Author of the publication

Contextual Research on Elderly Users' Needs for Developing Universal Design Mobile Phone.

, , , , , and . HCI (5), volume 4554 of Lecture Notes in Computer Science, page 950-959. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outside the Head Thinking: A Novel Approach for Detecting Human Brain Cognition., , , and . HCI (26), volume 617 of Communications in Computer and Information Science, page 203-208. Springer, (2016)Supporting Address Autoconfiguration for IPv6 in IEEE 802.16e Based Network., , , and . ICCSA (1), volume 5072 of Lecture Notes in Computer Science, page 938-947. Springer, (2008)Design of Active HoneyPot System., , , and . ICCSA (2), volume 2668 of Lecture Notes in Computer Science, page 356-364. Springer, (2003)A Simplified Half Pixel Motion Estimation Algorithm Based on the Spatial Correlation., and . PCM (2), volume 3332 of Lecture Notes in Computer Science, page 818-823. Springer, (2004)A Review on the Computational Methods for Emotional State Estimation from the Human EEG., , , and . Comput. Math. Methods Medicine, (2013)An Effective Authentication Scheme for Mobile Node with Fast Roaming Property., , and . ICCSA (1), volume 3480 of Lecture Notes in Computer Science, page 559-568. Springer, (2005)Mutual Authentication Scheme in Proxy Mobile IP., , and . ICCSA Workshops, page 65-72. IEEE Computer Society, (2008)Product Heterogeneity: Moderating Effect on Online Consumer Behavior., , , and . HICSS, page 153. IEEE Computer Society, (2007)Performance Analysis of the Mobility Anchor Point in Hierarchical Mobile IPv6., , and . IEICE Trans. Commun., 89-B (10): 2715-2721 (2006)An Authentication Scheme Between Wireless LAN and Mobile IPv6 During Handover., and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 885-894. Springer, (2006)