Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preserving User Privacy in Pervasive Environments with a Collaborative Model., , , and . SERE (Companion), page 84-93. IEEE, (2013)Feature Boosting in Natural Image Classification., , , , , , and . COMPSAC (2), page 61-67. IEEE, (2019)Elderly Safety: A Smartphone Based Real Time Approach., , , and . ICOST, volume 7910 of Lecture Notes in Computer Science, page 134-142. Springer, (2013)Wellness assistant: a virtual wellness assistant using pervasive computing., , , and . SAC, page 782-787. ACM, (2007)A Mobile Intelligent Interruption Management System., , and . J. Univers. Comput. Sci., 16 (15): 2060-2080 (2010)Special track on Middleware Engineering (ME): editorial message., and . SAC, page 479-480. ACM, (2008)ePet: when cellular phone learns to recognize its owner., , , and . SafeConfig, page 13-18. ACM, (2009)A Chaos-Based Non-Linear Analysis Method for Detecting Human Attention Levels in EEG Signals., , , , , , , , , and 2 other author(s). BIBE, page 201-204. IEEE, (2023)Knowledge Usability and its Characteristics for Pervasive Computing., , and . PSC, page 206-. CSREA Press, (2005)SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment., , , and . COMPSAC (2), page 67-70. IEEE Computer Society, (2006)0-7695-2655-1.