![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://fanyv88.com/img/search.dark.16x16.png)
default search action
Stefan Götz 0001
Other persons with the same name
- Stefan Höppner
(aka: Stefan Götz 0002) — Ulm University, Ulm, Germany
- Stefan Götz 0003
— Computational Genomics Program, Centro de Investigación Príncipe Felipe (CIPF), Valencia, Spain
- Stefan Götz 0004 — University of Tübingen, Tübingen, Germany (and 1 more)
- Stefan Götz 0005
— University of Vienna, Austria
- Stefan Götz 0006 — TU Kaiserslautern, Germany
2010 – 2019
- 2012
- [b1]Stefan Götz:
Supporting diversity and evolvability in communication protocols. RWTH Aachen University, Shaker 2012, ISBN 978-3-8440-0891-3, pp. 1-156 - 2011
- [c16]Muhammad Hamad Alizai, Tobias Vaegs, Olaf Landsiedel, Stefan Götz, Jó Ágila Bitsch Link, Klaus Wehrle:
Probabilistic addressing: Stable addresses in unstable wireless networks. IPSN 2011: 61-72 - 2010
- [c15]Tobias Heer, Thomas Jansen, René Hummen, Stefan Götz, Hanno Wirtz, Elias Weingärtner, Klaus Wehrle
:
PiSA-SA: Municipal Wi-Fi Based on Wi-Fi Sharing. ICCCN 2010: 1-8 - [c14]Georg Kunz, Olaf Landsiedel, Stefan Götz, Klaus Wehrle
, James Gross, Farshad Naghibi
:
Expanding the Event Horizon in Parallelized Network Simulations. MASCOTS 2010: 172-181 - [c13]Tobias Heer, René Hummen, Nicolai Viol, Hanno Wirtz, Stefan Götz, Klaus Wehrle
:
Collaborative municipal Wi-Fi networks - challenges and opportunities. PerCom Workshops 2010: 588-593
2000 – 2009
- 2009
- [c12]Tobias Heer, René Hummen, Miika Komu, Stefan Götz, Klaus Wehrle
:
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace. ICC 2009: 1-6 - [c11]Muhammad Hamad Alizai, Olaf Landsiedel, Jó Ágila Bitsch Link, Stefan Götz, Klaus Wehrle
:
Bursty traffic over bursty links. SenSys 2009: 71-84 - [c10]Olaf Landsiedel, Georg Kunz, Stefan Götz, Klaus Wehrle
:
A virtual platform for network experimentation. VISA 2009: 45-52 - 2008
- [c9]Tobias Heer, Stefan Götz, Oscar García Morchon, Klaus Wehrle
:
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. CoNEXT 2008: 23 - [c8]Tobias Heer, Stefan Götz, Elias Weingärtner, Klaus Wehrle
:
Secure Wi-Fi sharing at global scales. ICT 2008: 1-7 - [c7]Stefan Götz, Christian Beckel, Tobias Heer, Klaus Wehrle
:
ADAPT: A Semantics-Oriented Protocol Architecture. IWSOS 2008: 287-292 - 2006
- [c6]Olaf Landsiedel, Stefan Götz, Klaus Wehrle:
A churn and mobility resistant approach for DHTs. MobiShare@MobiCom 2006: 42-47 - [c5]Olaf Landsiedel, Stefan Götz, Klaus Wehrle
:
Towards Scalable Mobility in Distributed Hash Tables. Peer-to-Peer Computing 2006: 203-209 - [c4]Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle
:
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks. PerCom Workshops 2006: 173-178 - 2005
- [c3]Stefan Götz, Klaus Wehrle:
Spontaneous Windows File Sharing via Virtual Groups. KiVS Kurzbeiträge und Workshop 2005: 143-146 - [c2]Stefan Götz, Klaus Wehrle
:
Transparent end-host-based service composition through network virtualization. MSC@MM 2005: 31-36 - [p3]Klaus Wehrle, Stefan Götz, Simon Rieche:
Distributed Hash Tables. Peer-to-Peer Systems and Applications 2005: 79-93 - [p2]Stefan Götz, Simon Rieche, Klaus Wehrle:
Selected DHT Algorithms. Peer-to-Peer Systems and Applications 2005: 95-117 - [p1]Simon Rieche, Heiko Niedermayer, Stefan Götz, Klaus Wehrle:
Reliability and Load Balancing in Distributed Hash Tables. Peer-to-Peer Systems and Applications 2005: 119-135 - 2004
- [c1]Simon Rieche, Klaus Wehrle, Olaf Landsiedel, Stefan Götz, Leo Petrak:
Reliability of data in structured peer-to-peer systems. HOT-P2P 2004: 108-113
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
![](https://fanyv88.com/img/new-feature-top-right.156x64.png)