Author of the publication

Lessons Learned from Bluetooth/Wifi Scanning Deployment in University Campus

, , and . Department of Computer Science, University of Illinois, (June 2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure data collection in constrained tree-based Smart Grid environments., , , and . SmartGridComm, page 308-313. IEEE, (2014)iDSRT: Integrated Dynamic Soft Real-Time Architecture for Critical Infrastructure Data Delivery over WLAN., , and . QSHINE, volume 22 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 185-202. Springer, (2009)ISAAC: Intelligent synchrophasor data real-time compression framework for WAMS., , and . SmartGridComm, page 430-436. IEEE, (2017)Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks., , and . MobiQuitous, ICST / ACM, (2008)Sangam - efficient cellular-WiFi group framework for file sharing service., , and . MILCOM, page 1-6. IEEE, (2012)Measurement of a large-scale overlay for multimedia streaming., , , and . HPDC, page 241-242. ACM, (2007)A Rural Lens on a Research Agenda for Intelligent Infrastructure., , , and . CoRR, (2017)Feedback consolidation and timeout algorithms for point-to-multipoint ABR service., and . ICC, page 135-139. IEEE, (1999)Identity, location, disease and more: inferring your secrets from android public resources., , , , , , , and . ACM Conference on Computer and Communications Security, page 1017-1028. ACM, (2013)Safety, Security, and Privacy Threats Posed by Accelerating Trends in the Internet of Things., , , , , , , and . CoRR, (2020)