Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Retrieval Strategy for Case-Based Reasoning Using Similarity and Association Knowledge., , and . IEEE Trans. Cybern., 44 (4): 473-487 (2014)IoT-based Analysis for Smart Energy Management., , , , and . VTC Spring, page 1-5. IEEE, (2022)Validating Quality of Context in Pervasive Computing Systems: Surf Life Saving Use Case., , , and . PerCom Workshops, page 577-582. IEEE, (2023)Software Assisted Handover of Mobile Clients in Heterogeneous Wireless Computing Environments., and . APSEC, page 527-528. IEEE Computer Society, (1997)Visualisation of Fuzzy Classification of Data Elements in Ubiquitous Data Stream Mining., , , and . IWUC, page 29-38. INSTICC Press, (2006)Towards Anytime Anywhere Data Mining e-Services., , and . AusDM, page 47-56. University of Technology Sydney, Australia, (2002)Performance evaluation of a decision-theoretic approach for quality of experience measurement in mobile and pervasive computing scenarios., , and . WCNC, page 2418-2423. IEEE, (2012)A probabilistic context-aware approach for quality of experience measurement in pervasive systems., , and . SAC, page 419-424. ACM, (2011)A Scripting Language for both Agent Communication and Mobility., and . BalticDB&IS, page 87-102. Institute of Cybernetics at Tallin Technical University, (2002)CAWAnalyser: Enhancing Wireless Intrusion Response with Runtime Context-Awareness., , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 239-246. Springer, (2005)