Author of the publication

A microscopic look at WiFi fingerprinting for indoor mobile phone localization in diverse environments.

, , , and . IPIN, page 1-10. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A microscopic look at WiFi fingerprinting for indoor mobile phone localization in diverse environments., , , and . IPIN, page 1-10. IEEE, (2013)Poster: energy consumption impact of UHF RFID reader integration with mobile phones., , , and . MobiSys, page 399-400. ACM, (2011)ReasoNet: Inferring Network Policies Using Ontologies., , , , , , , and . NetSoft, page 159-167. IEEE, (2018)Security vulnerabilities and risks in industrial usage of wireless communication., , , , , and . ETFA, page 1-8. IEEE, (2014)Comparison of Virtual Machines and Bare Metal for CNFs at Resource-Constrained Network Edge., , and . NetSoft, page 192-196. IEEE, (2023)Baguette: Towards End-to-End Service Orchestration in Heterogeneous Networks., , , , , , , , , and 2 other author(s). IUCC-CSS, page 196-203. IEEE Computer Society, (2016)On the impact of 802.11n frame aggregation on end-to-end available bandwidth estimation., , , and . SECON, page 108-116. IEEE, (2014)Resilient NFV Technology and Solutions., , , , , , , , , and . Guide to Disaster-Resilient Communication Networks, Springer, (2020)Experimental investigation of coexistence interference on multi-radio 802.11 platforms., , and . WiOpt, page 293-298. IEEE, (2012)The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective., , , and . IEEE J. Sel. Areas Commun., 35 (11): 2586-2595 (2017)