Author of the publication

Passive user identification using sequential analysis of proximity information in touchscreen usage patterns.

, , , and . ICMU, page 161-166. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying static code analysis to firewall policies for the purpose of anomaly detection. CoRR, (2011)Formal Mechanised Semantics of CHERI C: Capabilities, Undefined Behaviour, and Provenance., , , , , , , , , and 1 other author(s). ASPLOS (1), page 181-196. ACM, (2024)HELIX: a case study of a formal verification of high performance program generation., and . FHPC@ICFP, page 1-9. ACM, (2018)Modular, compositional, and executable formal semantics for LLVM IR., , , , , and . Proc. ACM Program. Lang., 5 (ICFP): 1-30 (2021)HELIX: From Math to Verified Code.. Carnegie Mellon University, USA, (2021)Constructing an orthonormal set of eigenvectors for DFT matrix using Gramians and determinants.. CoRR, (2017)AccelKey Selection Method for Mobile Devices. CoRR, (2007)3D finger posture detection and gesture recognition on touch surfaces.. ICARCV, page 359-364. IEEE, (2012)Verified Translation Between Purely Functional and Imperative Domain Specific Languages in HELIX., , and . VSTTE, volume 12549 of Lecture Notes in Computer Science, page 33-49. Springer, (2020)Where's the Rock: Using Convolutional Neural Networks to Improve Land Cover Classification., , , and . Remote Sensing, 11 (19): 2211 (2019)