Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wellness assistant: a virtual wellness assistant using pervasive computing., , , and . SAC, page 782-787. ACM, (2007)Elderly Safety: A Smartphone Based Real Time Approach., , , and . ICOST, volume 7910 of Lecture Notes in Computer Science, page 134-142. Springer, (2013)Feature Boosting in Natural Image Classification., , , , , , and . COMPSAC (2), page 61-67. IEEE, (2019)Preserving User Privacy in Pervasive Environments with a Collaborative Model., , , and . SERE (Companion), page 84-93. IEEE, (2013)ePet: when cellular phone learns to recognize its owner., , , and . SafeConfig, page 13-18. ACM, (2009)Special track on Middleware Engineering (ME): editorial message., and . SAC, page 479-480. ACM, (2008)A Chaos-Based Non-Linear Analysis Method for Detecting Human Attention Levels in EEG Signals., , , , , , , , , and 2 other author(s). BIBE, page 201-204. IEEE, (2023)Knowledge Usability and its Characteristics for Pervasive Computing., , and . PSC, page 206-. CSREA Press, (2005)Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment., , and . COMPSAC (2), page 269-274. IEEE Computer Society, (2007)978-0-7695-2870-0.SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment., , , and . COMPSAC (2), page 67-70. IEEE Computer Society, (2006)0-7695-2655-1.