Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A peer-to-peer overlay for context information search., , and . ICCCN, page 395-400. IEEE, (2005)An error concealment adaptive framework for intra-frames., , , and . ICIP, page 1880-1884. IEEE, (2013)A data-driven methodology for solving the control strategy of descriptor systems., , and . ASCC, page 1-6. IEEE, (2013)Information retrieval in schema-based P2P systems using one-dimensional semantic space., , and . Comput. Networks, 51 (16): 4543-4560 (2007)Introduction to the special section on intelligent systems for socially aware computing., , , and . ACM TIST, 4 (3): 45:1-45:3 (2013)Supporting Impromptu Service Discovery and Access in Heterogeneous Assistive Environments., , , and . ICOST, volume 4541 of Lecture Notes in Computer Science, page 238-246. Springer, (2007)Anti-fall: A Non-intrusive and Real-Time Fall Detector Leveraging CSI from Commodity WiFi Devices., , , and . ICOST, volume 9102 of Lecture Notes in Computer Science, page 181-193. Springer, (2015)Reliable Control of Fuzzy Descriptor Systems with Time-Varying Delay., , , , and . FSKD, volume 4223 of Lecture Notes in Computer Science, page 169-178. Springer, (2006)Inverse Reinforcement Learning with Multiple Ranked Experts., , and . CoRR, (2019)Contactless Respiration Monitoring Using Ultrasound Signal With Off-the-Shelf Audio Devices., , , , , , and . IEEE Internet Things J., 6 (2): 2959-2973 (2019)