Author of the publication

Context-Based Lifelog Monitoring for Just-in-Time Wellness Intervention.

, , , and . ICOST, volume 10898 of Lecture Notes in Computer Science, page 298-303. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Skeleton Searching Strategy for Recommender Searching Mechanism of Trust-Aware Recommender Systems., , , and . Comput. J., 58 (9): 1876-1883 (2015)Oblivious access control policies for cloud based data sharing systems., , , , and . Computing, 94 (12): 915-938 (2012)A Lightweight Hierarchical Activity Recognition Framework Using Smartphone Sensors., , , , and . Sensors, 14 (9): 16181-16195 (2014)An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks., , and . Sensors, 12 (1): 92-114 (2012)Human Behavior Analysis by Means of Multimodal Context Mining., , , , , , , , , and 3 other author(s). Sensors, 16 (8): 1264 (2016)Behavior Life Style Analysis for Mobile Sensory Data in Cloud Computing through MapReduce., , , , , , , , , and . Sensors, 14 (11): 22001-22020 (2014)Hierarchical Recognition Scheme for Human Facial Expression Recognition Systems., , , , and . Sensors, 13 (12): 16682-16713 (2013)Human Facial Expression Recognition Using Wavelet Transform and Hidden Markov Model., and . IWAAL, volume 8277 of Lecture Notes in Computer Science, page 112-119. Springer, (2013)Context Awareness in Large Scale Ubiquitous Environments with a Service Oriented Distributed Middleware Approach., , , and . ACIS-ICIS, page 513-518. IEEE Computer Society, (2005)Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service Delivery., , , and . ACIS-ICIS, page 175-180. IEEE Computer Society, (2005)