From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introduction: Security and Privacy.. IEEE Pervasive Computing, 2 (1): 20 (2003)User-Generated Content., , и . IEEE Pervasive Computing, 7 (4): 10-11 (2008)Activity-Based Computing., , и . IEEE Pervasive Computing, 7 (2): 20-21 (2008)Understanding the role of image recognition in mobile tour guides., , , и . Mobile HCI, стр. 191-198. ACM, (2005)An Inter-Access Point Handoff Mechanism for Wireless Network Management: The Sabino System., , и . International Conference on Wireless Networks, стр. 225-230. CSREA Press, (2003)Object invocation and management in the Zenith distributed multimedia information system., , , и . Inf. Softw. Technol., 35 (5): 259-266 (1993)Introduction to the MobiCom 2003 poster session summaries.. ACM SIGMOBILE Mob. Comput. Commun. Rev., 7 (4): 46 (2003)Déjà vu--technologies that make new situations look familiar: position paper, , , и . Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, стр. 1389--1396. ACM, (2014)Integrating Computing and Telecommunications: A Tale of Two Architectures., , , и . NOSSDAV, том 614 из Lecture Notes in Computer Science, стр. 57-68. Springer, (1991)Special issue on pervasive displays., , , , и . Pers. Ubiquitous Comput., 26 (3): 587-591 (2022)