Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure spatial trajectory prediction based on traffic flows., , and . EIT, page 723-727. IEEE, (2016)On Loosely Coupling Structure for Internet Surveys: A Case Study of a Survey System for Teachers In-Service Educational Demands., , and . ITRE, page 2-6. IEEE, (2006)Route Anomaly Detection Using a Linear Route Representation., , , and . J. Comput. Networks Commun., (2012)Structural Hole and Personal Innovativeness in a Bureau of Health., , , and . ASONAM, page 7-12. IEEE Computer Society, (2009)A novel matrix representation for privacy-preserving spatial trajectory prediction., , , and . EIT, page 1-7. IEEE, (2013)Mobile Data Protection Using Handheld Usage Context Matching., , , and . Mobile Data Management, page 594-599. IEEE Computer Society, (2009)How the Eighth Grade Students Reused Knowledge., , , and . ICALT, page 355-357. IEEE Computer Society, (2009)Knowledge-reuse Networks of an On-line PBL Framework., , , , and . ASONAM, page 373-374. IEEE Computer Society, (2009)Behaviour analysis of internet survey completion using decision trees: An exploratory study., , and . Online Inf. Rev., 33 (1): 117-134 (2009)Using NFC tags and smartphones to design a reliable mechanism to pick a child up from school., , and . ICCE, page 1-4. IEEE, (2018)