Author of the publication

A Declarative Approach for Specifying User-Centric Communication.

, , , , and . CTS, page 89-98. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Declarative Approach for Specifying User-Centric Communication., , , , and . CTS, page 89-98. IEEE Computer Society, (2006)Deep learning approach to detect malicious attacks at system level: poster., , and . WiSec, page 314-315. ACM, (2019)KeyNet: Enhancing Cybersecurity with Deep Learning-Based LSTM on Keystroke Dynamics for Authentication., and . ICHI, volume 13184 of Lecture Notes in Computer Science, page 761-771. Springer, (2021)Efficient concurrent operations of telepresence avatars., , and . ISR, page 1-5. IEEE, (2013)Image Content-Based Retrieval Using Chromaticity Moments., , and . IEEE Trans. Knowl. Data Eng., 15 (5): 1069-1072 (2003)Optimizing Sensor Subset Selection with Quantum Annealing: A Large-Scale Indoor Temperature Regulation Application., and . IHCI (2), volume 14532 of Lecture Notes in Computer Science, page 228-237. Springer, (2023)Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption., , , , and . IOTSMS, page 141-148. IEEE, (2023)Automatic Generation of User-Centric Multimedia Communication Services., , , and . IPCCC, page 324-331. IEEE Computer Society, (2007)A Multi-layered Deep Learning Approach for Human Stress Detection., , and . ICHI, volume 13741 of Lecture Notes in Computer Science, page 7-17. Springer, (2022)A flexible approach for electronic medical records exchange., , , , , and . HIKM, page 33-40. ACM, (2006)