Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust Evaluation in an Android System for Detection and Alert Falls., , , and . WebMedia, page 111-114. ACM, (2014)Quality characteristics and measures for human-computer interaction evaluation in ubiquitous systems., , , , and . Softw. Qual. J., 25 (3): 743-795 (2017)Development Process for Self-adaptive Applications of the Internet of Health Things based on Movement Patterns., , and . ICHI, page 437-438. IEEE, (2021)Detection of Access Control Violations in the Secure Sharing of Cloud Storage., , , and . CLOSER, page 124-135. SciTePress, (2018)System Support for Self-Adaptive Cyber-Physical Systems., and . DCOSS, page 214-215. IEEE Computer Society, (2015)Communication analysis of real vehicular calibrated traces., , , , , , , , and . ICC, page 1-6. IEEE, (2016)Computational Solutions for Human Falls Classification., , , , and . IEEE Access, (2021)AQUArIUM - A suite of software measures for HCI quality evaluation of ubiquitous mobile applications., , and . J. Syst. Softw., (2018)SUCCEEd: Support Mechanism for Creating and Executing Workflows for Decoupled SAS in IoT., , , and . COMPSAC (2), page 738-743. IEEE Computer Society, (2018)978-1-5386-2667-2.How to improve monitoring and auditing security properties in cloud storage?, , , and . SBRC, (2017)