Cited By
View all- Krentz KVoigt T(2024)Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMORComputer Communications10.1016/j.comcom.2024.01.024217:C(57-69)Online publication date: 25-Jun-2024
- Grübel JThrash TAguilar LGath-Morad MChatain JSumner RHölscher CSchinazi V(2022)The Hitchhiker’s Guide to Fused Twins: A Review of Access to Digital Twins In Situ in Smart CitiesRemote Sensing10.3390/rs1413309514:13(3095)Online publication date: 27-Jun-2022
- Dong WLv JChen GWang YLi HGao YBharadia DBulusu NAryafar EBalasubramanian ASong J(2022)TinyNetProceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services10.1145/3498361.3538919(248-260)Online publication date: 27-Jun-2022
- Show More Cited By



