Author of the publication

Robot Computing for Music Visualization.

, , , and . TAMC, volume 11436 of Lecture Notes in Computer Science, page 438-447. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Glance of Child's Play Privacy in Smart Toys., , , , and . ICCCS (2), volume 10040 of Lecture Notes in Computer Science, page 217-231. (2016)CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection., , , and . SADFE, page 1-8. IEEE, (2013)Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD)., , , , , and . ICITST, page 204-209. IEEE, (2016)Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks., , , , and . NTMS, page 1-7. IEEE, (2021)An Alternate Account on the Ethical Implications of Autonomous Vehicles., , , , and . Intelligent Environments, page 1-5. IEEE, (2021)Social Robots in Retail: Emotional Experiences a Critical Driver of Purchase Intention., , , and . HICSS, page 1510-1519. ScholarSpace, (2023)Forensic Analysis of Fitbit Versa: Android vs iOS., , , and . SP (Workshops), page 318-326. IEEE, (2021)Forensic Analysis of the Cisco WebEx Application., , , , and . CSNet, page 90-97. IEEE, (2021)Charging infrastructure placement for electric vehicles: An optimization prospective., , , , and . ITNAC, page 1-6. IEEE Computer Society, (2017)Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security., , , , , and . ICIOT, page 65-71. IEEE Computer Society, (2018)