Author of the publication

A Vision-based Virtual Sensor to Enhance Privacy and Energy Efficiency on Edge Computing.

, , , , , , and . PerCom Workshops, page 625-630. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Policy Optimization for Dynamic Power Management., , , and . DAC, page 182-187. ACM Press, (1998)Efficient switching activity computation during high-level synthesis of control-dominated designs., , , and . ISLPED, page 127-132. ACM, (1999)FPGA-Based Parallel Comparison of Run-Length-Encoded Strings., , , and . FPL, volume 3203 of Lecture Notes in Computer Science, page 1101-1103. Springer, (2004)Gamification in mobile applications usability evaluation: A New Approach., and . MobileHCI Adjunct, page 897-899. ACM, (2015)Accelerating distributed averaging in sensor networks: Randomized gossip over virtual coordinates., , and . SAS, page 1-6. IEEE, (2016)Idleness as a resource in energy-neutral WSNs., , and . ENSSys@SenSys, page 12:1-12:6. ACM, (2013)Policy optimization for dynamic power management., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 18 (6): 813-833 (1999)Parameterized RTL power models for combinational soft macros., , , and . ICCAD, page 284-288. IEEE Computer Society, (1999)Modeling and Verification of the Worth-One-Minute Security Protocols., , , , and . ITASEC, volume 2597 of CEUR Workshop Proceedings, page 24-35. CEUR-WS.org, (2020)Synthesis of combinational circuits with special fault-handling capabilitie., and . VTS, page 454-459. IEEE Computer Society, (1995)