Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robotics-Based Location Sensing Using Wireless Ethernet., , , , and . Wireless Networks, 11 (1-2): 189-204 (2005)Hack-a-Vote: Security Issues with Electronic Voting Systems., , , , and . IEEE Secur. Priv., 2 (1): 32-37 (2004)Using wireless Ethernet for localization., , , , , and . IROS, page 402-408. IEEE, (2002)Robotics-Based Location Sensing using Wireless Ethernet, , , , , and . Eighth ACM International Conference on Mobile Computing and Networking (MOBICOM 2002), Atlanta, Georgia, ACM, (September 2002)Enforcing Java Run-Time Properties Using Bytecode Rewriting., and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 185-200. Springer, (2002)Garbage Collector Memory Accounting in Language-Based Systems., , and . S&P, page 263-274. IEEE Computer Society, (2003)Transactional Rollback for Language-Based Systems., and . DSN, page 439-448. IEEE Computer Society, (2002)Practical robust localization over large-scale 802.11 wireless networks., , , , , and . MobiCom, page 70-84. ACM, (2004)Termination in language-based systems., and . ACM Trans. Inf. Syst. Secur., 5 (2): 138-168 (2002)Wireless LAN location-sensing for security applications., , , and . Workshop on Wireless Security, page 11-20. ACM, (2003)