Home
Team
Staff Overview
Alumni
Research Alumni
Student Alumni
Teaching
Overview
Thesis Topics
Thesis Process
PhD Process
Available Theses
Ongoing Theses
Past Theses
Past PhD Theses
Permanent Services
Thesis Examiner
Oral Exams
Courses
Current Courses
Upcoming Courses
Past Courses
Exchange Student Advisory Service
News & Overview
Incomings
Miscellaneous
Internet4Kids
Research
Vision
Openings
Theses
HiWi Calls
PhD and PostDoc Positions
Research @ COMSYS
Publications
Projects
Past Projects
Research Groups
Cyber-Physical Systems
Network Architectures
Security and Privacy
Systems Analysis
Research Overview
Future Power Grids
Industrial Internet of Things
Internet Measurements
Medical Data (Privacy)
Contact
Light
Dark
Automatic
Home
Publication_types
Paper-Conference
Paper-Conference
Topology Stability-Based Clustering for Wireless Mesh Networks
In the past, many clustering algorithms for ad-hoc networks have been proposed. Their main objective is to solve the scalability issue …
Martin Krebs
,
André Stein
,
Mónica Alejandra Lora Girón
PDF
Cite
DOI
IEEE Xplore
Demo Abstract: Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding
High-coverage testing of sensornet applications is vital for pre-deployment bug cleansing, but has previously been difficult due to the …
Fredrik Österlind
,
Raimondas Sasnauskas
,
Adam Dunkels
,
Oscar Soria Dustmann
,
Klaus Wehrle
PDF
Cite
DOI
Experience Level Agreements in Wireless Metropolitan Area Sharing Networks
Nowadays, mobile wireless users are in constant demand of connectivity. Satisfying the connectivity requirements of the users requires …
Mónica Alejandra Lora Girón
PDF
Cite
DOI
ACM
Poster Abstract: TinyOS Meets Wireless Mesh Networks
We present TinyWifi, a nesC code base extending TinyOS to support Linux powered network nodes. It enables developers to build arbitrary …
Muhammad Hamad Alizai
,
Bernhard Kirchen
,
Jó Ágila Bitsch
,
Hanno Wirtz
,
Klaus Wehrle
PDF
Cite
DOI
ACM
A Security Pattern for Data Integrity in P2P Systems
Benjamin Schleinzer
,
Nobukazu Yoshioka
Cite
Adaptive Security Established on the Requirements and Resource Abilities of Network Nodes
Fahad Samad
,
Sadeq Ali Makram
Cite
DOI
Flexible Analysis of Distributed Protocol Implementations using Virtual Time
Elias Weingärtner
,
Marko Ritter
,
Raimondas Sasnauskas
,
Klaus Wehrle
PDF
Cite
Indoor Navigation Approach Based on Approximate Positions
Ory Chowaw-Liebman
,
Uta Christoph
,
Karl-Heinz Krempels
,
Christoph Terwelp
Cite
DOI
Expanding the Event Horizon in Parallelized Network Simulations
The simulation models of wireless networks rapidly increase in complexity to accurately model wireless channel characteristics and the …
Georg Kunz
,
Olaf Landsiedel
,
James Gross
,
Stefan Götz
,
Farshad Naghibi
,
Klaus Wehrle
PDF
Cite
DOI
PiCAT: Palliating Channel Assignment Assaults using Adjustable Trust in Wireless Mesh Networks
Sadeq Ali Makram
,
Fahad Samad
Cite
DOI
1
...
35
36
37
...
48
Cite
×