Author of the publication

A Worst-Case Model for Co-Channel Interference in the Bluetooth Wireless System.

, , , and . LCN, page 346-355. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

About prefix hijacking in the Internet., and . LCN, page 143-146. IEEE Computer Society, (2011)A cooperative nearest neighbours topology control algorithm for wireless ad hoc networks., , , and . ICCCN, page 412-417. IEEE, (2003)MOBIP: Ein modulares Bildverarbeitungssystem mit Parallelrechner., and . Elektronische Rechenanlagen, 25 (2): 55-65 (1983)Simulative Evaluation of Adaptive Jamming Detection in Wireless Multi-hop Networks., , and . ICDCS Workshops, page 213-220. IEEE Computer Society, (2010)TOGBAD - an approach to detect routing attacks in tactical environments., , and . Security and Communication Networks, 4 (8): 793-806 (2011)Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD)., , and . ECEASST, (2011)A Flexible Dynamic Partitioning Algorithm for Optimistic Distributed Simulation., , and . PADS, page 219-228. IEEE Computer Society, (2007)Eine Erweiterung der Transportebene zur Bandbreitenregelung auf Ende-zu-Ende Basis., and . Praxis der Informationsverarbeitung und Kommunikation, 22 (1): 11-21 (1999)DOI:10.1515/piko.1999.22.1.3.Handoff Support for Mobilty with IP over Bluetooth., , , , , , and . LCN, page 143-154. IEEE Computer Society, (2000)Fairness and Delay/Loss Study of an End-to-End Bandwidth Regulation Scheme., and . LCN, page 315-324. IEEE Computer Society, (1998)