Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Extensible Dashboard Architecture For Visualizing Base And Analyzed Data., , , , and . CoRR, (2021)An EEG-based Cognitive Fatigue Detection System., , , , , , and . PETRA, page 131-136. ACM, (2023)Remote Operated Human Robot Interactive System using Hand Gestures for Persons with Disabilities., , , and . PETRA, page 137-139. ACM, (2023)Smartphone Based IoT-Controller Framework for Assisting the Blind in Human Robot Interaction., , , , , and . PETRA, page 514-516. ACM, (2022)Automated System to Measure Static Balancing in Children to Assess Executive Function., , , , , and . PETRA, page 569-575. ACM, (2022)CoWiz: Interactive Covid-19 Visualization Based On Multilayer Network Analysis., , , , and . ICDE, page 2665-2668. IEEE, (2021)Edge-IoT framework for speech and mobile-based human-robot interaction., , , , and . MobiSys, page 527-528. ACM, (2022)Malware phylogeny generation using permutations of code., , , and . J. Comput. Virol., 1 (1-2): 13-23 (2005)Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects., , , , , and . CoRR, (2018)Analyzing Memory Accesses in Obfuscated x86 Executables., , , and . DIMVA, volume 3548 of Lecture Notes in Computer Science, page 1-18. Springer, (2005)