Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architecture and Implementation of a trust Model for Pervasive Applications., , , and . J. Mobile Multimedia, 4 (2): 84-103 (2008)Wellness assistant: a virtual wellness assistant using pervasive computing., , , and . SAC, page 782-787. ACM, (2007)Preserving User Privacy in Pervasive Environments with a Collaborative Model., , , and . SERE (Companion), page 84-93. IEEE, (2013)Feature Boosting in Natural Image Classification., , , , , , and . COMPSAC (2), page 61-67. IEEE, (2019)Design and implementation of an open framework for ubiquitous carbon footprint calculator applications., , , , and . Sustain. Comput. Informatics Syst., 1 (4): 257-274 (2011)A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers., , and . TSA, page 14-21. IEEE, (2014)Privacy Challenges and Goals in mHealth Systems., , , , and . Advances in Computers, (2016)ePet: when cellular phone learns to recognize its owner., , , and . SafeConfig, page 13-18. ACM, (2009)Special track on Middleware Engineering (ME): editorial message., and . SAC, page 479-480. ACM, (2008)Elderly Safety: A Smartphone Based Real Time Approach., , , and . ICOST, volume 7910 of Lecture Notes in Computer Science, page 134-142. Springer, (2013)