Author of the publication

SSCP: An OSGi-based communication portal for Smart Space

, , , , and . Pervasive Computing (JCPC), 2009 Joint Conferences on, page 309 -314. (December 2009)
DOI: 10.1109/JCPC.2009.5420169

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visibility Filtering for Producing Indirect Illumination., , , , and . PG (Short Papers), Eurographics Association, (2014)An articulatory analysis of apical syllables in Standard Chinese., , , , , , and . O-COCOSDA/CASLRE, page 123-127. IEEE, (2015)The Intention to Download Music Files in a P2P Environment: Rational Choice, Fashion, and Ethical Decision Perspectives., , , and . PACIS, page 101. AISeL, (2006)34.2 A 16nm 96Kb Integer/Floating-Point Dual-Mode-Gain-Cell-Computing-in-Memory Macro Achieving 73.3-163.3TOPS/W and 33.2-91.2TFLOPS/W for AI-Edge Devices., , , , , , , , , and 5 other author(s). ISSCC, page 568-570. IEEE, (2024)The effects of information overload on consumers' subjective state towards buying decision in the internet shopping environment., , and . Electron. Commer. Res. Appl., 8 (1): 48-58 (2009)Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding., , , and . J. Inf. Hiding Multim. Signal Process., 10 (2): 408-421 (2019)Grayscale image coding using optimal pixel grouping and adaptive multi-grouping division block truncation coding., , , , and . Multim. Tools Appl., 81 (13): 17937-17958 (2022)Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell., , , and . Int. J. Netw. Secur., 22 (2): 296-305 (2020)Knowledge Navigated Quantum-inspired Tabu Search Algorithm for Reversible Circuit Synthesis., , , , , , and . SMC, page 2135-2140. IEEE, (2022)Dual-image-based reversible data hiding scheme with integrity verification using exploiting modification direction., , , and . Multimedia Tools Appl., 78 (18): 25855-25872 (2019)