Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AWESOM: Automatic Discrete Partitioning of Indoor Spaces for WiFi Fingerprinting., and . Pervasive, volume 7319 of Lecture Notes in Computer Science, page 271-288. Springer, (2012)SerPens: a tool for semantically enriched location information on personal devices., , , and . BODYNETS, page 30. ICST, (2008)Improving pervasive positioning through three-tier cyber foraging., , , , and . PerCom Workshops, page 135-140. IEEE Computer Society, (2011)AI-Powered Multi-Device Systems and Applications., , and . PerCom Workshops, page 334. IEEE, (2019)Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication., , , , , and . PerCom, page 163-171. IEEE Computer Society, (2014)Cross-Device Radio Map Generation via Crowdsourcing., , , , , , and . IPIN, page 1-8. IEEE, (2019)Tacita: A Privacy Preserving Public Display Personalisation Service., , , and . UbiComp/ISWC Adjunct, page 448-451. ACM, (2018)Reinforcement Learning for Routing in Ad Hoc Networks.. WiOpt, page 1-8. IEEE, (2007)Context-aware Group Management in Mobile Environments, , , , , , , , , and 2 other author(s). Proceedings of the 14th IST Mobile & Wireless Communications Summit, page 1-6. Dresden, Germany, (June 2005)Ma$$ive ─ An Intelligent Shopping Assistant., , , , and . PMPC@UMAP, volume 478 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)