Author of the publication

A Virtual Reality Lower-Back Pain Rehabilitation Approach: System Design and User Acceptance Analysis.

, , , and . HCI (9), volume 9177 of Lecture Notes in Computer Science, page 374-382. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-layer System Designs for Scalable Video Streaming over Mobile WiMAX., , , and . WCNC, page 1860-1864. IEEE, (2007)Watermark optimization technique based on genetic algorithms., and . Security and Watermarking of Multimedia Contents, volume 3971 of SPIE Proceedings, page 516-523. SPIE, (2000)Digital invisible ink and its applications in steganography., , and . MM&Sec, page 23-28. ACM, (2006)A robust fine granularity scalability using trellis based predictive leak., , and . ISCAS (3), page 401-404. IEEE, (2002)Pushing information over acoustic channels., , , and . ICASSP, page 1421-1424. IEEE, (2009)Smart Control of Home Appliances Using Hand Gesture Recognition in an IoT-Enabled System., , , , , , and . Appl. Artif. Intell., (December 2023)Inpainting attacks against visible watermarking schemes., and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 376-384. SPIE, (2001)Scalable Video Streaming over Mobile WiMAX., , , and . ISCAS, page 3463-3466. IEEE, (2007)Digital invisible ink: revealing true secrets via attacking., , and . AsiaCCS, page 355. ACM, (2006)Collusion-resistant video fingerprinting based on temporal oscillation., , and . ICIP, page 3128-3131. IEEE, (2008)