From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process., , , и . ACSW, том 44 из CRPIT, стр. 145-151. Australian Computer Society, (2005)Exploiting contexts with house log for value-added smart TV services., , , , и . GCCE, стр. 258-259. IEEE, (2014)Exploiting House Log of Home Network System to Derive Contexts with Past Situations., , , , и . ICCASA, стр. 13-18. ACM, (2014)Mission-oriented large-scale environment sensing based on analogy of military system., , , и . iiWAS, стр. 414-421. ACM, (2016)Visualizing and analyzing street crimes using personalized security information service PRISM., , и . iiWAS, стр. 208-214. ACM, (2017)Considering Online Feature Interaction Detection and Resolution for Integrated Services in Home Network System., , , и . ICFI, стр. 191-206. IOS Press, (2009)Implementation and evaluation of consumer-oriented lifelog service using daily receipts., , и . iiWAS, стр. 337-340. ACM, (2011)Characterizing user habituation in interactive voice interface: experience study on home network system., , и . iiWAS, стр. 375-378. ACM, (2011)Characterizing Safety of Integrated Services in Home Network System., , , и . ICOST, том 4541 из Lecture Notes in Computer Science, стр. 130-140. Springer, (2007)Integrating 3D Facial Model with Person-Centered Care Support System for People with Dementia., , и . IHSI, том 722 из Advances in Intelligent Systems and Computing, стр. 216-222. Springer, (2018)