Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decentralized cooperative management: a bottom-up approach., , , and . IADIS AC, page 401-408. IADIS, (2005)DAVIM: Adaptable Middleware for Sensor Networks, , , and . IEEE Distributed Systems Online, 9 (1): 1 (2008)Users as reconfigurable elements in distributed sensing applications., , , and . MidSens, page 4. ACM, (2012)An AOP Case with Static and Dynamic Aspects., , , , , , , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 428-430. Springer, (1998)Design of a Robust MAC Protocol for LoRa., , , , , and . ACM Trans. Internet Things, 4 (1): 3:1-3:25 (February 2023)Symbol-Synchronous Buses: Deterministic, Low-Latency Wireless Mesh Networking with LEDs., , , and . Commun. ACM, 66 (4): 93-101 (2023)Trusted Operations on Sensor Data., , , and . Sensors, 18 (5): 1364 (2018)Gestational weight gain prediction using privacy preserving federated learning., , , , , , , , , and . EMBC, page 2170-2174. IEEE, (2021)CLF-AIAD: A Contrastive Learning Framework for Acoustic Industrial Anomaly Detection., , , , , , , and . ICONIP (7), volume 1961 of Communications in Computer and Information Science, page 125-137. Springer, (2023)Trusted Operations On Mobile Phones., , , and . MobiQuitous, page 452-459. ACM, (2017)