Author of the publication

MVPTrack: Energy-Efficient Places and Motion States Tracking.

, , , and . MobiQuitous, volume 131 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 721-725. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying respiratory sounds using electronic stethoscope., , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-8. IEEE, (2017)Research on concurrent actions in multi-agent systems., , and . ACM SIGSOFT Softw. Eng. Notes, 23 (4): 83 (1998)Beyond Smartphone Overuse: Identifying Addictive Mobile Apps., , , and . CHI Extended Abstracts, page 2821-2828. ACM, (2016)Is faster better?: a study of video playback speed., , , and . LAK, page 260-269. ACM, (2020)The conference was reorganized to a virtual event due to the international COVID-19 health crisis..A Toolkit for Usability Testing of Mobile Applications., , , , , and . MobiCASE, volume 95 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 226-245. Springer, (2011)Respiratory Sounds Feature Learning with Deep Convolutional Neural Networks., , , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 170-177. IEEE Computer Society, (2017)Design and Implementation of a Large-Scale Context Fusion Network., , and . MobiQuitous, page 246-255. IEEE Computer Society, (2004)Context Aggregation and Dissemination in Ubiquitous Computing Systems., and . WMCSA, page 105-. IEEE Computer Society, (2002)DeepFood: Deep Learning-Based Food Image Recognition for Computer-Aided Dietary Assessment., , , , , and . ICOST, volume 9677 of Lecture Notes in Computer Science, page 37-48. Springer, (2016)Detecting Wormhole Attacks in Wireless Sensor Networks., , , and . Critical Infrastructure Protection, volume 253 of IFIP, page 267-279. Springer, (2007)