Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensor-less sensing for affective computing and stress management technology., , and . PervasiveHealth, page 459-463. IEEE, (2013)Mobile Gaming with Children in Rural India: Contextual Factors in the Use of Game Design Patterns., , , and . DiGRA Conference, Digital Games Research Association, (2007)The social complexities of user-centered design in ICTD: Experiences from four schools in India's villages and slums., , , , , , and . ICTD, page 1-6. IEEE, (2007)Zero-knowledge test of vector equivalence granulation of user data with privacy., and . GrC, page 720-725. IEEE, (2006)Factor Modeling for Advertisement Targeting., , , and . NIPS, page 324-332. Curran Associates, Inc., (2009)Butterfly Mixing: Accelerating Incremental-Update Algorithms on Clusters., and . SDM, page 785-793. SIAM, (2013)Pervasive Analytics and Citizen Science Guest editors' introduction., , and . IEEE Pervasive Computing, 13 (2): 18-19 (2014)Collision Detection for Moving Polyhedra.. IEEE Trans. Pattern Anal. Mach. Intell., 8 (2): 200-209 (1986)Flexonics., , and . WAFR, volume 7 of Springer Tracts in Advanced Robotics, page 203-220. Springer, (2002)How to deal with malicious users in privacy-preserving distributed data mining., and . Statistical Analysis and Data Mining, 2 (1): 18-33 (2009)