Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-Time Orbital Image Analysis Using Decision Forests, with a Deployment Onboard the IPEX Spacecraft., , , , , and . J. Field Robotics, 33 (2): 187-204 (2016)Onboard Autonomy on the Intelligent Payload Experiment CubeSat Mission., , , , , , , , , and 1 other author(s). J. Aerosp. Inf. Syst., 14 (6): 307-315 (2017)Autonomy for remote sensing - Experiences from the IPEX CubeSat., , , , , , , and . IGARSS, page 5308-5311. IEEE, (2015)Jigsaw: solving the puzzle of enterprise 802.11 analysis., , , , , and . SIGCOMM, page 39-50. ACM, (2006)Mixed Approaches to CS0: Exploring Topic and Pedagogy Variance after Six Years of CS0., , , , , , , , and . SIGCSE, page 20-25. ACM, (2018)Onboard machine learning classification of images by a cubesat in Earth orbit., , , , , , and . AI Matters, 1 (4): 38-40 (2015)Measuring packet reordering., and . Internet Measurement Workshop, page 97-105. ACM, (2002)802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions., and . USENIX Security Symposium, USENIX Association, (2003)