Author of the publication

Can smartphone-based logging support diabetologists in solving glycemic control problems?

, , , , , , and . volume 198 of Studies in Health Technology and Informatics, page 188-195. iOS Press, Amsterdam, (2014)
DOI: 10.3233/978-1-61499-397-1-188

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Format-compliant jpeg2000 encryption with combined packet header and packet body protection., , and . MM&Sec, page 87-96. ACM, (2007)Physical Activity in Cardiac Rehabilitation: Towards Citizen-Centered Digital Evidence-Based Interventions., , , , , and . EFMI-STC, volume 275 of Studies in Health Technology and Informatics, page 228-229. IOS Press, (2020)Subjective and objective quality assessment of transparently encrypted JPEG2000 images., , , , and . MM&Sec, page 247-252. ACM, (2010)Efficient and Rate-Distortion Optimal Wavelet Packet Basis Selection in JPEG2000., and . IEEE Trans. Multim., 14 (2): 264-277 (2012)Efficient wavelet packet basis selection in JPEG2000., and . ICIP, page 317-320. IEEE, (2011)Demo A mobile augmented reality system for portion estimation, , , and . International Symposium on Mixed and Augmented reality -- Media, Arts, Social Science, Humanities and Design (ISMAR-MASH’D, München 2014), page 375-376. Piscataway, IEEE, (2014)JPEG2000 Part 2 wavelet packet subband structures in fingerprint recognition., , and . VCIP, volume 7744 of SPIE Proceedings, page 77442C. SPIE, (2010)On Format-Compliant Iterative Encryption of JPEG2000., and . ISM, page 985-990. IEEE Computer Society, (2006)Non-Blind Structure-Preserving Substitution Watermarking of H.264/CAVLC Inter-Frames., , and . IEEE Trans. Multim., 16 (5): 1337-1349 (2014)On JPEG2000 Error Concealment Attacks., and . PSIVT, volume 5414 of Lecture Notes in Computer Science, page 851-861. Springer, (2009)