Author: John A. Stankovic

Publications

Publication period start: 2012
Number of co-authors: 16

Co-authors

Number of publications with favourite co-authors
Enamul Hoque
1
Sang H. Son
1
Kamin Whitehouse
2

Productive Colleagues

Most productive colleagues in number of publications
Adrian Perrig
7
Insup Lee
8
David Wagner
9

Publications

Stankovic, John A., Lee, Insup, Mok, Aloysius K., Rajkumar, Raj (2005): Opportunities and Obligations for Physical Computing Systems. In IEEE Computer, 38 (11) pp. 23-31. https://doi.ieeecomputersociety.org/10.1109/MC.2005.386

Perrig, Adrian, Stankovic, John A., Wagner, David (2004): Security in wireless sensor networks. In Communications of the ACM, 47 (6) pp. 53-57. https://dl.acm.org/doi/10.1145/990680.990707

Wood, Anthony D., Stankovic, John A. (2002): Denial of Service in Sensor Networks. In IEEE Computer, 35 (10) pp. 54-62. https://csdl.computer.org/comp/mags/co/2002/10/rx054abs.htm

Stankovic, John A., Son, Sang Hyuk, Hansson, Jorgen (1999): Misconceptions About Real-Time Databases. In IEEE Computer, 32 (6) pp. 29-36.

Stankovic, John A., Spuri, Marco, Natale, Marco Di, Buttazzo, Giorgio C. (1995): Implications of Classical Scheduling Results for Real-Time Systems. In IEEE Computer, 28 (6) pp. 16-25.

Stankovic, John A. (1988): Misconceptions About Real-Time Computing. In IEEE Computer, 21 (10) pp. 10-19.

Stankovic, John A. (1982): Software Communication Mechanisms: Procedure Calls Versus Messages. In IEEE Computer, 15 (4) pp. 19-25.

Srinivasan, Vijay, Stankovic, John A., Whitehouse, Kamin (2008): Protecting your daily in-home activity information from a wireless snooping attack. In: Youn, Hee Yong, Cho, We-Duke (eds.) UbiComp 2008 Ubiquitous Computing - 10th International Conference September 21-24, 2008, Seoul, Korea. pp. 202-211. https://doi.acm.org/10.1145/1409635.1409663

Kapitanova, Krasimira, Hoque, Enamul, Stankovic, John A., Whitehouse, Kamin, Son, Sang H. (2012): Being SMART about failures: assessing repairs in SMART homes. In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 51-60. https://dx.doi.org/10.1145/2370216.2370225