Author of the publication

A method using the same light sensor for detecting multiple events near a window in crimes involving intrusion into a home.

, , , and . Artif. Life Robotics, 15 (1): 30-32 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction of Parallel Random I/O Codes Using Coset Coding with Hamming Codes., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (12): 2125-2134 (2018)Evaluation of mechanisms introduced to improve performance of TSVM cache., and . Parallel and Distributed Computing and Networks, page 502-507. IASTED/ACTA Press, (2004)Battery Life Estimation of Sensor Node with Zero Standby Power Consumption., and . CSE/EUC/DCABES, page 166-172. IEEE Computer Society, (2016)Coherence Maintenances to realize an efficient parallel processing for a Cache Memory with Synchronization on a Chip-Multiprocessor., and . ISPAN, page 324-333. IEEE Computer Society, (2005)Memory Access Optimization for Former Process of Pencil Drawing Style Image Conversion in High-Level Synthesis., and . PDCAT, volume 13798 of Lecture Notes in Computer Science, page 57-68. Springer, (2022)Worst-Case Performance of ILIFC with Inversion Cells., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (12): 2662-2670 (2017)Proposal of an ultrasonic sensor array with flexible and scalable organization., , and . Artif. Life Robotics, 24 (2): 189-194 (2019)Omnidirectional Background Scrolling in High-Level Synthesis Oriented Game Programing Library., and . TENCON, page 140-144. IEEE, (2021)An Upper Bound on the Generalized Cayley Distance., , and . ISITA, page 600-604. IEEE, (2018)A Generic Describing Method of Memory Latency Hiding in a High-level Synthesis Technology, and . ACEEE International Journal on Information Technology, 2 (2): 5 (April 2012)