Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Middle-mile Network Optimization in Rural Wireless Meshes., and . WoWMoM, page 224-233. IEEE, (2020)Reliable bursty convergecast in wireless sensor networks., , , and . MobiHoc, page 266-276. ACM, (2005)A Wireless Security Framework without Shared Secrets., and . SSS, volume 5873 of Lecture Notes in Computer Science, page 609-623. Springer, (2009)DESAL alpha: An Implementation of the Dynamic Embedded Sensor-Actuator Language., , , , , , , , and . ICCCN, page 541-547. IEEE, (2008)On the Security and Vulnerability of PING., , and . WSS, volume 2194 of Lecture Notes in Computer Science, page 124-135. Springer, (2001)Unifying stabilization and termination in message-passing systems., and . Distributed Comput., 17 (3): 279-290 (2005)Kansei: A High-Fidelity Sensing Testbed., , , , and . IEEE Internet Comput., 10 (2): 35-47 (2006)EdgeL^3: Compressing L^3-Net for Mote Scale Urban Noise Monitoring., , , , and . IPDPS Workshops, page 877-884. IEEE, (2019)Keynote: Primitives for Physical Trust.. SSS, volume 5340 of Lecture Notes in Computer Science, page 1. Springer, (2008)A Pursuer-Evader Game for Sensor Networks., , and . Self-Stabilizing Systems, volume 2704 of Lecture Notes in Computer Science, page 1-16. Springer, (2003)