Author of the publication

Spatio-Temporal Coverage Enhancement in Drive-By Sensing Through Utility-Aware Mobile Agent Selection.

, , , , and . ICIOT, volume 12405 of Lecture Notes in Computer Science, page 108-124. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical Analysis of Window Sizes and Sampling Rates in Human Activity Recognition., , , , , , and . HEALTHINF, page 319-325. SciTePress, (2017)Techniques for efficient fragment detection in web pages., , , and . CIKM, page 516-519. ACM, (2003)Performance modeling of computation and communication tradeoffs in vertex-centric graph processing clusters., , and . CollaborateCom, page 55-63. ICST / IEEE, (2014)Preface., , , and . CollaborateCom, ICST / IEEE, (2012)Universal Metadata Repository: Integrating Data Profiles Across an Organization., , , , , , and . IRI, page 452-459. IEEE, (2018)Effective & Efficient Access Control in Smart Farms: Opportunities, Challenges & Potential Approaches., and . ICISSP, page 445-452. SCITEPRESS, (2022)F4D: Factorized 4D Convolutional Neural Network for Efficient Video-Level Representation Learning., , and . ICAART (3), page 1002-1013. SCITEPRESS, (2024)Challenges and Approaches to Teaching Data Science Technologies in an Information Technology Program with Non-Traditional Students., and . CIC, page 49-56. IEEE, (2019)Toward Low-Cost and Sustainable IoT Systems for Soil Monitoring in Coastal Wetlands., , , , , , , and . CIC, page 52-61. IEEE, (2023)Privacy Vulnerabilities of Wearable Activity Monitors: Threat and Potential Defence., , and . CIC, page 105-116. IEEE, (2021)