Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

a-kTC: Integrating topology control into the stack., , , and . LCN, page 414-417. IEEE Computer Society, (2015)Topology Control in Wireless Sensor Networks: What Blocks the Breakthrough?, , , , and . LCN, page 389-397. IEEE Computer Society, (2016)On Scalable In-Network Operator Placement for Edge Computing., , , and . ICCCN, page 1-9. IEEE, (2018)Instrumenting and tuning dataView - a networked application for navigating through large scientific datasets., , , , , and . Softw., Pract. Exper., 32 (2): 165-190 (2002)Efficient implementation of an active set algorithm for large-scale portfolio selection., , and . Computers & OR, 35 (12): 3945-3961 (2008)A Case Study of Distributed, Asynchronous Software Inspection., , , and . ICSE, page 107-117. ACM, (1997)Danger, danger! Evaluating the accessibility of Web-based emergency alert sign-ups in the northeastern United States., , , , , and . Gov. Inf. Q., 31 (3): 488-497 (2014)Enhancing Annotation Visibility for Software Inspection., , and . ASE, page 243-246. IEEE Computer Society, (1999)Domain and Language Independent Feature Extraction for Statistical Text Categorization, , , and . CoRR, (1996)Topology control with application constraints., , , , , and . LCN, page 229-232. IEEE Computer Society, (2015)