direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Es gibt keine deutsche Übersetzung dieser Webseite.

Publications by Type: Book Chapters

Iannone, Luigi (2008). MeshDVNet: A fully functional IPv6 Wireless Mesh Network test-bed [4]. Wireless Mesh Networking. McGraw-Hill, 100–108.

Buchegger, Sonja and Krishnamurthy, Sudha (2010). Sensor Network Economics [5]. Handbook on Sensor Networks. World Scientific Publishing Company, 835–852.

Buchegger, Sonja and Chuang, John (2007). Encouraging Cooperative Interaction among Network Entities [6]. Cognitive Wireless Networks – Concepts, Methodologies and Visions Inspiring the Age of Enlightenment of Wireless Communications. Springer Netherlands, 87–108.

Schmid, Stefan and Wattenhofer, Roger (2011). Peer-to-Peer [7]. Encyclopedia of Parallel Computing. Springer.

Schmid, Stefan and Wattenhofer, Roger (2008). Modeling Sensor Networks [8]. Algorithms and Protocols for Sensor Networks. John Wiley & Sons.

Schaffrath, Gregor and Stiller, Burkhard (2008). Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection [9]. Resilient Services and Networks. Springer, 190–194.

Aggarwal, Vinay and Feldmann, Anja and Görke, Robert and Gaertler, Marco and Wagner, Dorothea (2008). A Visualization-Driven Approach to Overlay-Underlay Engineering [10]. The European Integrated Project ''Dynamically Evolving, Large-scale Information Systems (DELIS)''. Fakultät für Elektrotechnik, Informatik und Mathematik, Universität Paderborn, 81–98.

Haddadi, Hamed and Hui, Pan and Henderson, Tristan and Brown, Ian (2011). Targeted Advertising on the Handset: Privacy and Security Challenges [11]. Pervasive Advertising. Springer, 119–137.

Feldmann, Anja (2010). The Internet Architecture – Is a Redesign Needed? [12]. Netzwelt – Wege, Werte, Wandel. Springer, 147–160.

Feldmann, Anja and Fischer, Simon and Kammenhuber, Nils and Vöcking, Berthold (2009). Management of Variable Data Streams in Networks [13]. Algorithmics of Large and Complex Networks – Design, Analysis, and Simulation. Springer Wissenschaftsverlag, 266–291.

Sastry, Nishanth and Hui, Pan (2012). Path Formation in Human Contact Networks [14]. Handbook of Optimization in Complex Networks, Part 3. Springer, 349–385.

Botta, Alessio and Pescapé, Antonio and Karrer, Roger (2008). Wireless Networks Test-beds: When Heterogeneity Plays With Us [15]. Heterogeneous Wireless Access Networks, Architectures and Protocols. Springer US, 439–456.

Roth, Volker and Schmidt, Philipp (2010). Pseudonymety and Anonymety [16]. Handbook of eID Security: Concepts, Practical Experiences, Technologies. Publicis Publishing, 31–44.

Conti, Marco and Crowcroft, Jon and Giordano, Silvia and Hui, Pan and Nguyen, Hoang Ang and Passarella, Andrea (2009). Routing Issues in Opportunistic Networks [17]. Middelware for Network Eccentric and Mobile Applications (MiNEMA State-of-the-Art Book). Springer, 121–147.

Feldmann, Anja (2002). Characteristics of TCP Connection Arrivals [18]. Self-Similar Network Traffic and Performance Evaluation. John Wiley & Sons, Inc., 367–299.

Lee, Kyunghan and Hui, Pan and Chong, Song (2012). Mobility Models in opportunistic networks [19]. Mobile Ad hoc networking: the cutting edge directions. Wiley.

Iannone, Luigi and Levä, Tapio (2010). Modeling the economics of Loc/ID Split for the Future Internet [20]. Towards the Future Internet – Emerging Trends from European Research. IOS Press, 11–20.

Agarwal, Sachin (2006). Data Synchronization Protocols [21]. Handbook of Mobile Middleware. Auerbach Publications, 207–228.

------ Links: ------

Zusatzinformationen / Extras


Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008