Author of the publication

User-centric Modeling and Processing for Ubiquitous Events Using Semantic Capability Models

, , and . Communications in Mobile Computing, 1 (1): 7:1-7:7 (October 2012)
DOI: 10.1186/2192-1121-1-7

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Novel itinerary-based KNN query algorithm leveraging grid division routing in wireless sensor networks of skewness distribution., , , , , and . Personal and Ubiquitous Computing, 18 (8): 1989-2001 (2014)Web service sub-chain recommendation leveraging graph searching., , , and . ComComAP, page 271-275. IEEE, (2014)Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography., , , and . GreenCom/iThings/CPScom, page 2102-2107. IEEE, (2013)A Novel Message Authentication Scheme With Absolute Privacy for the Internet of Things Networks., , , and . IEEE Access, (2020)A Review of Research on Acoustic Detection of Heat Exchanger Tube., , , , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 2 (5): e5 (2015)Transmitting and Gathering Streaming Data in Wireless Multimedia Sensor Networks Within Expected Network Lifetime., , , , , and . Mob. Networks Appl., 13 (3-4): 323 (2008)Value Entropy: A Systematic Evaluation Model of Service Ecosystem Evolution., , , , , and . IEEE Trans. Serv. Comput., 15 (4): 1760-1773 (2022)Extreme learning machines with expectation kernels., , , , and . Pattern Recognit., (2019)Graph matching based point correspondence with alternating direction method of multipliers., , , , and . Neurocomputing, (2021)Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture., , , , and . Eng. Appl. Artif. Intell., (2019)