Popular related searches


Author: John A. Stankovic


Publication period start: 2012
Number of co-authors: 16


Number of publications with favourite co-authors
Enamul Hoque
Sang H. Son
Kamin Whitehouse

Productive Colleagues

Most productive colleagues in number of publications
Adrian Perrig
Insup Lee
David Wagner


Stankovic, John A., Lee, Insup, Mok, Aloysius K., Rajkumar, Raj (2005): Opportunities and Obligations for Physical Computing Systems. In IEEE Computer, 38 (11) pp. 23-31. https://doi.ieeecomputersociety.org/10.1109/MC.2005.386

Perrig, Adrian, Stankovic, John A., Wagner, David (2004): Security in wireless sensor networks. In Communications of the ACM, 47 (6) pp. 53-57. https://dl.acm.org/doi/10.1145/990680.990707

Wood, Anthony D., Stankovic, John A. (2002): Denial of Service in Sensor Networks. In IEEE Computer, 35 (10) pp. 54-62. https://csdl.computer.org/comp/mags/co/2002/10/rx054abs.htm

Stankovic, John A., Son, Sang Hyuk, Hansson, Jorgen (1999): Misconceptions About Real-Time Databases. In IEEE Computer, 32 (6) pp. 29-36.

Stankovic, John A., Spuri, Marco, Natale, Marco Di, Buttazzo, Giorgio C. (1995): Implications of Classical Scheduling Results for Real-Time Systems. In IEEE Computer, 28 (6) pp. 16-25.

Stankovic, John A. (1988): Misconceptions About Real-Time Computing. In IEEE Computer, 21 (10) pp. 10-19.

Stankovic, John A. (1982): Software Communication Mechanisms: Procedure Calls Versus Messages. In IEEE Computer, 15 (4) pp. 19-25.

Srinivasan, Vijay, Stankovic, John A., Whitehouse, Kamin (2008): Protecting your daily in-home activity information from a wireless snooping attack. In: Youn, Hee Yong, Cho, We-Duke (eds.) UbiComp 2008 Ubiquitous Computing - 10th International Conference September 21-24, 2008, Seoul, Korea. pp. 202-211. https://doi.acm.org/10.1145/1409635.1409663

Kapitanova, Krasimira, Hoque, Enamul, Stankovic, John A., Whitehouse, Kamin, Son, Sang H. (2012): Being SMART about failures: assessing repairs in SMART homes. In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 51-60. https://dx.doi.org/10.1145/2370216.2370225