Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Inclusion of Phones Into Online E-meetings.. MMNS, volume 2839 of Lecture Notes in Computer Science, page 396-408. Springer, (2003)Designing a large-scale video chat application., , , and . ACM Multimedia, page 71-80. ACM, (2005)Providing Seamless Mobility with Competition based Soft Handover Management., and . MMNS, volume 3271 of Lecture Notes in Computer Science, page 295-307. Springer, (2004)Schemes for user-interest controlled video bandwidth adaptation in a collaborative workspace environment., , and . ICME, page 197-200. IEEE Computer Society, (2004)Large Scale distributed watermarking of multicast media through encryption., and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)The CDT mStar environment: scalable distributed teamwork in action., , and . GROUP, page 167-176. ACM, (1997)User-Interest Driven Video Adaptation for Collaborative Workspace Applications., , and . Networked Group Communication, volume 2816 of Lecture Notes in Computer Science, page 3-12. Springer, (2003)Distributed Education Using the mStar Environment., , , and . J. Univers. Comput. Sci., 4 (10): 807-823 (1998)The extended clarinet., , , and . NIME, page 162-167. nime.org, (2016)A Study on Users' Preference on Interruption When Using Wearable Computers and Head Mounted Displays., , , , and . PerCom, page 149-158. IEEE Computer Society, (2005)