Author of the publication

PROWIT - Kontext-sensitive Telekommunikation im Geschäftseinsatz.

, , , , and . Praxis der Informationsverarbeitung und Kommunikation, 34 (3): 156-157 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using a Multi-Layer Approach to Tackle the Service Interaction Problem in Telephony Scenarios., , , and . EUROMICRO, page 207-215. IEEE Computer Society, (2002)Capture, Management, and Utilization of Lifecycle Information for Learning Resources., , , and . TLT, 1 (1): 75-87 (2008)KOM Player - A Platform for Experimental VoD Research., , and . ISCC, page 370-375. IEEE Computer Society, (2001)RSVP as Firewall Signalling Protocol., , , and . ISCC, page 57-62. IEEE Computer Society, (2001)SMARTENERGY.KOM: An intelligent system for energy saving in smart home., , , , , , , and . LCN Workshops, page 685-692. IEEE Computer Society, (2014)Presence detection, identification and tracking in smart homes utilizing bluetooth enabled smartphones., , , , and . LCN Workshops, page 784-789. IEEE Computer Society, (2014)Where is that car parked? A wireless sensor network-based approach to detect car positions., , , , and . LCN Workshops, page 514-522. IEEE Computer Society, (2014)Recommending and Finding Multimedia Resources in Knowledge Acquisition Based on Web Resources., , , and . ICCCN, page 1-6. IEEE, (2010)Threat as a Service?: Virtualization's Impact on Cloud Security., , , , and . IT Professional, 14 (1): 32-37 (2012)Mobi-G: Gossip-based monitoring in MANETs., , , , and . NOMS, page 1-9. IEEE, (2014)