Author of the publication

Creating interactive virtual zones in physical space with magnetic-induction.

, , , , , , and . SenSys, page 431-432. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-Term Post-Disturbance Forest Recovery in the Greater Yellowstone Ecosystem Analyzed Using Landsat Time Series Stack., , , , , , , and . Remote Sensing, 8 (11): 898 (2016)Distillation of arbitrary single-photon entanglement assisted with polarized Bell states., , , and . Quantum Information Processing, 14 (10): 3693-3710 (2015)Protecting single-photon entanglement with imperfect single-photon source., , , and . Quantum Information Processing, 14 (2): 635-651 (2015)Distributed Group Management in Sensor Networks: Algorithms and Applications to Localization and Tracking., , , , and . Telecommunication Systems, 26 (2-4): 235-251 (2004)Topic-centric and semantic-aware retrieval system for internet of things., , and . Information Fusion, (2015)Grid Integration of Intermittent Wind Generation: A Markovian Approach., , , , , , , and . IEEE Trans. Smart Grid, 5 (2): 732-741 (2014)Independent Component Analysis Using Multilayer Networks., , and . IEEE Signal Process. Lett., 14 (11): 856-859 (2007)Recursive least squares-like algorithms for the adaptive second-order lattice notch filter., , , , and . Digital Signal Processing, 18 (3): 291-306 (2008)Energy-efficient joint BS-RS sleep scheduling based on cellular automata in relay-aided cellular networks., , and . WCSP, page 1-6. IEEE, (2015)The Relation on Prefix Hijacking and the Internet Hierarchy., , , , and . IMIS, page 415-420. IEEE Computer Society, (2012)