Author of the publication

iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers.

, , , , and . CHI, page 1155-1164. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Partitioner for Behavior Level Distributed Logic Simulation., , , , , and . FORTE, volume 3731 of Lecture Notes in Computer Science, page 525-528. Springer, (2005)Efficient spare allocation in reconfigurable arrays., and . DAC, page 385-390. IEEE Computer Society Press, (1986)Resource Block Assignment for Interference Avoidance in Femtocell Networks., , , , , , and . VTC Fall, page 1-5. IEEE, (2012)MDP-trees: multi-domain macro placement for ultra large-scale mixed-size designs., , , and . ASP-DAC, page 557-562. ACM, (2019)A framework for the design of error-aware power-efficient fixed-width Booth multipliers., , , , and . ISCAS (1), page 81-84. IEEE, (2005)Memory forensics using virtual machine introspection for Malware analysis., , , and . DSC, page 518-519. IEEE, (2017)Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks., , and . VTC Fall, IEEE, (2009)SPT-based topology algorithm for constructing power efficient wireless ad hoc networks., , and . WWW (Alternate Track Papers & Posters), page 234-235. ACM, (2004)Enhancing bug hunting using high-level symbolic simulation., , , , and . ACM Great Lakes Symposium on VLSI, page 417-420. ACM, (2009)Multiple Failures Restoration by Group Protection in WDM Networks., , and . ICN (1), volume 3420 of Lecture Notes in Computer Science, page 186-193. Springer, (2005)