Author of the publication

A Context-Aware Web Content Generator Based on Personal Tracking.

, , , , and . W2GIS, volume 7236 of Lecture Notes in Computer Science, page 134-150. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges for the Future Mobile Communication Systems., , , and . Mob. Inf. Syst., (2017)TPRED: a Spatio-Temporal Location Predictor Framework., , , , , , and . IDEAS, page 34-42. ACM, (2016)Machine Learning and Location Fingerprinting to Improve UX in a Ubiquitous Application., , , , and . HCI (19), volume 9749 of Lecture Notes in Computer Science, page 168-179. Springer, (2016)IoT Games and Gamified Systems: Summertime Sadness or Lust for Hype?, , , , , and . IHC, page 23:1-23:12. ACM, (2023)CLUE: A Usability Evaluation Checklist for Multimodal Video Game Field Studies with Children Who Are Blind., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)Clariisa, a context-aware framework based on geolocation for a health care governance system., , , , , , , and . Healthcom, page 334-339. IEEE, (2013)Dimensions for the design and evaluation of multimodal videogames for the cognition of people who are blind., , and . IHC, page 20:1-20:4. ACM, (2015)Detecting Malicious Manipulation in Grid Environments., , , , and . SBAC-PAD, page 28-35. IEEE Computer Society, (2006)An energy-efficient passive monitoring system for wireless sensor networks., , and . SustainIT, page 1-3. IEEE, (2012)A Grid Computing Diagnosis Model for Tolerating Manipulation Attacks., , , , and . Int. Trans. Syst. Sci. Appl., 2 (2): 135-146 (2006)