterization of cell tower localization., , , , and . UbiComp, page 223-226. ACM, (2010)ProxiMate: proximity-based secure pairing using ambient wireless signals., , , , and . MobiSys, page 211-224. ACM, (2011)Human mobility characterization from cellular network data., , , , , , , , , and . Commun. ACM, 56 (1): 74-82 (2013)Route classification using cellular handoff patterns., , , , , , and . UbiComp, page 123-132. ACM, (2011)Security versus energy tradeoffs in host-based mobile malware detection., , , , and . MobiSys, page 225-238. ACM, (2011)Human Mobility Modeling at Metropolitan Scales, , , , , , and . Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, page 239--252. New York, NY, USA, ACM, (2012)Managing cellular congestion using incentives., , , , , , , and . IEEE Communications Magazine, 50 (11): 100-107 (2012)A tale of two cities., , , , , and . HotMobile, page 19-24. ACM, (2010)The N-end rule. Cell, (1992)Trends in Russian research output in post-Soviet era., , , , and . Scientometrics, 79 (2): 249-260 (2009)