This file was created by the TYPO3 extension
bib
--- Timezone: CET
Creation date: 2024-03-29
Creation time: 12-14-03
--- Number of references
41
techreport
2014-draft-moskowitz-hip-dex-02
HIP Diet EXchange (DEX)
2014
12
19
draft-moskowitz-hip-dex-02
This document specifies the Host Identity Protocol Diet EXchange (HIP DEX), a variant of the Host Identity Protocol Version 2 (HIPv2). The HIP DEX protocol design aims at reducing the overhead of the employed cryptographic primitives by omitting public-key signatures and hash functions. In doing so, the main goal is to still deliver similar security properties to HIPv2.
The HIP DEX protocol is primarily designed for computation or memory-constrained sensor/actuator devices. Like HIPv2, it is expected to be used together with a suitable security protocol such as the Encapsulated Security Payload (ESP) for the protection of upper layer protocol data. In addition, HIP DEX can also be used as a keying mechanism for security primitives at the MAC layer, e.g., for IEEE 802.15.4 networks.
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-02
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
incollection
2014-tcc-henze-trustpoint
A Trust Point-based Security Architecture for Sensor Data in the Cloud
2014
12
14
77-106
sensorcloud
Online
Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard
Springer
Trusted Cloud Computing
978-3-319-12717-0
10.1007/978-3-319-12718-7_6
1
MartinHenze
RenéHummen
RomanMatzutt
KlausWehrle
incollection
2013-wtc-eggert-sensorcloud
SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
2014
12
14
203-218
sensorcloud
fileadmin/papers/2013/2013-wtc-eggert-sensorcloud.pdf
Online
Krcmar, Helmut and Reussner, Ralf and Rumpe, Bernhard
Springer
Trusted Cloud Computing
en
978-3-319-12717-0
10.1007/978-3-319-12718-7_13
1
MichaelEggert
RogerHäußling
MartinHenze
LarsHermerschmidt
RenéHummen
DanielKerpen
AntonioNavarro Pérez
BernhardRumpe
DirkThißen
KlausWehrle
techreport
2015-aib-schmidt-hotbox
HotBox: Testing Temperature Effects in Sensor Networks
2014
12
4
AIB-2014-14
arXiv:1412.2257 [cs.NI]
1--17
senserr
fileadmin/papers/2014/2014-schmidt-aib-hotbox.pdf
Online
Department of Computer Science, RWTH Aachen
Ahornstr. 55, 52074 Aachen, Germany
Department of Computer Science, RWTH Aachen
Technical Report
en
0935-3232
FlorianSchmidt
MatteoCeriotti
NiklasHauser
KlausWehrle
inproceedings
2014-wirtz-mum-dcmv
Facilitating Direct and Ubiquitous Mobile Computer Vision
2014
11
27
fileadmin/papers/2014/2014-wirtz-mum-mcv.pdf
Online
ACM
The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014), Melbourne, Australia
Melbourne, Australia
The 13th International Conference on Mobile and Ubiquitous Multimedia (MUM 2014)
en
978-1-4503-3304-7
10.1145/2677972.2677974
1
HannoWirtz
JanRüth
KlausWehrle
conference
Schumacher2014
A Code-transparent MAC Simulator for WARP
2014
11
19
hodrian,cps
Proc. of European workshop on testbed based wireless research
Stockholm, Sweden
European workshop on testbed based wireless research
19/11/2014
AndreasSchumacher
ChristianDombrowski
JamesGross
conference
HohlfeldIMC
A QoE Perspective on Sizing Network Buffers
2014
11
ACM Internet Measurement Conference
accepted
OliverHohlfeld
EnricPujol
FlorinCiucu
AnjaFeldmann
PaulBarford
article
2014-cheng-acta-geodyn-geomater
Use of MEMS accelerometers/inclinometers as a geotechnical monitoring method for ground subsidence
Acta Geodynamica et Geomaterialia
2014
10
8
11
4
1--12
Accelerometer and inclinometer are inertial sensors capable of measuring corresponding magnitude of Earth gravitational field along the direction of each axis. By means of rotation matrices related to inertial navigation methods, the output values of a three-dimensional accelerometer or a two-dimensional inclinometer can be transformed and processed into the azimuth and dip angle of the monitored target. With the rapid growth in development and cost reduction of Micro Electro Mechanical Systems (MEMS) and Wireless Sensor Network (WSN) in recent years, the engineers are able to carry out real-time wireless geotechnical monitoring during construction. In this paper, we set up a one-day measurement implemented by a self- developed wireless MEMS monitoring system on the surface in the construction site of South Hongmei Road super high way tunnel in Shanghai, by making use of rotation matrices in specific ways, the raw data are processed to expressions of three-dimensional normal vectors that represent the change of the ground. After unifying the vectors in the same coordinate system, we conduct a brief ground settlement analysis by means of an evaluation of the dip angles in the cross section and the azimuths of the sensor nodes.
http://www.irsm.cas.cz/index_en.php?page=acta_detail_doi&id=96
Online
Institute of Rock Structure and Mechanics of the ASCR, v.v.i.
Prague, Czech Republic
Online
en
2336-4351
10.13168/AGG.2014.0015
1
ChengLi
TomásFernández-Steeger
Jó AgilaBitsch Link
MatthiasMay
RafigAzzam
inproceedings
2014-mass-wirtz-mafi
High-performance, Energy-efficient Mobile Wireless Networking in 802.11 Infrastructure Mode
2014
10
fileadmin/papers/2014/2014-wirtz-mass-mafi.pdf
Online
IEEE Computer Society
Proceedings of The 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014), Philadelphia, PA, USA
Philadelphia, USA
11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2014)
27 - 30 October 2014
en
978-1-4799-6035-4
10.1109/MASS.2014.21
1
HannoWirtz
GeorgKunz
JohannesLaudenberg
RobertBackhaus
KlausWehrle
proceedings
2014-kuvs-zimmermann-mindgap
Mind the Gap – Understanding the Traffic Gap when Switching Communication Protocols
2014
9
29
Stuttgart
1st KuVS Workshop on Anticipatory Networks
September 29-30, 2014
1
MarcWerner
TobiasLange
MatthiasHollick
TorstenZimmermann
KlausWehrle
inproceedings
2014-aasnet-henze-scslib
SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
2014
9
24
37
370-375
sensorcloud
/fileadmin/papers/2014/2014-henze-aasnet-scslib.pdf
Online
Elsevier
Procedia Computer Science
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14), Halifax, NS, Canada
Halifax, NS, Canada
The 6th International Symposium on Applications of Ad hoc and Sensor Networks (AASNET'14)
en
10.1016/j.procs.2014.08.055
1
MartinHenze
SebastianBereda
RenéHummen
KlausWehrle
conference
parruca_2014ICIC
Semi-Static Interference Coordination in OFDMA/LTE Networks: Evaluation of Practical Aspects
2014
9
21
To minimize interference in LTE networks, several inter-cell
interference coordination (ICIC) techniques have been in-
troduced. Among them, semi-static ICIC offers a balanced
trade-off between applicability and system performance. The
power allocation per resource block and cell is adapted in
the range of seconds according to the load in the system.
An open issue in the literature is the question how fast the
adaptation should be performed. This leads basically to a
trade-off between system performance and feasible compu-
tation times of the associated power allocation problems. In
this work, we close this open issue by studying the impact
that different durations of update times of semi-static ICIC
have on the system performance. We conduct our study
on realistic scenarios considering also the mobility of mobile terminals. Secondly, we also consider the implementation aspects of a semi-static ICIC. We introduce a very efficient implementation on general purpose graphic processing units, harnessing the parallel computing capability of such devices. We show that the update periods have a significant impact on the performance of cell edge terminals. Additionally, we present a graphic processing unit (GPU) based implementation which speeds up existing implementations up to a factor of 92x.
OFDMA; LTE; ICIC; Inter-Cell Interference Coordination;
GPU; GA; Genetic Algorithm; 4G; Cellular Networks; In-
terference; Proportional Fair Scheduling
ACM
ACM
Proceedings of the 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM-14)
Montreal, QC, Canada
International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM-14)
September 21-26 2014
http://dx.doi.org/10.1145/2641798.2641818
1
DonaldParruca
FahadAizaz
SoamsiriChantaraskul
JamesGross
inproceedings
2014-aktas-wintech-a-framework-for-remote-automation-configuration-and-monitoring
A Framework for Remote Automation, Configuration, and Monitoring of Real-World Experiments
2014
9
7
1--8
crawler
fileadmin/papers/2014/2014-aktas-wintech-remote-cross-layer.pdf
Online
ACM
Proceedings of the 9th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2014), Hawaii, USA
Hawaii, USA
9th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH 2014)
7 September 2014
en
978-1-4503-3072-5
10.1145/2643230.2643236
1
IsmetAktas
OscarPuñal
FlorianSchmidt
TobiasDrüner
KlausWehrle
inproceedings
2014-chants-wirtz-disco
Opportunistic Interaction in the Challenged Internet of Things
2014
9
7
1-8
fileadmin/papers/2014/2014-wirtz-chants-challenged_iot.pdf
online
ACM
Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014), Maui, USA
Maui, Hawaii, USA
Proceedings of the 9th ACM MobiCom Workshop on Challenged Networks (CHANTS 2014)
7 September 2014
en
978-1-4503-3071-8
10.1145/2645672.2645679
1
HannoWirtz
JanRüth
MartinSerror
Jó AgilaBitsch Link
KlausWehrle
inproceedings
2014-stoffers-omnet-parallel-inet
Enabling Distributed Simulation of OMNeT++ INET Models
2014
9
3
http://arxiv.org/pdf/1409.0994
arXiv:1409.0994
Online
Cornell University
Ithaca, New York, United States
Proceedings of the 1st OMNeT++ Community Summit, Hamburg, Germany
Hamburg, Germany
en
MirkoStoffers
RalfBettermann
JamesGross
KlausWehrle
inproceedings
2014-ficloud-henze-upecsi
User-driven Privacy Enforcement for Cloud-based Services in the Internet of Things
2014
8
27
191-196
ipacs
/fileadmin/papers/2014/2014-ficloud-henze-upecsi.pdf
Online
IEEE
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014), Barcelona, Spain
Barcelona, Spain
2014 International Conference on Future Internet of Things and Cloud (FiCloud 2014)
en
978-1-4799-4357-9
10.1109/FiCloud.2014.38
1
MartinHenze
LarsHermerschmidt
DanielKerpen
RogerHäußling
BernhardRumpe
KlausWehrle
inproceedings
2014-bitsch-extremecom-demo
Demo: Opportunistic Mobile Brain Research
2014
8
14
1--2
The majority of research using brain imaging and EEG techniques is currently limited to clinical environments, restricting experiments to synthetic tasks in controlled conditions.
Lifting these limitations brought about by this artificial set-up would allow us to perform neuropsychological assessments and research in mobile settings or at locations easier accessible to patients, possibly even in remote, hard to access areas.
We developed a tablet based mobile framework to present auditory and visual stimuli, capture wireless commercial EEG and screen interaction data, and analyze the recorded data for immediate evaluation, as well as share the data over internet or local opportunistic links.
To demonstrate the feasibility of our approach, we successfully replicated the experimental set-up and evaluation pipeline of two existing EEG studies on event-related potentials.
This work therefore lays the foundation to further truly mobile brain research and health-care applications.
fileadmin/papers/2014/2014-bitsch-extremcom-mobile-eeg-demo.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 6th Extreme Conference on Communication
Galapagos Islands, Ecuador
6th Extreme Conference on Communication
August 11-15, 2014
en
978-1-4503-2929-3
1
Jó AgilaBitsch Link
RoannRamos
DavidOrlea
KlausWehrle
inproceedings
2014-bitsch-extremecom-liquid-democracy
WIP: Opportunistic Vote Delegation for e-Voting based on Liquid Democracy
2014
8
14
1--4
Work in Progress Paper
fileadmin/papers/2014/2014-bitsch-extremecom-liquid-democracy.pdf
Online
Hui, Pan and Lindgren, Anders
ACM
Proceedings of the 6th Extreme Conference on Communication
Galapagos Islands, Ecuador
6th Extreme Conference on Communication
August 11-15, 2014
en
978-1-4503-2929-3
1
Jó AgilaBitsch Link
AngelTchorbadjiiski
KlausWehrle
poster
2014-wisec-ziegeldorf-ipin
POSTER: Privacy-preserving Indoor Localization
2014
7
23
rfc
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-ziegeldorf-poster-wisec.pdf
7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '14) (Poster)
en
10.13140/2.1.2847.4886
1
Jan HenrikZiegeldorf
NicolaiViol
MartinHenze
KlausWehrle
inproceedings
2014-hummen-delegation
Delegation-based Authentication and Authorization for the IP-based Internet of Things
2014
6
30
284-292
iotsec; sensorcloud
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-hummen-secon-delegation.pdf
Online
IEEE
11th IEEE International Conference on Sensing, Communication, and Networking (SECON 2014)
Singapore
11th IEEE International Conference on Sensor, Communication, and Networking (SECON 2014)
30.06. - 03.07.2014
en
10.1109/SAHCN.2014.6990364
1
RenéHummen
HosseinShafagh
ShahidRaza
ThiemoVoigt
KlausWehrle
inproceedings
2014-schmidt-piccett
Piccett: Protocol-Independent Classification of Corrupted Error-Tolerant Traffic
2014
6
24
refector
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-schmidt-iscc-piccett.pdf
IEEE
Proceedings of the 18th IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal
en
10.1109/ISCC.2014.6912582
1
FlorianSchmidt
MartinHenze
KlausWehrle
inproceedings
2014-wowmom-wirtz-sofi
Pervasive Content-centric Wireless Networking
2014
6
18
fileadmin/papers/2014/2014-wirtz-wowmom-sofi.pdf
online
IEEE
15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
Sydney, Australia
WoWMoM
June, 2014
en
10.1109/WoWMoM.2014.6918968
1
HannoWirtz
MatteoCeriotti
BenjaminGrap
KlausWehrle
inproceedings
2014-wowmom-wirtz-cafi
CA-Fi: Ubiquitous Mobile Wireless Networking without 802.11 Overhead and Restrictions
2014
6
17
fileadmin/papers/2014/2014-wirtz-wowmom-cafi.pdf
online
IEEE
15th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
en
10.1109/WoWMoM.2014.6918950
1
HannoWirtz
TorstenZimmermann
MatteoCeriotti
KlausWehrle
inproceedings
2014-aktas-punal-wowmom-machine-learning-based-jamming-detection-for-80211-conference
Machine Learning-based Jamming Detection for IEEE 802.11: Design and Experimental Evaluation
Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
2014
6
16
1--10
crawler
fileadmin/papers/2014/2014-aktas-wowmom-jammingdetection.pdf
Online
IEEE
Proceedings of the 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14), Sydney, Australia
Sydney
15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'14)
16-19 June, 2014
en
1
OscarPuñal
IsmetAktas
Caj-JulianSchnelke
GloriaAbidin
JamesGross
KlausWehrle
article
parruca2014icc
On the Interference As Noise Approximation in OFDMA/LTE Networks
Proceedings of IEEE International Conference on Communications (ICC 2014)
2014
6
11
fileadmin/papers/2014/2014_parruca_gross.pdf
Online
en
1
DonaldParruca
JamesGross
conference
2014-hohlfeld-harvester
The Harvester, the Botmaster, and the Spammer: On the Relations Between the Different Actors in the Spam Landscape
2014
6
http://downloads.ohohlfeld.com/paper/harvesters-asiaccs2014.pdf
http://asiaccs2014.nict.go.jp/
ACM
9th ACM Symposium on Information, Computer and Communications Security
10.1145/2590296.2590302
1
GianlucaStringhini
OliverHohlfeld
ChristopherKruegel
GiovanniVigna
inproceedings
2014-mobisys-rueth-uiso
Demo: Ubiquitous Interaction with Smart Objects
2014
6
355-356
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-rueth-mobisys-uiso.pdf
http://www.comsys.rwth-aachen.de/short/mobisys14-demo
Online
ACM
Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14), Bretton Woods, New Hampshire, USA
Bretton Woods
12th Annual International Conference on Mobile Systems, Applications, and Services
16-19 June 2014
en
978-1-4503-2793-0
10.1145/2594368.2601477
1
JanRüth
HannoWirtz
KlausWehrle
conference
CiucuPH2014
On Capacity Dimensioning in Dynamic Scenarios: The Key Role of Peak Values
2014
5
http://www.ieee-lanman.org/
IEEE
IEEE LANMAN
Reno, NV, USA
1
FlorinCiucu
FelixPoloczek
OliverHohlfeld
inproceedings
2014-smartcity-zimmermann-pubtrans
Analyzing Metropolitan-area Networking within Public Transportation Systems for Smart City Applications
2014
3
30
fileadmin/papers/2014/2014-zimmermann-smartcity-pubtrans.pdf
Online
IEEE
Proceedings of the 1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14), Dubai, UAE
Dubai, UAE
1st International IEEE Workshop on Architectures and Technologies for Smart Cities (SmartCitiy'14)
30 March - 2 April 2014
en
10.1109/NTMS.2014.6814007
1
TorstenZimmermann
HannoWirtz
OscarPuñal
KlausWehrle
inproceedings
2014-stoffers-simutools-distributed-horizon
Large-Scale Network Simulation: Leveraging the Strengths of Modern SMP-based Compute Clusters
2014
3
17
31-40
horizon
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-stoffers-simutools-distributed-horizon.pdf
Online
ICST
Brussels, Belgium
Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SIMUTools'14), Lisbon, Portugal
Lisbon, Portugal
en
978-1-63190-007-5
10.4108/icst.simutools.2014.254622
1
MirkoStoffers
SaschaSchmerling
GeorgKunz
JamesGross
KlausWehrle
techreport
2014-draft-moskowitz-hip-dex-01
HIP Diet EXchange (DEX)
2014
3
4
draft-moskowitz-hip-dex-01
This document specifies the Host Identity Protocol Diet EXchange (HIP
DEX), a variant of the HIP Base EXchange (HIP BEX) [rfc5201-bis].
The HIP DEX protocol design aims at reducing the overhead of the
employed cryptographic primitives by omitting public-key signatures
and hash functions. In doing so, the main goal is to still deliver
similar security properties to HIP BEX.
The HIP DEX protocol is primarily targeted at computation or memory-constrained sensor devices. Like HIP BEX, it is expected to be used
together with another suitable security protocol such as the
Encapsulated Security Payload (ESP) [rfc5202-bis] for the protection
of upper layer protocols. HIP DEX can also be used as a keying
mechanism for a MAC layer security protocol as is supported by IEEE
802.15.4 [IEEE.802-15-4.2011].
Work in progress
iotsec; ietf
http://tools.ietf.org/html/draft-moskowitz-hip-dex-01
Online
Internet Engineering Task Force
Internet-Draft
en
RobertMoskowitz
RenéHummen
inproceedings
2014-mmsys-wirtz-ubifi
A Wireless Application Overlay for Ubiquitous Mobile Multimedia Sensing and Interaction
2014
3
https://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-wirtz-mmsys-ubifi.pdf
Online
ACM
Proceedings of the 5th ACM Multimedia Systems Conference (MMSys 2014), Special Session on Mobile Multimedia Sensing, Singapore
Singapore
5th ACM Multimedia Systems Conference
19-21 March 2014
en
978-1-4503-2705-3
10.1145/2557642.2578224
1
HannoWirtz
JanRüth
TorstenZimmermann
MatteoCeriotti
KlausWehrle
inproceedings
2014-comsnets-aktas-graph-based-redundancy-removal
Graph-based Redundancy Removal Approach for Multiple Cross-Layer Interactions
2014
1
7
1-8
crawler
http://www.comsys.rwth-aachen.de/fileadmin/papers/2014/2014-aktas-comsnets-redundancy.pdf
Online
IEEE
Proceedings of the 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India
Bangalore, India
2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)
7-10 January, 2014
en
978-1-4799-3635-9
10.1109/COMSNETS.2014.6734899
1
IsmetAktas
MartinHenze
Muhammad HamadAlizai
KevinMöllering
KlausWehrle
article
HohlfeldCCR14
An Internet census taken by an illegal botnet - A qualitative assessment of published measurements
ACM SIGCOMM Computer Communication Review
2014
44
3
http://www.sigcomm.org/sites/default/files/ccr/papers/2014/July/0000000-0000013.pdf
http://www.sigcomm.org/ccr/papers/2014/July
ThomasKrenc
OliverHohlfeld
AnjaFeldmann
article
2014-PIK-Jakobs
IuK-Standardisierungsforschung (Editorial)
PIK – Praxis der Informationsverarbeitung und Kommunikation
2014
37
4
173-176
KaiJakobs
article
2014-Jakobs-JTPO
The (Future) Role of China in ICT Standardisation – A European Perspective
Telecommunications Policy
2014
38
unpublished
0308-5961
10.1016/j.telpol.2014.09.003
1
KaiJakobs
article
2014-alizai-pad-jnca
Probabilistic Location-Free Addressing in Wireless Networks
Elsevier Journal of Network and Computer Applications (JNCA)
2014
unpublished
en
1
Muhammad HamadAlizai
KlausWehrle
book
2014-EURAS-Jakobs
Cooperation among standardisation organisations and the scientific and academic community. Proceedings of the 19th EURAS Conference.
2014
Kai Jakobs & Ivana Mijatovic
Mainz Academic Publisher
KaiJakobs
IvanaMijatovic
book
2014_Jakobs_igi1
Modern Trends Surrounding Information Technology Standards
and Standardization within Organizations
2014
Kai Jakobs
IGI-Global
KaiJakobs
incollection
2014-IGIPaper-Jakobs
The Role of The Individual in ICT Standardisation
2014
247 - 265
Kai Jakobs
IGI Global
Modern Trends Surrounding Information Technology Standards and Standardization within Organizations
978-1-4666-6332-9
10.4018/978-1-4666-6332-9.ch014
KaiJakobs
inproceedings
2014-ICE-Jakobs
Managing Corporate Participation in International ICT Standards Setting
2014
IEEE
Proc. International Conference on Engineering, Technology and Innovation, ICE 2014
10.1109/ICE.2014.6871531
1
KaiJakobs