Author of the publication

Fusing mobile, sensor, and social data to fully enable context-aware computing.

, , , , , , and . HotMobile, page 60-65. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault-tolerant mutual exclusion algorithms., and . J. Syst. Softw., 11 (2): 111-129 (1990)The Timewheel Group Membership Protocol., , and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 664-680. Springer, (1998)MapReduce System over Heterogeneous Mobile Devices., , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 168-179. Springer, (2009)Detection of Cyberbullying Incidents on the Instagram Social Network., , , , , and . CoRR, (2015)A Flexible and Intrusion Tolerant Voting Mechanism.. CATA, page 265-270. ISCA, (2005)Batch Rekeying in Mykil Key Management System., , and . IASTED PDCS, page 607-612. IASTED/ACTA Press, (2005)Identifying Differentiating Factors for Cyberbullying in Vine and Instagram., , , , and . SIMBig, volume 1410 of Communications in Computer and Information Science, page 348-361. Springer, (2020)Communication and Synchronization Models in Mobile Agent-Based Computing Systems., and . PDCS, page 442-447. ISCA, (2001)Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks., , and . SecureComm, page 113-126. IEEE, (2005)SafeVchat: detecting obscene content and misbehaving users in online video chat services., , , , , , , , and . WWW, page 685-694. ACM, (2011)