Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Experimental Study on the Validity and Reliability of a Smartphone Application to Acquire Temporal Variables during the Single Sit-to-Stand Test with Older Adults., , , , , , , , and . Sensors, 21 (6): 2050 (2021)Analyzing Performance of Multi-cores and Applications with Cache-aware Roofline Model., , , and . HPCS, page 933-934. IEEE, (2017)Traffic, emissions and safety impacts of automated vehicles connecting a university and a science park., , and . MT-ITS, page 1-6. IEEE, (2021)Vulnerability & Blame: Making Sense of Unauthorized Access to Smartphones., , , , and . CHI, page 589. ACM, (2019)Privacy and secrecy in ubiquitous text messaging., , and . Mobile HCI (Companion), page 95-100. ACM, (2012)Mansard Roofline Model: Reinforcing the Accuracy of the Roofs., , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 6 (2): 7:1-7:23 (2021)Intelligent Virtual Assistant for Promoting Behaviour Change in Older People with T2D., , , , , , , , , and . EPIA (1), volume 11804 of Lecture Notes in Computer Science, page 372-383. Springer, (2019)Snooping on Mobile Phones: Prevalence and Trends., , , , and . SOUPS, page 159-174. USENIX Association, (2016)Usage of Subjective Scales in Accessibility Research., , and . ASSETS, page 59-67. ACM, (2015)Heterogeneous CPU+iGPU Processing for Efficient Epistasis Detection., , , , and . Euro-Par, volume 12247 of Lecture Notes in Computer Science, page 613-628. Springer, (2020)