Author of the publication

Development of an experimental set-up for investigations of pipe leakage flow

, , and . 47th Annual Meeting on Nuclear Technology : The International Expert Conference on Nuclear Technology : Proceedings, Berlin, INFORUM Verlags- und Verwaltungsgesellschaft mbH, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards jamming-resistant and competitive medium access in the SINR model., , , and . S3@MobiCom, page 33-36. ACM, (2011)The Price of Malice: A Game-Theoretic Framework for Malicious Behavior in Distributed Systems., , and . Internet Mathematics, 6 (2): 125-155 (2009)A highly flexible service composition framework for real-life networks., , , and . Computer Networks, 50 (14): 2488-2505 (2006)Network-based mobility management in the evolved 3GPP core network., , , , , , and . IEEE Communications Magazine, 47 (2): 58-66 (2009)Distributed Cloud Computing (Dagstuhl Seminar 15072)., , , and . Dagstuhl Reports, 5 (2): 64-79 (2015)Efficient Loop-Free Rerouting of Multiple SDN Flows., , , , and . IEEE/ACM Trans. Netw., 26 (2): 948-961 (2018)The Wide-Area Virtual Service Migration Problem: A Competitive Analysis Approach., , , , and . IEEE/ACM Trans. Netw., 22 (1): 165-178 (2014)Topological Implications of Selfish Neighbor Selection in Unstructured Peer-to-Peer Networks., , and . Algorithmica, 61 (2): 419-446 (2011)Upper and lower bounds for deterministic broadcast in powerline communication networks., , and . Distributed Computing, 29 (4): 239-250 (2016)Sade: competitive MAC under adversarial SINR., , , , and . Distributed Computing, 31 (3): 241-254 (2018)