Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning hierarchical models of activity., , and . IROS, page 891-896. IEEE, (2004)Understanding stateful vs stateless communication strategies for ad hoc networks., , and . MobiCom, page 313-324. ACM, (2011)Meteorological Command and Control: An End-to-end Architecture for a Hazardous Weather Detection Sensor Network., , , , , , , , and . EESR, ACM / USENIX Association, (2013)Separation of Sensor Control and Data in Closed-Loop Sensor Networks., , , , and . SECON, page 1-9. IEEE, (2009)Scalability analysis of grid-based multi-hop wireless networks., , and . COMSNETS, page 1-10. IEEE, (2013)Scan Strategies for Meteorological Radars., and . NIPS, page 993-1000. Curran Associates, Inc., (2007)Switching kalman filters for prediction and tracking in an adaptive meteorological sensing network., , and . SECON, page 197-206. IEEE, (2005)Rebound: Decoy routing on asymmetric routes via error messages., , , , , , and . LCN, page 91-99. IEEE Computer Society, (2015)MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption., and . FOCI @ USENIX Security Symposium, USENIX Association, (2018)Robust routing in networks with time-varying links.. CoNEXT, page 71. ACM, (2007)