Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain in Health Data Systems: A Survey., and . IoTSMS, page 490-497. IEEE, (2019)Privacy in Location-Aware Computing Environments., , and . IEEE Pervasive Comput., 6 (4): 64-72 (2007)Securing Information Technology in Healthcare., , , , , , , , , and 1 other author(s). IEEE Secur. Priv., 11 (6): 25-33 (2013)Analysis of a Wi-Fi Hotspot Network., , and . WiTMeMo, USENIX Association, (2013)Performance analysis of mobile agents for filtering data streams on wireless networks., , , , and . MSWiM, page 85-94. ACM, (2000)Low-Level Interfaces for High-Level Parallel I/O., and . Input/Output in Parallel and Distributed Computer Systems, Kluwer/Springer, (1996)Parallel I/O: Getting ready for prime time., , , , and . IEEE Concurr., 3 (2): 64-71 (1995)Detecting Receptivity for mHealth Interventions in the Natural Environment., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 5 (2): 74:1-74:24 (2021)Evaluating the Reproducibility of Physiological Stress Detection Models., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 4 (4): 147:1-147:29 (2020)Analog Gated Recurrent Unit Neural Network for Detecting Chewing Events., , , , and . IEEE Trans. Biomed. Circuits Syst., 16 (6): 1106-1115 (December 2022)