Author of the publication

Extrapolating sparse large-scale GPS traces for contact evaluation.

, and . HotPlanet@SIGCOMM, page 39-44. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Floating content for probabilistic information sharing., , , , and . Pervasive and Mobile Computing, 7 (6): 671-689 (2011)SCAMPI application platform., , , and . CHANTS@MobiCom, page 83-86. ACM, (2012)404 not found: a quest for DTN applications.. MobiOpp, page 3-4. ACM, (2012)Best-effort authentication for opportunistic networks., , , and . IPCCC, page 1-6. IEEE Computer Society, (2011)09071 Abstracts Collection - Delay and Disruption-Tolerant Networking (DTN) II., , , and . Delay and Disruption-Tolerant Networking (DTN) II, volume 09071 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)09071 Executive Summary - Delay and Disruption-Tolerant Networking (DTN) II., , , and . Delay and Disruption-Tolerant Networking (DTN) II, volume 09071 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)Efficient neighbor discovery in mobile opportunistic networking using mobility awareness., , and . COMSNETS, page 1-8. IEEE, (2014)Deadline-based resource management for information-centric networks., , and . ICN, page 49-54. ACM, (2013)Authenticated resource management in delay-tolerant networks using proxy signatures., , and . WONS, page 44-51. IEEE, (2013)Towards More Adaptive Voice Applications.. ISoLA (1), volume 6415 of Lecture Notes in Computer Science, page 355-366. Springer, (2010)