Author of the publication

A Conceptual Approach to Enhance the Well-Being of Elderly People.

, , , , , and . EPIA (2), volume 11805 of Lecture Notes in Computer Science, page 50-61. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Marreiros, Goreti
add a person with the name Marreiros, Goreti
 

Other publications of authors with the same name

Workshop on Smart Offices and Other Workplaces., , and . Intelligent Environments (Workshops), volume 21 of Ambient Intelligence and Smart Environments, page 3. IOS Press, (2016)Contexts-Management Strategy in Considering the Security in Urban Computing Based on Urban Design., , , , , and . IMIS, page 65-72. IEEE Computer Society, (2011)An Architecture for Proactive Maintenance in the Machinery Industry., , , , , , , , and . ISAmI, volume 615 of Advances in Intelligent Systems and Computing, page 254-262. Springer, (2017)Scheduling through Group Decision Support with Adaptive Hypermedia., , and . CISched, page 105-112. IEEE, (2007)Entropy and Organizational Performance., , , , , , , , , and 4 other author(s). HAIS, volume 11734 of Lecture Notes in Computer Science, page 206-217. Springer, (2019)Using Personality Types to Support Argumentation., , , , and . ArgMAS, volume 6057 of Lecture Notes in Computer Science, page 292-304. Springer, (2009)GLSS - Group Learning in Shared Spaces Considering Aspects Like Emotion and Personality., , and . ISAmI, volume 72 of Advances in Intelligent and Soft Computing, page 37-44. Springer, (2010)Including cognitive aspects in multiple criteria decision analysis., , , , and . Ann. Oper. Res., 265 (2): 269-291 (2018)Fast anomaly detection with locality-sensitive hashing and hyperparameter autotuning., , , , and . Inf. Sci., (2022)Performance evaluation of unsupervised techniques in cyber-attack anomaly detection., , , , , , and . J. Ambient Intell. Humaniz. Comput., 11 (11): 4477-4489 (2020)