Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid frequency assignment for femtocells and coverage area analysis for co-channel operation., , , and . IEEE Commun. Lett., 12 (12): 880-882 (2008)Formal Specification and Analysis of Timing Properties in Software Systems., , , , and . FASE, volume 5503 of Lecture Notes in Computer Science, page 262-277. Springer, (2009)A method for distinction of bicycle traffic violations by detection of cyclists' behavior using multi-sensors., , , and . MobiQuitous, page 75-83. ACM, (2016)Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification., , , and . COMPSAC, page 940-945. IEEE, (2023)Dynamic test input generation for web applications., , , , , and . ISSTA, page 249-260. ACM, (2008)A pedestrian passage detection method by using spinning magnets on corridors., , , , , , and . UbiComp/ISWC Adjunct, page 411-414. ACM, (2015)NLOS Identification and Weighted Least-Squares Localization for UWB Systems Using Multipath Channel Statistics., , , and . EURASIP J. Adv. Signal Process., (2008)Trial-and-error method for automated test data generation and its evaluation., , and . Syst. Comput. Jpn., 20 (2): 78-92 (1989)Optimizing user interaction for mobile web browsing., , and . Mobile HCI, ACM, (2009)Variable interval positioning method for smartphone-based power-saving geofencing., , , , , , and . PIMRC, page 3482-3486. IEEE, (2013)