Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encoder design for healthcare signals., , , and . Personal and Ubiquitous Computing, 17 (7): 1373-1381 (2013)User tailored cloud-learning system using SNS and learning resources., , and . Multimedia Tools Appl., 74 (14): 5073-5084 (2015)Bayesian Probability-Based Motion Estimation Method in Ubiquitous Computing Environments., , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 593-598. Springer, (2015)Optional Frame Selection Algorithm for Adaptive Symmetric Service of Augmented Reality Big Data on Smart Devices., , and . Symmetry, 8 (5): 37 (2016)The Design and Analysis of a Secure Personal Healthcare System Based on Certificates., , , and . Symmetry, 8 (11): 129 (2016)Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC., , and . Symmetry, 7 (2): 935-948 (2015)MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis., , , , , and . NPC, volume 7513 of Lecture Notes in Computer Science, page 101-109. Springer, (2012)Active Learning Algorithms for Graphical Model Selection., , , and . AISTATS, volume 51 of JMLR Workshop and Conference Proceedings, page 1356-1364. JMLR.org, (2016)CMMI Security Model for Cloud Manufacturing System's Network., , , and . BWCCA, page 449-452. IEEE, (2013)Multimedia contents adaptation by modality conversion with user preference in wireless network., , and . J. Netw. Comput. Appl., (2014)