Author of the publication

Guardian Angel: A Smartphone Based Personal Security System for Emergency Alerting.

, , , , , , , , and . UIC/ATC/ScalCom, page 221-228. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited., , , , and . Des. Codes Cryptogr., 91 (5): 1889-1910 (May 2023)Recognizing the Operating Hand from Touchscreen Traces on Smartphones., , , , , , , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 199-211. Springer, (2015)Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles., , , , , , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 13-23. Springer, (2016)iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running., , , , , and . WASA, volume 9798 of Lecture Notes in Computer Science, page 186-196. Springer, (2016)iProtect: Detecting Physical Assault Using Smartphone., , , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 477-486. Springer, (2015)A combinatorial double auction mechanism for cloud resource group-buying., , , , and . IPCCC, page 1-8. IEEE Computer Society, (2014)Guardian Angel: A Smartphone Based Personal Security System for Emergency Alerting., , , , , , , , and . UIC/ATC/ScalCom, page 221-228. IEEE Computer Society, (2015)SDXS: Real-Time One-Step Latent Diffusion Models with Image Conditions., , and . CoRR, (2024)Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs., , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 29-39. Springer, (2015)STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets., , , , , , and . ICA3PP (4), volume 9531 of Lecture Notes in Computer Science, page 427-441. Springer, (2015)