Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Centrality-Based Power Control for Hot-Spot Mitigation in Wireless Networks., and . GLOBECOM, page 1-6. IEEE, (2010)On insider misbehavior detection in cognitive radio networks., , , and . IEEE Netw., 27 (3): 4-9 (2013)A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks., and . IEEE Commun. Surv. Tutorials, 13 (3): 396-428 (2011)Finger-writing with Smartwatch: A Case for Finger and Hand Gesture Recognition using Smartwatch., , and . HotMobile, page 9-14. ACM, (2015)Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers., , , and . HotMobile, page 99-104. ACM, (2016)PCASA: Proximity Based Continuous and Secure Authentication of Personal Devices., , , , and . SECON, page 1-9. IEEE, (2017)Sensor-Assisted Codebook-Based Beamforming for Mobility Management in 60 GHz WLANs., , , and . MASS, page 333-341. IEEE Computer Society, (2015)On the feasibility of estimating soluble sugar content using millimeter-wave., , , , , , and . IoTDI, page 13-24. ACM, (2019)FineHand: Learning Hand Shapes for American Sign Language Recognition., , , , and . FG, page 700-707. IEEE, (2020)Demo: Finger and Hand Gesture Recognition using Smartwatch., , , and . MobiSys, page 471. ACM, (2015)