Author of the publication

TESTVAL, a tool for protocol test validation and the validation of a LAPB test suite as an example.

, , and . Comput. Commun., 19 (9-10): 804-812 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb 1.2V 3.2Gb/s/pin DDR4 SDRAM with improved power distribution and repair strategy., , , , , , , , , and 15 other author(s). ISSCC, page 212-214. IEEE, (2018)The Kirsch-Laplacian edge detection algorithm for predicting iris-based desease., , and . CSCWD, page 551-555. IEEE, (2017)Long-Range Beacons on Sea Surface Based 3D-Localization for Underwater Sensor Networks., , , and . MSN, page 102-107. IEEE Computer Society, (2009)Lite-IDE Based Hierarchical Node Authentication Protocol for Energy Efficient in WSN., and . CIS, page 644-647. IEEE Computer Society, (2013)Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor Networks., , , and . EUC, page 311-315. IEEE Computer Society, (2010)Path Planning of a Mobile Beacon for Localization in Underwater Sensor Networks., , and . EUC, page 424-427. IEEE Computer Society, (2011)Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities., , , and . IEEE Symposium on Security and Privacy, page 19-33. IEEE Computer Society, (2014)CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks., , and . ACM Conference on Computer and Communications Security, page 793-804. ACM, (2015)A batch rekeying time decision algorithm for IPTV systems., and . CCNC, page 901-905. IEEE, (2011)Localization with a mobile beacon based on geometric constraints in wireless sensor networks., , , and . IEEE Trans. Wirel. Commun., 8 (12): 5801-5805 (2009)