From post

Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment.

, , и . COMPSAC (2), стр. 269-274. IEEE Computer Society, (2007)978-0-7695-2870-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Elderly Safety: A Smartphone Based Real Time Approach., , , и . ICOST, том 7910 из Lecture Notes in Computer Science, стр. 134-142. Springer, (2013)Wellness assistant: a virtual wellness assistant using pervasive computing., , , и . SAC, стр. 782-787. ACM, (2007)Architecture and Implementation of a trust Model for Pervasive Applications., , , и . J. Mobile Multimedia, 4 (2): 84-103 (2008)Feature Boosting in Natural Image Classification., , , , , , и . COMPSAC (2), стр. 61-67. IEEE, (2019)Privacy Challenges and Goals in mHealth Systems., , , , и . Advances in Computers, (2016)A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers., , и . TSA, стр. 14-21. IEEE, (2014)Special track on Middleware Engineering (ME): editorial message., и . SAC, стр. 479-480. ACM, (2008)ePet: when cellular phone learns to recognize its owner., , , и . SafeConfig, стр. 13-18. ACM, (2009)Preserving User Privacy in Pervasive Environments with a Collaborative Model., , , и . SERE (Companion), стр. 84-93. IEEE, (2013)Design and implementation of an open framework for ubiquitous carbon footprint calculator applications., , , , и . Sustain. Comput. Informatics Syst., 1 (4): 257-274 (2011)