Author of the publication

Location Privacy for Users of Wireless Devices through Cloaking.

, , and . HICSS, page 295. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking An Interdisciplinary Concurrent Design Methodology for Electronic/Mechanical Systems., , , , , and . DAC, page 514-519. ACM Press, (1995)The impact of battery capacity and memory bandwidth on CPU speed-setting: a case study., and . ISLPED, page 200-205. ACM, (1999)A User-Independent and Sensor-Tolerant Wearable Activity Classifier., , , , and . Computer, 48 (10): 64-71 (2015)Modeling the Perception of Rigor in Large-Scale Curricular Change., , , and . FIE, page 1-5. IEEE, (2019)A Research Focused Approach to Customer Discovery., , and . ProComm, page 42-48. IEEE, (2022)Quality-Driven Proactive Computation Elimination for Power-Aware Multimedia Processing., , , and . DATE, page 340-345. IEEE Computer Society, (2005)A Formal Framework for Modeling and Analysis of System-Level Dynamic Power Management., , , , and . ICCD, page 119-126. IEEE Computer Society, (2005)Using a PCB Layout Tool to Create Embroidered Circuits., , , and . ISWC, page 105-106. IEEE Computer Society, (2007)Experiences Teaching a Course on Wearable and Ubiquitous Computing.. PerCom Workshops, page 252-256. IEEE Computer Society, (2004)Location Privacy for Users of Wireless Devices through Cloaking., , and . HICSS, page 295. IEEE Computer Society, (2008)