Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usage profiles for sustainable buildings., and . ETFA, page 1-8. IEEE, (2010)Modeling framework for IoT integration of building automation systems., , and . Automatisierungstechnik, 65 (9): 630-640 (2017)Security in Building Automation Systems., , and . IEEE Trans. Industrial Electronics, 57 (11): 3622-3630 (2010)Extending the Watchdog Pattern for multi-threaded windows based traffic management and control applications., and . ETFA, page 854-860. IEEE, (2008)Programming fieldbus nodes: a RAD approach to customizable applications., , and . ETFA, IEEE, (2005)Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering Extended Version., , , , and . CoRR, (2016)Communication systems for building automation and control., , , and . Proceedings of the IEEE, 93 (6): 1178-1203 (2005)Use Cases for Improved Analysis of Energy and Comfort Related Parameters Based on BIM and BEMS Data., , , , , , , and . EG-ICE, volume 10864 of Lecture Notes in Computer Science, page 391-413. Springer, (2018)AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis., , , and . IM, page 7-12. IFIP, (2019)A methodology for creating reusable ontologies., , and . ICPS, page 65-70. IEEE, (2018)