Author of the publication

Controlled Disclosure of Context Information across Ubiquitous Computing Domains.

, , , , and . SUTC, page 98-105. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experience-based network resource usage on mobile hosts., , and . CoNEXT, page 46. ACM, (2006)Analysis of Mobility and Sharing of WSNs By IP Applications., , and . IJDSN, (2012)Ubiquitous Attentiveness - Enabling Context-Aware Mobile Applications and Services., , , , and . EUSAI, volume 2875 of Lecture Notes in Computer Science, page 76-87. Springer, (2003)Fast authentication methods for handovers between IEEE 802.11 wireless LANs., , , , , and . WMASH, page 51-60. ACM, (2004)I-Candies: Supporting Semi-formal Communication in a Coffee Corner., , , and . INTERACT (2), volume 4663 of Lecture Notes in Computer Science, page 641-644. Springer, (2007)Communication Context for Adaptive Mobile Applications., , and . PerCom Workshops, page 173-177. IEEE Computer Society, (2005)Tools for Algebraic Distributed System Design.. AMAST, page 434-442. Springer, (1991)An Extensible Network Resource Abstraction for Applications on Mobile Devices., , and . COMSWARE, IEEE, (2007)Trust Model for High Quality Recommendation., , and . SECRYPT, page 518-528. INSTICC Press, (2008)Predicting mobility events on personal devices., , and . Pervasive Mob. Comput., 6 (4): 401-423 (2010)