Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Providing location security in vehicular Ad Hoc networks., , and . IEEE Wireless Commun., 16 (6): 48-55 (2009)Toward aggregating time-discounted information., , and . MiSeNet@MobiCom, page 57-66. ACM, (2013)On aggregating information in actor networks., , , and . Mobile Computing and Communications Review, 18 (1): 85-96 (2014)Characteristics of Social Media Stories., , and . TPDL, volume 9316 of Lecture Notes in Computer Science, page 267-279. Springer, (2015)InterPlanetary Wayback: Peer-To-Peer Permanence of Web Archives., , , and . TPDL, volume 9819 of Lecture Notes in Computer Science, page 411-416. Springer, (2016)Performance of Competing High-Speed TCP Flows., , and . Networking, volume 3976 of Lecture Notes in Computer Science, page 476-487. Springer, (2006)Difficulties of Timestamping Archived Web Pages., , and . CoRR, (2017)Detecting off-topic pages within TimeMaps in Web archives., , and . Int. J. on Digital Libraries, 17 (3): 203-221 (2016)Not all mementos are created equal: measuring the impact of missing resources., , , , and . Int. J. on Digital Libraries, 16 (3-4): 283-301 (2015)Characteristics of social media stories - What makes a good story?, , and . Int. J. on Digital Libraries, 17 (3): 239-256 (2016)