420. | Heuristic Header Recovery for Corrupted Network Packets Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
December
2015
ISBN: 978-3844041743 |
419. | 14th International Conference on Cryptology and Network Security (CANS 2015), Marrakesh, Morocco Volume 9476of Lecture Notes in Computer Science, page 197-213.
Publisher: Springer,
December
2015
ISBN: 978-3-319-26822-4 |
418. | Remp TCP: Low latency Multipath TCP Proceedings of the 2015 CoNEXT on Student Workshop, CoNEXT Student Workshop, Heidelberg, Germany
Publisher: ACM,
December
2015
|
417. | IEEE GC 2015 Workshop on Ultra-Low Latency and Ultra-High Reliability in
Wireless Communications (GC'15 - ULTRA2), San Diego, USA
Publisher: IEEE,
December
2015
|
416. | Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Cancún, Mexico (MSWiM'15), page 291-300.
Publisher: ACM, New York, NY
November
2015
|
415. | 40th IEEE Conference on Local Computer Networks (LCN), Clearwater Beach, USA, page 19-27.
Publisher: IEEE,
October
2015
|
414. |
ITG-Fachtagung "Zukunft der Netze 2015" – Poster Session, Tübingen, Germany
Publisher: VDE,
September
2015
|
413. | The 10th DPM International Workshop on Data Privacy Management, Vienna, Austria Volume 9481of Lecture Notes in Computer Science, page 226-234.
Publisher: Springer,
September
2015
ISBN: 978-3-319-29882-5 |
412. | Autorisierungsmanagement für das Internet of Things D•A•CH Security 2015
September
2015
accepted |
411. | Proceedings of the 43rd ACM SIGCOMM Conference (SIGCOMM '15), London, United Kingdom
Publisher: ACM,
August
2015
|
410. | Internet-Draft Document number: draft-moskowitz-hip-dex-04
Internet Engineering Task Force,
July
2015
|
409. | The 6th International Conference on Applied Humand Factors and Ergonomics (AHFE 2015), Las Vegas, NV, USA Volume 3, page 815--822.
Publisher: Elsevier,
July
2015
|
408. | Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
June
2015
ISBN: 978-3-8440-3755-5 |
407. | 12th IEEE International Conference on Sensing, Communication, and Networking (SECON 2015), Seattle, USA, page 256-264.
Publisher: IEEE,
June
2015
|
406. | Internet-Draft Document number: draft-moskowitz-hip-dex-03
Internet Engineering Task Force,
June
2015
|
405. | 16th IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks: Demos (IEEE WoWMoM 2015 - Demos), Boston, USA
Publisher: IEEE,
June
2015
|
404. | Proceedings of the 3rd ACM SIGSIM/PADS Conference on Principles of Advanced Discrete Simulation (SIGSIM-PADS’15), London, United Kingdom, page 73-74.
Publisher: ACM, New York, NY
June
2015
|
403. | In Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin, editor,Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health Volume 211of Studies in Health Technology and Informatics, page 153 --159.
Publisher: IOS Press, Amsterdam
June
2015
ISBN: 978-1-61499-515-9 |
402. | In Blobel, Bernd and Lindén, Maria and Ahmed, Mobyen Uddin, editor,Proceedings of the 12th International Conference on Wearable Micro and Nano Technologies for Personalized Health Volume 211of Studies in Health Technology and Informatics, page 185 -- 190.
Publisher: IOS Press, Amsterdam
June
2015
ISBN: 978-1-61499-515-9 |
401. | 2015 International Workshop on Privacy Engineering (IWPE'15), part of 2015 IEEE Security and Privacy Workshops (SPW 2015), San Jose, CA, USA, page 198-205.
Publisher: IEEE,
May
2015
DOI: 10.1109/SPW.2015.9 |
400. | EchoRing: A Low-Latency, Reliable Token-Passing MAC Protocol for Wireless Industrial Networks Proc. of 21st European Wireless Conference (EW15)
Publisher: IEEE,
May
2015
ISBN: 978-3-8007-3976-9 |
399. | Proc. of the 14th International IFIP TC6 Networking Conference (NETWORKING'15), Toulouse, France
Publisher: IFIP, Laxenburg, Austria
May
2015
|
398. | Protocol Virtualization through Dynamic Network Stacks SDNFlex Workshop (NetSys 2015)
Cottbus, March 2015, 9-12
Publisher: IEEE,
March
2015
|
397. | Proc. of 2nd International Conference on Networked Systems, Demonstrations (NetSys15), page 1--3.
Publisher: IEEE,
March
2015
|
396. | The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY 2015), San Antonio, TX, USA
Publisher: ACM,
March
2015
ISBN: 978-1-4503-3191-3 |
395. | Proceedings of the 12th European Conference on Wireless Sensor Networks (EWSN 2015), Porto, Portugal
Publisher: Springer,
February
2015
ISBN: 978-3-319-15581-4 |
394. | The Feasibility, Semantics, and Scope of Mobile Wireless Device-to-Device Networking Ph.D. Thesis
RWTH Aachen University, Aachen, Germany
January
2015
ISBN: 978-3-8440-3367-0 |
393. | The Role of Standards in Transatlantic Trade and Regulation. Proc. 20th EURAS Annual Standardisation Conference. EURAS contributions to standardisation research, vol. 9.
Publisher: Mainz Publishers,
2015
ISBN: 978-3-95886-035-3 |
392. | Corporate ICT Standardisation Management – Lessons from the Literature and from Case Studies Proc. 7th Annual Conference of the EuroMed Academy of Business, 2015, Verona, Italy
Publisher: EuroMed Press,
2015
|
391. | Standardisation Management – Some Lessons to be Learnt Proc. 20th EURAS Annual Standardisation Conference, 2015, Copenhagen, Denmark., page 175-190.
Publisher: Mainz Publishers,
2015
|
390. | Resource-Conscious Network Security for the IP-Based Internet of Things
RWTH Aachen University,
2015
|
389. | Optimizing 802.11 Wireless Communications with Machine Learning
RWTH Aachen University,
2015
|
388. | Heuristic Header Error Recovery for Corrupted Network Packets
RWTH Aachen University,
2015
|