Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On limits of constructive interference in backscatter systems., , and . GIoTS, page 1-5. IEEE, (2017)LoRea: A Backscatter Architecture that Achieves a Long Communication Range., , , and . SenSys, page 50:1-50:2. ACM, (2017)Augmenting IoT networks with backscatter-enabled passive sensor tags., , , and . HotWireless@MobiCom, page 23-27. ACM, (2016)Topic 14: Mobile and Ubiquitous Computing., , , and . Euro-Par, volume 7484 of Lecture Notes in Computer Science, page 753. Springer, (2012)Poster: Exploring Energy Harvesting Possibilities in Embankment Dams., , , , and . EWSN, page 200-201. Junction Publishing / ACM, (2022)Poster: TheDet: A Machine Learning-based Privacy-preserving Occupancy Estimation Method., , , and . EWSN, page 208-209. Junction Publishing / ACM, (2022)Application-aware Energy Attack Mitigation in the Battery-less Internet of Things., , and . MobiWac, page 35-43. ACM, (2023)Timing Analysis of Embedded Software Updates., , , and . RTCSA, page 1-11. IEEE, (2023)Extended Abstract: Towards Physical-Layer Authentication for Backscatter Devices., , and . CyberICPS/SECPRE/ADIoT@ESORICS, volume 12501 of Lecture Notes in Computer Science, page 224-234. Springer, (2020)Ecare@Home: A Distributed Research Environment on Semantic Interoperability., , , , , , and . HealthyIoT, volume 187 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-8. (2016)