Author of the publication

Virtual Reality Simulation Training for Dental Surgery.

, , , , , , , and . MMVR, volume 142 of Studies in Health Technology and Informatics, page 435-437. IOS Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational and Symbolic Anonymity in an Unbounded Network., , and . JSIAM Lett., (2009)On the Anonymization of Differentially Private Location Obfuscation., and . ISITA, page 159-163. IEEE, (2018)Dental Haptic Simulator to Train Hand Skill of Student - Calibration Method to Realize Visual Haptic Environment., , , , , , , and . MMVR, volume 142 of Studies in Health Technology and Informatics, page 429-431. IOS Press, (2009)Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption., , and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 158-180. Springer, (2009)Quantitative Information Flow for Scheduler-Dependent Systems., and . QAPL, volume 194 of EPTCS, page 48-62. (2015)Information Leakage Games: Exploring Information as a Utility Function., , , and . CoRR, (2020)Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy., , , and . CoRR, (2023)Restricted Local Differential Privacy for Distribution Estimation with High Data Utility., and . CoRR, (2018)Virtual Reality Simulation Training for Dental Surgery., , , , , , , and . MMVR, volume 142 of Studies in Health Technology and Informatics, page 435-437. IOS Press, (2009)LeakWatch: Estimating Information Leakage from Java Programs., , and . ESORICS (2), volume 8713 of Lecture Notes in Computer Science, page 219-236. Springer, (2014)