Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Display power management policies in practice., , , and . ICAC, page 51-60. ACM, (2010)Efficient location aware intrusion detection to protect mobile devices., , , , and . Personal and Ubiquitous Computing, 18 (1): 143-162 (2014)Performance Analysis of Location Profile Routing., , , , and . CoRR, (2014)ADEL: an automatic detector of energy leaks for smartphone applications., , , , , and . CODES+ISSS, page 363-372. ACM, (2012)Indoor localization without infrastructure using the acoustic background spectrum., , , and . MobiSys, page 155-168. ACM, (2011)Learning and Leveraging the Relationship between Architecture-Level Measurements and Individual User Satisfaction, , , , , , and . SIGARCH Comput. Archit. News, 36 (3): 427--438 (2008)Protecting Private Data on Mobile Systems based on Spatio-temporal Analysis., , , and . PECCS, page 114-123. SciTePress, (2011)Minimalistic Image Signal Processing for Deep Learning Applications., , , and . ICIP, page 4165-4169. IEEE, (2019)Panappticon: Event-based tracing to measure mobile application and platform performance., , , , and . CODES+ISSS, page 33:1-33:10. IEEE, (2013)TAPHS: thermal-aware unified physical-level and high-level synthesis., , , , and . ASP-DAC, page 879-885. IEEE, (2006)