Author of the publication

JPL BioSleeve for gesture-based control: Technology development and field trials.

, , , , and . TePRA, page 1-6. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A taint marking approach to confidentiality violation detection., , , and . AISC, volume 125 of CRPIT, page 83-90. Australian Computer Society, (2012)Information Sharing in the 21st century: Progress and Challenges., , , and . AISC, volume 105 of CRPIT, page 2. Australian Computer Society, (2010)DRM, Trusted Computing and Operating System Architecture., and . ACSW, volume 44 of CRPIT, page 127-136. Australian Computer Society, (2005)SPCC: a security policy compliance checker plug-in for YAWL., , and . Int. J. Bus. Process. Integr. Manag., 9 (1): 22-31 (2018)JPL BioSleeve for gesture-based control: Technology development and field trials., , , , and . TePRA, page 1-6. IEEE, (2015)Optimal Budget Allocation in Budget-based Access Control., , , and . ARES, page 591-596. IEEE Computer Society, (2011)Floating-base manipulation on zero-perturbation manifolds., , and . CoRR, (2023)A policy model for access control using building information models., , , and . Int. J. Crit. Infrastructure Prot., (2018)A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems., , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 403-415. Springer, (2003)If it's encrypted its secure! The viability of US state-based encryption exemptions., , and . ISTAS, page 96-102. IEEE, (2010)