Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twitter in disaster mode: opportunistic communication and distribution of sensor data in emergencies., , , , and . ExtremeCom, page 1:1-1:6. ACM, (2011)SIMPS: Using Sociology for Personal Mobility, , , and . CoRR, (2006)Twitter in disaster mode: security architecture., , , , , and . SWID@CoNEXT, page 7:1-7:8. ACM, (2011)Modeling Mobility with Behavioral Rules: The Case of Incident and Emergency Situations., , , and . AINTEC, volume 4311 of Lecture Notes in Computer Science, page 186-205. Springer, (2006)Context-Aware Inter-Networking for Wireless Networks., , and . MWCN, volume 162 of IFIP, page 383-394. Kluwer/Springer, (2004)30 years of ad hoc networking research: what about humanitarian and disaster relief solutions? what are we still missing?. ACWR, page 217. ACM, (2011)Putting contacts into context: mobility modeling beyond inter-contact times., , and . MobiHoc, page 18. ACM, (2011)Collection and analysis of multi-dimensional network data for opportunistic networking research., , , and . Comput. Commun., 35 (13): 1613-1625 (2012)Are smartphones suited for DTN networking? A methodological teardown of smartphones' WiFi performance., and . WiOpt, page 90-95. IEEE, (2015)Investigation of a GNN approach to mitigate congestion in a realistic MANET scenario., , , , and . ICMCIS, volume 205 of Procedia Computer Science, page 127-136. Elsevier, (2022)