Author of the publication

Using Self-Organizing Maps for Intelligent Camera-Based User Interfaces.

, , , , , , , , , , and . HAIS (2), volume 6077 of Lecture Notes in Computer Science, page 486-492. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-Organizing Maps versus Growing Neural Gas in Detecting Data Outliers for Security Applications., , , and . HAIS (2), volume 7209 of Lecture Notes in Computer Science, page 89-96. Springer, (2012)A Methodology for Developing Accessible Mobile Platforms over Leading Devices for Visually Impaired People., , , , and . IWAAL, volume 6693 of Lecture Notes in Computer Science, page 209-215. Springer, (2011)A Taxonomy of Trust and Reputation System Attacks., , and . TrustCom, page 41-50. IEEE Computer Society, (2012)Using Self-Organizing Maps for Intelligent Camera-Based User Interfaces., , , , , , , , , and 1 other author(s). HAIS (2), volume 6077 of Lecture Notes in Computer Science, page 486-492. Springer, (2010)Domotic platform based on multipurpose wireless technology with distributed processing capabilities., , , and . PIMRC, page 3003-3007. IEEE, (2004)Improving Social Odometry Robot Networks with Distributed Reputation Systems for Collaborative Purposes., , , , and . Sensors, 11 (12): 11372-11389 (2011)Bio-inspired enhancement of reputation systems for intelligent environments., , , , , , , , , and 1 other author(s). Inf. Sci., (2013)Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps., , , , , and . Integr. Comput. Aided Eng., 17 (2): 87-102 (2010)Using clustering techniques for intelligent camera-based user interfaces., , , , , , , , , and 1 other author(s). Log. J. IGPL, 20 (3): 589-597 (2012)Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes., , , and . Sensors, 12 (8): 10834-10850 (2012)