From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient security algorithm in mobile computing for resource constrained mobile devices., и . Q2SWinet, стр. 113-114. ACM, (2008)An efficient wireless communication protocol for secured transmission of content-sensitive multimedia data., и . WOWMOM, стр. 1-6. IEEE Computer Society, (2009)Recognition of false alarms in fall detection systems., , , , , и . CCNC, стр. 23-28. IEEE, (2011)Multi-Level Priority Queue Scheduling Algorithm for Critical Packet Loss Elimination during Handoff., и . CNSR, стр. 275-281. IEEE Computer Society, (2005)Preface., и . EUSPN/ICTH, том 21 из Procedia Computer Science, стр. 292-294. Elsevier, (2013)Middleware architecture for patient care data transmission using wireless networks., и . IWCMC, стр. 182-185. ACM, (2007)Mobile Agent Based Messaging Mechanism for Emergency Medical Data Transmission Over Cellular Networks., , и . COMSWARE, IEEE, (2007)Agent-Based Mobile Middleware Architecture (AMMA) for Patient-Care Clinical Data Messaging Using Wireless Networks., и . DS-RT, стр. 326-329. IEEE Computer Society, (2008)Healthcare event aggregation lab (HEAL), a knowledge sharing platform for anomaly detection and prediction., , и . HealthCom, стр. 648-652. IEEE, (2015)Developing cognitive decline baseline for normal ageing from sleep-EEG monitoring using wireless neurosensor devices., , и . CCECE, стр. 1527-1531. IEEE, (2011)