Author of the publication

Progressive Authentication: Deciding When to Authenticate on Mobile Phones.

, , , and . USENIX Security Symposium, page 301-316. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling energy efficient continuous sensing on mobile phones with LittleRock., , and . IPSN, page 420-421. ACM, (2010)Macroscopic Human Behavior Interpretation Using Distributed Imager and Other Sensors., , and . Proc. IEEE, 96 (10): 1657-1677 (2008)Towards precision monitoring of elders for providing assistive services., , , and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 49. ACM, (2008)FM-based indoor localization., , , and . MobiSys, page 169-182. ACM, (2012)Improving local search ranking through external logs., , , and . SIGIR, page 785-794. ACM, (2011)A medical, description logic based, ontology for skin lesion images., , and . BIBE, page 1-6. IEEE, (2008)Detecting Patterns for Assisted Living Using Sensor Networks: A Case Study, , and . Proceedings of the 2007 International Conference on Sensor Technologies and Applications, page 590--596. Washington, DC, USA, IEEE Computer Society, (2007)Sensor Localization and Camera Calibration in Distributed Camera Sensor Networks., , and . BROADNETS, IEEE, (2006)DeviceAR: techniques for device-oriented augmented reality interactions., , and . UbiComp/ISWC Adjunct, page 188-190. ACM, (2020)Towards Latency-aware DNN Optimization with GPU Runtime Analysis and Tail Effect Elimination., , , , , , , , , and 5 other author(s). CoRR, (2020)