Author of the publication

A Survey of Location Privacy and an Approach for Solitary Users.

, and . HICSS, page 163. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonideal Battery Properties and Their Impact on Software Design for Wearable Computers., and . IEEE Trans. Computers, 52 (8): 979-984 (2003)Benchmarking An Interdisciplinary Concurrent Design Methodology for Electronic/Mechanical Systems., , , , , and . DAC, page 514-519. ACM Press, (1995)The impact of battery capacity and memory bandwidth on CPU speed-setting: a case study., and . ISLPED, page 200-205. ACM, (1999)Medical Monitoring Applications for Wearable Computing., , and . Comput. J., 47 (4): 495-504 (2004)A User-Independent and Sensor-Tolerant Wearable Activity Classifier., , , , and . Computer, 48 (10): 64-71 (2015)Tools for Interdisciplinary Design of Pervasive Computing., and . Int. J. Pervasive Comput. Commun., 8 (2): 112-132 (2012)Experiences Teaching a Course on Wearable and Ubiquitous Computing.. PerCom Workshops, page 252-256. IEEE Computer Society, (2004)Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants., , , and . PerCom, page 127-136. IEEE Computer Society, (2005)Location Privacy for Users of Wireless Devices through Cloaking., , and . HICSS, page 295. IEEE Computer Society, (2008)A Formal Framework for Modeling and Analysis of System-Level Dynamic Power Management., , , , and . ICCD, page 119-126. IEEE Computer Society, (2005)