Author of the publication

Exploiting House Log of Home Network System to Derive Contexts with Past Situations.

, , , , and . ICCASA, page 13-18. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An analysis of developer metrics for fault prediction., , , , and . PROMISE, page 18. ACM, (2010)Design and evaluation of birthmarks for detecting theft of java programs., , and . IASTED Conf. on Software Engineering, page 569-574. IASTED/ACTA Press, (2004)Design and Evaluation of the Home Network Systems Using the Service Oriented Architecture., , and . ICETE (1), page 62-69. INSTICC Press, (2004)Detecting Script-to-Script Interactions in Call Processing Language., , , and . FIW, page 215-230. IOS Press, (2003)Considering Common Data Model for Indoor Location-aware Services., , , and . LocWeb, page 25-32. ACM, (2014)Design and Evaluation of Lifelog Mashup Platform with NoSQL Database., , , and . iiWAS, page 133. ACM, (2013)A dynamic analysis technique to extract symptoms that suggest side effects in framework applications., , , and . SAC, page 1176-1178. ACM, (2014)User Context Query Service Supporting Home Person-Centered Care for Elderly People., , and . IHSI, volume 722 of Advances in Intelligent Systems and Computing, page 112-118. Springer, (2018)PRISM: Visualizing Personalized Real-Time Incident on Security Map., , and . Int. J. Softw. Innov., 6 (4): 46-58 (2018)Constructing Home Network Systems and Integrated Services Using Legacy Home Appliances and Web Services., , , , and . Int. J. Web Serv. Res., 5 (1): 82-98 (2008)