Author of the publication

uLearn: Facilitating Ubiquitous Learning through Camera Equipped Mobile Phones.

, and . WMTE, page 274-281. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Intrusion Detection of Emerging Threats., , , and . IEEE Trans. Netw. Serv. Manag., 19 (1): 582-600 (2022)Multimodal QoE evaluation in P2P-based IPTV systems., , , , and . ACM Multimedia, page 1321-1324. ACM, (2011)Evaluating the Real-World Performance of 5G Fixed Wireless Broadband in Rural Areas., , , and . 5G World Forum, page 465-470. IEEE, (2019)Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems., , , , , and . CPSIOTSEC@CCS, page 63-68. ACM, (2021)To All Intents and Purposes: Towards Flexible Intent Expression., , , and . NetSoft, page 31-37. IEEE, (2021)Safe and Secure Software-Defined Networks for Smart Electricity Substations., , , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 179-191. Springer, (2020)Just Browsing?: Understanding User Journeys in Online TV., , , and . ACM Multimedia, page 965-968. ACM, (2014)P2P-Based IPTV Services: Design, Deployment, and QoE Measurement., , , , , , and . IEEE Trans. Multim., 14 (6): 1515-1527 (2012)Reconciling community resource requirements in U-Nets., , , , and . U-NET@CoNEXT, page 19-24. ACM, (2009)Don't get stung, cover your ICS in honey: How do honeypots fit within industrial control system security., , , and . Comput. Secur., (2022)