Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On limits of constructive interference in backscatter systems., , and . GIoTS, page 1-5. IEEE, (2017)Zooming into radio events by bus snooping., and . SIGBED Review, 9 (3): 21-23 (2012)Augmenting IoT networks with backscatter-enabled passive sensor tags., , , and . HotWireless@MobiCom, page 23-27. ACM, (2016)Arpeggio: A Penetration Attack on Glossy Networks., , and . SECON, page 1-9. IEEE, (2016)LoRea: A Backscatter Architecture that Achieves a Long Communication Range., , , and . SenSys, page 50:1-50:2. ACM, (2017)Topic 14: Mobile and Ubiquitous Computing., , , and . Euro-Par, volume 7484 of Lecture Notes in Computer Science, page 753. Springer, (2012)Sensor-based breakage detection for electric fences., , , , , , and . SAS, page 1-4. IEEE, (2015)Understanding Link Dynamics in Wireless Sensor Networks with Dynamically Steerable Directional Antennas., , and . EWSN, volume 7772 of Lecture Notes in Computer Science, page 115-130. Springer, (2013)Poster Abstract: BouKey: Location-Based Key Sharing Using Visible Light Communication., , , , and . IPSN, page 38:1-38:2. IEEE, (2016)Cross-level Simulation in COOJA, , , , and . European Conference on Wireless Sensor Networks (EWSN), Poster/Demo session, Delft, The Netherlands, (January 2007)