Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting Private Data on Mobile Systems based on Spatio-temporal Analysis., , , and . PECCS, page 114-123. SciTePress, (2011)Modelling the Information Space in Physical Storage at Different Levels of Detail.. Comput. J., 20 (3): 248-256 (1977)Efficient location aware intrusion detection to protect mobile devices., , , , and . Personal and Ubiquitous Computing, 18 (1): 143-162 (2014)Bypassing holes in sensor networks: Load-balance vs. latency., , , , , and . Ad Hoc Networks, (2017)Storage Mappings for Multidimensional Linear Dynamic Hashing., and . PODS, page 90-105. ACM, (1983)Efficient data reduction with EASE., , , , and . KDD, page 59-68. ACM, (2003)A Recovery Scheme for Multidatabase Systems., and . CIKM, page 665-673. ACM, (1993)Range queries for mobile objects in wireless sensor networks., , and . GIS, page 504-507. ACM, (2009)Adaptive and Context-Aware Reconciliation of Reactive and Pro-active Behavior in Evolving Systems., and . Active Conceptual Modeling of Learning, volume 4512 of Lecture Notes in Computer Science, page 30-46. Springer, (2006)Role-based Query Processing in Multidatabase Systems., and . EDBT, volume 779 of Lecture Notes in Computer Science, page 95-108. Springer, (1994)