
Reading PAGE
Peer Evaluation activity
Downloads | 12 |
Views | 40 |
Total impact ?
Send a 
Klaus has...
Trusted | 0 |
Reviewed | 0 |
Emailed | 0 |
Shared/re-used | 0 |
Discussed | 0 |
Invited | 0 |
Collected | 0 |
This was brought to you by:
Followblock this user Klaus Wehrle Trusted member
Professor
Computer Science, RWTH Aachen University, Aachen
BurrowView - seeing the world through the eyes of rats
Oh la la
Your session has expired but don’t worry, your message
has been saved.Please log in and we’ll bring you back
to this page. You’ll just need to click “Send”.
Your evaluation is of great value to our authors and readers. Many thanks for your time.

Your mailing list is currently empty.
It will build up as you send messages
and links to your peers.


Enter the e-mail addresses of your recipients in the box below. Note: Peer Evaluation will NOT store these email addresses log in
Your message has been sent.
Description
Title : BurrowView - seeing the world through the eyes of rats
Author(s) : Jo Agila Bitsch Link, Gregor Fabritius, Muhammad Hamad Alizai, Klaus Wehrle
Keywords : information quality, animal tracking, pervasive
Subject : unspecified
Area : Other
Language : English
Year : 2010
Journal : 2010 8th IEEE International Conference on Pervasive Computing an
Publisher : Ieee
Pages : 56-61
Url : http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5470603
Doi : 10.1109/PERCOMW.2010.5470603
Author(s) : Jo Agila Bitsch Link, Gregor Fabritius, Muhammad Hamad Alizai, Klaus Wehrle
Keywords : information quality, animal tracking, pervasive
Subject : unspecified
Area : Other
Language : English
Year : 2010
Affiliations : | Computer Science, RWTH Aachen University, Aachen |
Publisher : Ieee
Pages : 56-61
Url : http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5470603
Doi : 10.1109/PERCOMW.2010.5470603
Leave a comment
This contribution has not been reviewed yet. review?


You may receive the Trusted member label after :
• Reviewing 10 uploads, whatever the media type.
• Being trusted by 10 peers.
• If you are blocked by 10 peers the "Trust label" will be suspended from your page. We encourage you to contact the administrator to contest the suspension.
Please select an affiliation to sign your evaluation:
Please select an affiliation:
Klaus's Peer Evaluation activity
Downloads | 12 |
- 4ADAPT: A Semantics-oriented Protocol Architecture
- 2Assessing Location Privacy in Mobile Communication Networks
- 2Studying the dynamics of emotional expression using synthesized facial muscle movements.
- 1Smart sensors for small rodent observation
- 1Security Challenges in the IP-based Internet of Things
- 1TinyOS meets wireless mesh networks
- 1Dynamic TinyOS : Modular and Transparent Incremental Code-Updates for Sensor Networks
Views | 40 |
- 3Peer-to-Peer-Based Infrastructure Support for Massively Multiplayer Online Games
- 2What Is This Peer-to-Peer About?
- 2Towards Short-Term Wireless Link Quality Estimation
- 2Security Challenges in the IP-based Internet of Things
- 2Modular context-aware access control for medical sensor networks
- 2Dynamic TinyOS : Modular and Transparent Incremental Code-Updates for Sensor Networks
- 1DiffServ in the Web : Different Approaches for Enabling Better Services in the World Wide Web
- 1Cooperative security in distributed sensor networks
- 1PISA: P2P Wi-Fi Internet Sharing Architecture
- 124. Peer-to-Peer in Mobile Environments
- 1Synchronized Network Emulation: Matching prototypes with complex simulations
- 1Secure Wi-Fi Sharing at Global Scales
- 1A virtual platform for network experimentation
- 1Ratpack: wearable sensor networks for animal observation.
- 1A churn and mobility resistant approach for DHTs
- 1Smart sensors for small rodent observation
- 1Assessing Location Privacy in Mobile Communication Networks
- 1MHT: Eine mobilitätsbewusste verteilte Hash-Tabelle (MHT: A mobility-aware Distributed Hash Table)
- 1SimBetAge : Utilizing Temporal Changes in Social Networks for Pocket Switched Networks
- 1KleeNet : Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment Categories and Subject Descriptors
- 1KleeNet : Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment
- 1Framework for Evaluation of Networked Mobile Games
- 1Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
- 1Towards a Flexible and Versatile Cross-Layer-Coordination Architecture
- 1Demo Abstract : Integrating Symbolic Execution with Sensornet Simulation for Efficient Bug Finding
- 1Poster Abstract: TinyOS Meets Wireless Mesh Networks
- 1NIH Proposal
- 1TinyOS meets wireless mesh networks
- 1OCALA: An Architecture for Supporting Legacy Applications over Overlays
- 1Poster Abstract : Statistical Vector based Point-to-Point Routing in Wireless Networks
- 1Interaction effects of perceived gaze direction and dynamic facial expression: Evidence for appraisal theories of emotion
- 1Modeling and Tools for Network Simulation
- 1Studying the dynamics of emotional expression using synthesized facial muscle movements.
Klaus has...
Trusted | 0 |
Reviewed | 0 |
Emailed | 0 |
Shared/re-used | 0 |
Discussed | 0 |
Invited | 0 |
Collected | 0 |


Full Text request
Your request will be sent.
Please enter your email address to be notified
when this article becomes available
Your email