Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending the LBS-framework TraX: Efficient proximity detection with dead reckoning., , and . Computer Communications, 31 (5): 1040-1051 (2008)Invoking computational objects on mobile devices., and . DAIS, volume 143 of IFIP Conference Proceedings, page 191-204. Kluwer, (1999)Estimating locations and coverage areas of mobile network cells based on crowdsourced data., , , and . WMNC, page 1-8. IEEE, (2013)TRESOR - Towards the Realization of a Trusted Cloud Ecosystem., , , , , and . Trusted Cloud Computing, Springer, (2014)Inhaltezentrierte Virtuelle Gemeinschaften., , , and . GeNeMe, page 69-78. Technische Universität Dresden, (2008)The Inaugural Panel on Novel Applications and Technology Advances in Computing., , and . COMPSAC, page 773. IEEE Computer Society, (2015)Cloud Service Matchmaking Using Constraint Programming., , and . WETICE, page 63-68. IEEE Computer Society, (2015)Einsatz von Tradingdiensten in WWW-basierten elektronischen Marktplätzen., and . Kommunikation in Verteilten Systemen, page 17-31. Springer, (1997)Nomadic communication in converging networks.. RWTH Aachen University, Germany, (2001)Towards a Three-tiered Social Graph in Decentralized Online Social Networks., , and . HOTPOST@MobiHoc, page 1-6. ACM, (2015)