Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implementation of the Uniform Authentication Based on Web Service., , , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 87-92. Springer, (2011)Interactive Visualization of Network Anomalous Events., and . ICCS (1), volume 5544 of Lecture Notes in Computer Science, page 450-459. Springer, (2009)A Privacy Algorithm for 3D Human Body Scans., and . International Conference on Computational Science (4), volume 3994 of Lecture Notes in Computer Science, page 870-877. Springer, (2006)Empathic Computing.. Ambient Intelligence in Everyday, volume 3864 of Lecture Notes in Computer Science, Springer, (2006)Place Your Next Branch with MILE-RUN: Min-dist Location Selection over User Movement., , , and . Inf. Sci., (2018)Traffic camera markup language (TCML)., , and . Visual Information Processing and Communication, volume 8305 of SPIE Proceedings, page 830510. SPIE, (2012)Video intelligence workshop (VI-2010).. ICCS, volume 1 of Procedia Computer Science, page 2509. Elsevier, (2010)A Task Allocation Algorithm for Profit Maximization in NFC-RAN., , , , , and . IWCMC, page 203-207. IEEE, (2019)BioSim--a biomedical character-based problem solving environment., , , , , and . Future Gener. Comput. Syst., 21 (7): 1145-1156 (2005)Visual Thinking for Ambient Intelligence.. AMIF, volume 1 of Ambient Intelligence and Smart Environments, page 7. IOS Press, (2008)