Author of the publication

WANTED: a theft-deterrent solution for the pervasive computing world.

, , and . ICCCN, page 374-379. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service deployment in programmable networks.. ETH Zurich, (2003)Robust data sharing with key-value stores., , , , and . PODC, page 221-222. ACM, (2011)Disk Scrubbing Versus Intradisk Redundancy for RAID Storage Systems., , , and . TOS, 7 (2): 5:1-5:42 (2011)Editorial: A Successful Year and Looking Forward to 2017 and Beyond., , , , , , , , , and 7 other author(s). IEEE Trans. Neural Netw. Learning Syst., 28 (1): 2-7 (2017)Design and Implementation of a Key-Lifecycle Management System., , , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 160-174. Springer, (2010)Applying a Web-Service-Based Model to Dynamic Service-Deployment., , , , and . CIMCA/IAWTIC, page 128-133. IEEE Computer Society, (2005)Towards a service-enabled distributed router architecture., , , , , and . IET Circuits, Devices & Systems, 2 (1): 60-68 (2008)Chordless paths through three vertices., and . Theor. Comput. Sci., 351 (3): 360-371 (2006)Scheduling in Flash-Based Solid-State Drives - Performance Modeling and Optimization., , , and . MASCOTS, page 459-468. IEEE Computer Society, (2012)Cost and Quality-of-Service-aware Network Service Deployment., , and . GI Jahrestagung (1), volume 157 of Schriftenreihe der Österreichischen Computer-Gesellschaft, page 166-171. Konstanz UVK-Verl.-Ges., (2001)