Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RSS Conversion Service for Integrating Web Information Resources and Home Network System., , and . ICE-B, page 131-134. INSTICC Press, (2009)Exploiting House Log of Home Network System to Derive Contexts with Past Situations., , , , and . ICCASA, page 13-18. ACM, (2014)Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process., , , and . ACSW, volume 44 of CRPIT, page 145-151. Australian Computer Society, (2005)Exploiting contexts with house log for value-added smart TV services., , , , and . GCCE, page 258-259. IEEE, (2014)Considering Online Feature Interaction Detection and Resolution for Integrated Services in Home Network System., , , and . ICFI, page 191-206. IOS Press, (2009)Modeling and Detecting Feature Interactions among Integrated Services of Home Network Systems., and . IEICE Transactions, 93-D (4): 822-833 (2010)Feature Interactions in Integrated Services of Networked Home Appliances: An Object-Oriented Approach., , and . FIW, page 236-251. IOS Press, (2005)Extracting service candidates from procedural programs based on process dependency analysis., , , and . APSCC, page 484-491. IEEE, (2009)Mission-oriented large-scale environment sensing based on analogy of military system., , , and . iiWAS, page 414-421. ACM, (2016)Visualizing and analyzing street crimes using personalized security information service PRISM., , and . iiWAS, page 208-214. ACM, (2017)