From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Gesture-based soft authentication., , и . WiMob, стр. 771-777. IEEE Computer Society, (2015)Sensor node lifetime: An experimental study., , , и . PerCom Workshops, стр. 202-207. IEEE Computer Society, (2011)Code offloading on opportunistic computing., , и . PerCom Workshops, стр. 148-150. IEEE Computer Society, (2014)A decade of low-power wireless.. PerCom Workshops, стр. 559. IEEE Computer Society, (2013)Evidentiality and Disagreement in Earnings Conference Calls: Preliminary Empirical Findings., , и . AI³@AI*IA, том 2528 из CEUR Workshop Proceedings, стр. 100-104. CEUR-WS.org, (2019)Enabling Body-Centric Computing Applications with LED-to-Camera Communication., , и . BodySys@MobiSys, стр. 7-12. ACM, (2022)Spatial Diversity Benefits by Means of Induced Fading., и . SECON, стр. 128-137. IEEE, (2006)Arbutus: Network-Layer Load Balancing for Wireless Sensor Networks., и . WCNC, стр. 2063-2068. IEEE, (2008)Special section on Pervasive Networked Sensing., и . Comput. Commun., 35 (6): 649 (2012)Characterization of the impact of resource availability on opportunistic computing., , и . MCC@SIGCOMM, стр. 35-40. ACM, (2012)