Author of the publication

Learning and Recognizing the Places We Go.

, , , , and . UbiComp, volume 3660 of Lecture Notes in Computer Science, page 159-176. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybersecurity Strategies: The QuERIES Methodology., , and . Computer, 41 (8): 20-26 (2008)Chemometrics: From Data Preprocessing to Fog Computing., , , , , , , , , and . Int. J. Fog Comput., 2 (1): 1-42 (2019)Health Service Discovery and Composition in Ambient Assisted Living: the Australian Type 2 Diabetes Case Study., , , , and . HICSS, page 1337-1346. IEEE Computer Society, (2013)LoKey: Leveraging the SMS Network in Decentralized, End-to-End Trust Establishment., , , and . Pervasive, volume 3968 of Lecture Notes in Computer Science, page 202-219. Springer, (2006)Place Lab: Device Positioning Using Radio Beacons in the Wild., , , , , , , , , and 4 other author(s). Pervasive, volume 3468 of Lecture Notes in Computer Science, page 116-133. Springer, (2005)Learning and Recognizing the Places We Go., , , , and . UbiComp, volume 3660 of Lecture Notes in Computer Science, page 159-176. Springer, (2005)No free lunch in cyber security., and . MTD@CCS, page 1-12. ACM, (2014)Adults' Pain Recognition via Facial Expressions Using CNN-Based AU Detection., , , , , , and . ICIAP Workshops (1), volume 13373 of Lecture Notes in Computer Science, page 15-27. Springer, (2022)