Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting heterogeneity in sensor networks., , , , , and . INFOCOM, page 878-890. IEEE, (2005)Experiences with context management in emergency medicine., , , , , , , , , and 3 other author(s). ACM Trans. Embed. Comput. Syst., 12 (4): 100:1-100:22 (2013)Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea., , , , , , , and . SenSys, page 64-75. ACM, (2005)Exploiting Heterogeneity for Sensor Network Security., , and . SECON, page 591-593. IEEE, (2008)Edge Processing and Enterprise Integration: Closing the Gap on Deployable Industrial Sensor Networks., , , , , , , and . SECON, page 620-630. IEEE, (2007)Experimental Evaluation of Topology Control and Synchronization for In-Building Sensor Network Applications., , , and . Mob. Networks Appl., 10 (4): 545-562 (2005)Experimental evaluation of synchronization and topology control for in-building sensor network applications., , , and . Wireless Sensor Networks and Applications, page 38-49. ACM, (2003)Guaranteed on-demand discovery of node-disjoint paths in ad hoc networks., , , and . Comput. Commun., 30 (14-15): 2917-2930 (2007)Real-World Experiences with an Interactive Ad Hoc Sensor Network., , , , , and . ICPP Workshops, page 143-151. IEEE Computer Society, (2002)Intel mote 2: an advanced platform for demanding sensor network applications., , , , , , , and . SenSys, page 298. ACM, (2005)