Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving identity delegation problem in the e-government environment., , , and . Int. J. Inf. Sec., 10 (6): 351-372 (2011)A Context-Aware System Infrastructure for Monitoring Activities of Daily Living in Smart Home., , and . J. Sensors, (2016)Deployment and Validation of a Smart System for Screening of Language Disorders in Primary Care., , and . Sensors, 13 (6): 7522-7545 (2013)Development of a Knowledge Base for smart screening of language disorders in primary care., , , , and . BIBE, page 121-126. IEEE Computer Society, (2012)Design and assessment of the data analysis process for a wrist-worn smart object to detect atomic activities in the smart home., , , , and . Pervasive and Mobile Computing, (2019)A foundational ontology-based model for human activity representation in smart homes., , and . JAISE, 8 (1): 47-61 (2016)A Supervised Cooperative Learning System for Early Detection of Language Disorders., , , , and . IWBBIO, page 766-777. Copicentro Editorial, (2014)Current Trends in Pan-European Identity Management Systems., , , and . IEEE Technol. Soc. Mag., 31 (3): 44-50 (2012)ICTD Work, Plus mFeel., , , , , , , , , and 2 other author(s). IEEE Pervasive Computing, 11 (3): 43-45 (2012)A careful design for a tool to detect child pornography in P2P networks., , , and . ISTAS, page 227-233. IEEE, (2010)