Author of the publication

Group mobility classification and structure recognition using mobile devices.

, , , , , and . PerCom, page 1-9. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensing keyboard input for computer activity recognition with a smartphone., , , , , and . UbiComp/ISWC Adjunct, page 25-28. ACM, (2017)eXtensible Markup Language access control model with filtering privacy based on matrix storage., , , and . IET Commun., 8 (11): 1919-1927 (2014)Key Sharing in Hierarchical Wireless Sensor Networks., , , and . EUC, page 743-748. IEEE Computer Society, (2010)Group mobility classification and structure recognition using mobile devices., , , , , and . PerCom, page 1-9. IEEE Computer Society, (2016)Integrating aspect analysis and local outlier factor for intelligent review spam detection., , , , , and . Future Generation Comp. Syst., (2020)An Anonymous but Accountable Proxy Multi-signature Scheme., and . J. Softw., 8 (8): 1867-1874 (2013)XML privacy protection model based on cloud storage., , and . Comput. Stand. Interfaces, 36 (3): 454-464 (2014)A complex-number multiplier using radix-4 digits., , and . IEEE Symposium on Computer Arithmetic, page 84-. IEEE Computer Society, (1995)Discovery of booming and decaying point-of-interest with human mobility data., , , , and . UbiComp/ISWC Adjunct, page 137-140. ACM, (2017)CENTER: A System Architecture for Matching Design and Manufacturing., and . ISMIS, volume 689 of Lecture Notes in Computer Science, page 591-600. Springer, (1993)