Author of the publication

Integrating Mobile Devices into Semantic Services Environments

, , and . Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, page 137--143. Washington, DC, USA, IEEE Computer Society, (2008)
DOI: 10.1109/ICWMC.2008.77

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

InfoInternet for Education in the Global South: A Study of Applications Enabled by Free Information-only Internet Access in Technologically Disadvantaged Areas (authors' version)., , and . CoRR, (2018)License Transfer Mechanisms through Seamless SIM Authentication - Rights Management based on SIM Keys., , and . WINSYS, page 333-338. INSTICC Press, (2006)Integrating Mobile Devices into Semantic Services Environments, , and . Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, page 137--143. Washington, DC, USA, IEEE Computer Society, (2008)5G: Service Continuity in Heterogeneous Environments., and . Wireless Personal Communications, 57 (3): 413-429 (2011)Building Trustable Remote Monitoring and Management Systems., , and . UCC Companion, page 213-219. IEEE, (2018)Special issue: Reconfigurable wireless communication systems., and . Wirel. Commun. Mob. Comput., 2 (8): 785-787 (2002)Privacy Labelling and the Story of Princess Privacy and the Seven Helpers., , , , , , , , and . CoRR, (2020)A Methodology for Security Classification applied to Smart Grid Infrastructures., , , and . Int. J. Crit. Infrastructure Prot., (2020)Bridging the Digital Divide: Challenges in Opening the Digital World to the Elderly, Poor, and Digitally Illiterate., , , and . IEEE Consumer Electron. Mag., 8 (1): 78-81 (2019)Sociality brings Security in Content Sharing., , , and . J. Comput., 5 (12): 1839-1846 (2010)