Author of the publication

Configuring and controlling ubiquitous computing infrastructure with semantic connections: a tangible and an AR approach.

, , , , and . Pers. Ubiquitous Comput., 17 (4): 783-799 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating test cases from UML activity diagram based on Gray-box method, , , , , and . Software Engineering Conference, 2004. 11th Asia-Pacific, page 284- 291. (2004)A Lower Bound of the L2 Norm Error Estimate for the Adini Element of the Biharmonic Equation., and . SIAM J. Numerical Analysis, 51 (5): 2651-2659 (2013)A computationally efficient associative memory model of hippocampus CA3 by spiking neurons., , , and . IJCNN, page 1-8. IEEE, (2013)First-principles studies of the electronic properties of native and substitutional anionic defects in bulk iron pyrite, , , and . Phys. Rev. B, 85 (8): 085203 (February 2012)A Privilege Separation Method for Security Commercial Transactions., , , and . e-Forensics, volume 56 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 185-192. Springer, (2010)StoryML: Enabling Distributed Interfaces for Interactive Media.. WWW (Posters), (2003)Web structure model based on granular computing., and . GrC, page 245-250. IEEE Computer Society, (2009)Graph-Based Detector for BLAST Architecture., and . ICC, page 1018-1023. IEEE, (2007)AdMoVeo: An Educational Robotic Platform For Learning Behavior Programming, and . DeSForM 2009: Design and Semantics of Form and Movement, page 218--219. (2009)Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels, and . CoRR, (2013)