Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deriving State Machines from TinyOS Programs Using Symbolic Execution., , and . IPSN, page 271-282. IEEE Computer Society, (2008)On Reciprocal Altruism and Its Application to QoS., , and . MMNS, volume 2839 of Lecture Notes in Computer Science, page 196-208. Springer, (2003)HERMES: A Software Architecture for Visibility and Control in Wireless Sensor Network Deployments., , , , and . IPSN, page 395-406. IEEE Computer Society, (2008)Declarative failure recovery for sensor networks., , , and . AOSD, volume 208 of ACM International Conference Proceeding Series, page 173-184. ACM, (2007)Monitoring Civil Structures with a Wireless Sensor Network., , , , , , , , and . IEEE Internet Comput., 10 (2): 26-34 (2006)Finding protocol manipulation attacks., , , , and . SIGCOMM, page 26-37. ACM, (2011)Analyzing Protocol Implementations for Interoperability., , , , , and . NSDI, page 485-498. USENIX Association, (2015)Reliable and efficient programming abstractions for wireless sensor networks., , , and . PLDI, page 200-210. ACM, (2007)Embedded Sensing of Structures: A Reality Check., , , , , and . RTCSA, page 95-101. IEEE Computer Society, (2005)