Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols., , , , and . MobiCom, page 85-97. ACM, (1998)It's About Time: Incorporating Temporality in Retrieval Augmented Language Models., and . CoRR, (2024)AMI threats, intrusion detection requirements and deployment recommendations., , , , , , and . SmartGridComm, page 395-400. IEEE, (2012)Routing characteristics of ad hoc networks with unidirectional links., and . Ad Hoc Networks, 4 (3): 303-325 (2006)HealthLies: Dataset and Machine Learning Models for Detecting Fake Health News., and . BigDataService, page 1-8. IEEE, (2022)Model selection criteria for short-term microgrid-scale electricity load forecasts., , and . ISGT, page 1-6. IEEE, (2013)The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks., , , and . IEEE J. Sel. Areas Commun., 17 (8): 1439-1453 (1999)Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks., and . MobiHoc, page 33-44. ACM, (2001)A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures., , , , , , and . IEEE Trans. Smart Grid, 5 (2): 906-915 (2014)SMARTREC: A Conversational Recommendation System Using Semantic Knowledge Graphs., and . BigDataService, page 53-60. IEEE, (2022)