Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting heterogeneity in sensor networks., , , , , and . INFOCOM, page 878-890. IEEE, (2005)Experiences with context management in emergency medicine., , , , , , , , , and 3 other author(s). ACM Trans. Embed. Comput. Syst., 12 (4): 100:1-100:22 (2013)Design and deployment of industrial sensor networks: experiences from a semiconductor plant and the north sea., , , , , , , and . SenSys, page 64-75. ACM, (2005)Exploiting Heterogeneity for Sensor Network Security., , and . SECON, page 591-593. IEEE, (2008)Experimental Evaluation of Topology Control and Synchronization for In-Building Sensor Network Applications., , , and . Mob. Networks Appl., 10 (4): 545-562 (2005)Edge Processing and Enterprise Integration: Closing the Gap on Deployable Industrial Sensor Networks., , , , , , , and . SECON, page 620-630. IEEE, (2007)Experimental evaluation of synchronization and topology control for in-building sensor network applications., , , and . Wireless Sensor Networks and Applications, page 38-49. ACM, (2003)Guaranteed on-demand discovery of node-disjoint paths in ad hoc networks., , , and . Comput. Commun., 30 (14-15): 2917-2930 (2007)Real-World Experiences with an Interactive Ad Hoc Sensor Network., , , , , and . ICPP Workshops, page 143-151. IEEE Computer Society, (2002)Ad hoc networks: Special issue on energy efficient design in wireless ad hoc and sensor networks., and . Ad Hoc Networks, 6 (8): 1183-1184 (2008)