Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bluetooth Low Energy performance and robustness analysis for Inter-Vehicular Communications., , , and . Ad Hoc Networks, (2016)SPASS: a generic process-oriented crop model with versatile windows interfaces., and . Environmental Modelling and Software, 15 (2-3): 179-188 (2000)LuxTraffic: A collaborative traffic sensing system., , and . LANMAN, page 1-6. IEEE, (2013)Advanced Techniques for Analyzing Web Server Logs., , , , and . International Conference on Internet Computing, page 71-78. CSREA Press, (2000)Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration., , , and . ECIS, page 1182-1186. (2000)Trust-Aided Acquisition Of Unverifiable Information., , and . ECAI, volume 178 of Frontiers in Artificial Intelligence and Applications, page 869-870. IOS Press, (2008)A semantic firewall for Content-Centric Networking., , , and . IM, page 478-484. IEEE, (2013)A key management scheme for Content Centric Networking., , , and . IM, page 828-831. IEEE, (2013)ASMATRA: Ranking ASs providing transit service to malware hosters., , , , , and . IM, page 260-268. IEEE, (2013)Digital forensics in VoIP networks., , , and . WIFS, page 1-6. IEEE, (2010)