Author of the publication

Augmenting VR/AR Applications with EEG/EOG Monitoring and Oculo-Vestibular Recoupling.

, , , , , , , , , , , , , , and . HCI (13), volume 9743 of Lecture Notes in Computer Science, page 121-131. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing degree distributions in LT codes by using the multiobjective evolutionary algorithm based on decomposition., , , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2010)Off-Chain Trusted Computing., , and . IEEE Internet Things Mag., 3 (2): 8-9 (2020)An error-floor reduction technique for short-length LT codes., , and . ISITA, page 279-283. IEEE, (2014)An fMRI study of abrupt-awake episodes during behavioral microsleeps., , , , and . EMBC, page 5060-5063. IEEE, (2011)BATched Sparse (BATS) Coding Scheme for Multi-hop Data Transport., , , and . RFC, (July 2023)SNR analysis of high-frequency steady-state visual evoked potentials from the foveal and extrafoveal regions of Human Retina., , , , , , , , , and . EMBC, page 1810-1814. IEEE, (2012)OpenFog security requirements and approaches., , , , , , , and . FWC, page 1-6. IEEE, (2017)BCI Ontology: A Context-based Sense and Actuation Model for Brain-Computer Interactions., and . SSN@ISWC, volume 2213 of CEUR Workshop Proceedings, page 32-47. CEUR-WS.org, (2018)Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol., , and . SoICT, page 173-179. ACM, (2016)Augmented Brain Computer Interaction Based on Fog Computing and Linked Data., , , , , , , and . Intelligent Environments, page 374-377. IEEE, (2014)