From post

You Want to Do What with RFID?: Perceptions of radio-frequency identification implants for employee identification in the workplace.

, , , и . IEEE Consumer Electron. Mag., 6 (3): 111-117 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding the topology of a telephone network via internally-sensed network tomography., , , и . ICASSP (3), стр. 977-980. IEEE, (2005)The National COVID Cohort Collaborative (N3C): Rationale, design, infrastructure, and deployment., , , , , , , , , и 46 other автор(ы). J. Am. Medical Informatics Assoc., 28 (3): 427-443 (2021)Demonstrating an approach for evaluating synthetic geospatial and temporal epidemiologic data utility: results from analyzing >1.8 million SARS-CoV-2 tests in the United States National COVID Cohort Collaborative (N3C)., , , , , , , , , и 65 other автор(ы). J. Am. Medical Informatics Assoc., 29 (8): 1350-1365 (2022)Religion, Science, and Technology: An Interview with Metropolitan Kallistos Ware Interview., , и . IEEE Technol. Soc. Mag., 36 (1): 20-26 (2017)Überveillance, the Web of Things, and People: What is the culmination of all this surveillance?, , и . IEEE Consumer Electron. Mag., 4 (2): 107-113 (2015)You Want to Do What with RFID?: Perceptions of radio-frequency identification implants for employee identification in the workplace., , , и . IEEE Consumer Electron. Mag., 6 (3): 111-117 (2017)Toward a State of Überveillance., и . IEEE Technol. Soc. Mag., 29 (2): 9-16 (2010)The Paradox of the Uberveillance Equation Commentary.. IEEE Technol. Soc. Mag., 35 (3): 14-20 (2016)Demystifying the number of the beast in the book of revelation: Examples of ancient cryptology and the interpretation of the "666" conundrum.. ISTAS, стр. 23-41. IEEE, (2010)No limits to watching?, и . Commun. ACM, 56 (11): 26-28 (2013)