Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Filtering Out Unfair Ratings in Bayesian Reputation Systems, , and . The Icfain Journal of Management Research, 4 (2): 48-64 (February 2005)Modeling and using imperfect context information, and . Second IEEE International Conference on Pervasive Computing and Communications. Workshop on Context Modelling and Reasoning (CoMoRea 04), page 33-37. IEEE Computer Society, (2004)A Simulation Study of Resource Addressing Methods for a Distributed Operating System., and . Angew. Inform., 31 (6): 244-254 (1989)MAC-Layer Rate Control for 802.11 Networks: Lesson Learned and Looking Forward., , , , and . CoRR, (2018)Efficient topology discovery in OpenFlow-based Software Defined Networks., , , and . Comput. Commun., (2016)Special section on human activity recognition.. Pervasive Mob. Comput., 8 (1): 67 (2012)Automating Context-aware Application Development, , and . In: UbiComp 1st International Workshop on Advanced Context Modelling, Reasoning and Management, page 90--95. (2004)Context Obfuscation for Privacy via Ontological Descriptions., , and . LoCA, volume 3479 of Lecture Notes in Computer Science, page 276-288. Springer, (2005)A performance study of hybrid protocols for opportunistic communications., , , , and . LCN Workshops, page 9-16. IEEE Computer Society, (2013)A Method to Improve Adaptability of the Minstrel MAC Rate Control Algorithm., , , and . UIC, volume 6406 of Lecture Notes in Computer Science, page 504-518. Springer, (2010)