Author of the publication

The Use of Technology by Older Adults in El Paso, Texas during COVID-19: Purposes, Challenges, and Opportunities.

, , , , , , , and . ISC2, page 1-7. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Use of Technology by Older Adults in El Paso, Texas during COVID-19: Purposes, Challenges, and Opportunities., , , , , , , and . ISC2, page 1-7. IEEE, (2022)Multiplatform Career Guidance System Using IBM Watson, Google Home and Telegram - A User Experience and Usability Evaluation., , , and . UCAmI, volume 10586 of Lecture Notes in Computer Science, page 689-700. Springer, (2017)Optimization of Fuzzy Attitude Control for Nanosatellites., , , and . IntelliSys (2), volume 869 of Advances in Intelligent Systems and Computing, page 970-990. Springer, (2018)Fuzzy attitude control for a nanosatellite in low Earth orbit., , , and . Expert Syst. Appl., (2016)Using Technology to Teach Older Adults during the COVID-19 pandemic., , , , , , , and . ISC2, page 1-7. IEEE, (2022)EU FP7-288307 Pharaon Project: Parallel and Heterogeneous Architecture for Real-Time Applications., , , , , , , , , and 4 other author(s). DSD, page 371-378. IEEE Computer Society, (2013)Comparison of Fuzzy and PID Controllers for the Attitude Control of Nanosatellites., , , and . IntelliSys (2), volume 869 of Advances in Intelligent Systems and Computing, page 1062-1081. Springer, (2018)An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach., , , , and . NTMS, page 1-5. IEEE, (2016)End-to-end security assessment framework for connected vehicles., , , , and . WPMC, page 1-6. IEEE, (2019)EyeMath: Identifying Mathematics Problem Solving Processes in a RTS Video Game., , , and . GALA, volume 10056 of Lecture Notes in Computer Science, page 50-59. Springer, (2016)