Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust & security RTD in the internet of things: opportunities for international cooperation., , , , and . SECURIT, page 172-178. ACM, (2012)Integrated simulation of CIF3 and simulink models., and . ITSLE@SPLASH, page 33-37. ACM, (2016)Analyzing Offline Social Engagements: An Empirical Study of Meetup Events Related to Software Development., , , , and . CoRR, (2019)Radicals of Information Management in System Speculative Inscription. BOHR International Journal of Operations Management Research and Practices, 1 (1): 28–33 (September 2022)Reinforced Self-Training (ReST) for Language Modeling, , , , , , , , , and 4 other author(s). (2023)cite arxiv:2308.08998Comment: 23 pages, 16 figures.Internet of Things Centric-Based Multiactivity Recognition in Smart Home Environment., , , , and . IEEE Internet Things J., 10 (2): 1724-1732 (January 2023)Multimodal N-of-1 trials: A Novel Personalized Healthcare Design., , , , , , , and . CoRR, (2023)Driver Intent Prediction and Collision Avoidance With Barrier Functions., , , , and . IEEE CAA J. Autom. Sinica, 10 (2): 365-375 (2023)Multi-Resident Activity Recognition using Multi-Label Classification in Ambient Sensing Smart Homes., , , , and . ICCE-TW, page 1-2. IEEE, (2019)Automated identification of libraries from vulnerability data: can we do better?, , , , , , and . ICPC, page 178-189. ACM, (2022)