Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical study of real audio traffic, and . (March 2000)Vehicular Communication, , , , , , , , , and 1 other author(s). Pervasive Computing, 5 (4): 55-62 (2006)Embedding the Internet, , and . Communications of the ACM, 43 (5): 39--41 (May 2000)(special issue guest editors).Underwater Sensor Networking: Research Challenges and Potential Applications, , , , and . Proceedings of IEEE WCNC'06, page 228--235. Las Vegas, Nevad, USA, (April 2006)Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks, , and . ISI-TR-567. USC Information Sciences Institute, (January 2003)Medium Access Control in Wireless Sensor Networks, and . Wireless Sensor Networks, Kluwer Academic Publishers, Technical Report, ISI-TR-580, USC Information Sciences Institute.(2005)Census and survey of the visible internet, , , , , and . Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, page 169--182. ACM, (2008)Location-Aware Scheduling with Minimal Infrastructure., and . USENIX Annual Technical Conference, General Track, page 131-138. USENIX, (2000)Embedded Sensor Networks., and . Handbook of Networked and Embedded Control Systems, Birkhäuser, (2005)Hacking Is Pervasive., , and . IEEE Pervasive Computing, 7 (3): 13-15 (2008)