Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OID: Optimized Information Discovery Using Space Filling Curves in P2P Overlay Networks., , , , , and . ICPADS, page 311-319. IEEE Computer Society, (2008)Low Overhead Assignment of Symbolic Coordinates in Sensor Networks., , , and . WSAN, volume 248 of IFIP, page 179-190. Springer, (2007)Cross-Organizational Workflow Management - General approaches and their suitability for engineering processes., , and . I3E, volume 202 of IFIP Conference Proceedings, page 143-158. Kluwer, (2001)Position Sharing for Location Privacy in Non-trusted Systems, , and . Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, USA, (March 2011)A classification of location privacy attacks and approaches., , , and . Personal and Ubiquitous Computing, 18 (1): 163-175 (2014)A Negotiation and Resource Reservation Protocol (NRP) for Configurable Multimedia Applications., , , and . ICMCS, page 113-117. IEEE Computer Society, (1996)Failure Recovery for Multi-Party Real-Time Communication., and . ICMCS, page 562-565. IEEE Computer Society, (1996)QoS Negotiation and Resource Reservation for Distributed Multimedia Applications., , and . ICMCS, page 319-326. IEEE Computer Society, (1997)Efficient Capturing of Environmental Data with Mobile RFID Readers., , and . Mobile Data Management, page 41-51. IEEE Computer Society, (2009)An Adaptive, Location-Aware Hoarding Mechanism., and . ISCC, page 615-620. IEEE Computer Society, (2000)