Author of the publication

Dustminer: troubleshooting interactive complexity bugs in sensor networks.

, , , , and . SenSys, page 99-112. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Initial Trustworthiness Perceptions of a Drone System based on Performance and Process Information., , , , , and . HAI, page 229-237. ACM, (2018)The Effects of Risk and Role on Users' Anticipated Emotions in Safety-Critical Systems., , , , and . HCI (6), volume 10906 of Lecture Notes in Computer Science, page 369-388. Springer, (2018)A study of users' experiences and beliefs about software update messages., , and . Comput. Hum. Behav., (2015)Dustminer: troubleshooting interactive complexity bugs in sensor networks., , , , and . SenSys, page 99-112. ACM, (2008)Performance analysis of a fault-tolerant exact motif mining algorithm on the cloud., and . IPCCC, page 1-9. IEEE Computer Society, (2013)Performance Prediction for Apache Spark Platform., and . HPCC/CSS/ICESS, page 166-173. IEEE, (2015)Exposing Complex Bug-Triggering Conditions in Distributed Systems via Graph Mining., , , , and . ICPP, page 186-195. IEEE Computer Society, (2011)PRONET: Network trust assessment based on incomplete provenance., , , , , , , , and . MILCOM, page 1213-1218. IEEE, (2011)Towards Diagnostic Simulation in Sensor Networks., , and . DCOSS, volume 5067 of Lecture Notes in Computer Science, page 252-265. Springer, (2008)Who Would Bob Blame? Factors in Blame Attribution in Cyberattacks Among the Non-Adopting Population in the Context of 2FA., , , , , and . COMPSAC, page 778-789. IEEE, (2020)