Author of the publication

An Avatar-Based Approach to 3D User Interface Design for Children.

, , and . 3DUI, page 33. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BlueCat: An Efficient Way for Relative Mobile Localization., , and . ICDCS Workshops, page 209-215. IEEE Computer Society, (2012)Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment., , , and . IEEE Trans. Vehicular Technology, 62 (1): 360-373 (2013)Statistical classification of social networks., and . ICASSP, page 3977-3980. IEEE, (2012)A high quality MBE-LPC-FE speech coder at 2.4 kbps and 1.2 kbps., , and . ICASSP, page 208-211. IEEE Computer Society, (1996)Ultralow-power high-speed flip-flop based on multimode FinFETs., , , , , and . SCIENCE CHINA Information Sciences, 59 (4): 042404:1-042404:11 (2016)Cellular direction information based differential evolution for numerical optimization: an empirical study., , , , and . Soft Comput., 20 (7): 2801-2827 (2016)Improving Differential Evolution with Ring Topology-Based Mutation Operators., , , , and . 3PGCIC, page 103-109. IEEE Computer Society, (2014)A Novel Connection Correlation Scheme Based on Threshold Secret Sharing., , , , and . IEEE Communications Letters, 20 (12): 2414-2417 (2016)Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring., , , , , and . IEEE Communications Magazine, 56 (3): 128-133 (2018)A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network., , , and . I. J. Network Security, 21 (2): 243-249 (2019)