Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quadrant of euphoria: a crowdsourcing platform for QoE assessment., , , , and . IEEE Network, 24 (2): 28-35 (2010)An Expert-System Technique for Object-Oriented Program Testing., , and . JOOP, 11 (9): 25-35, 44 (1999)Peer-to-Peer Application Recognition Based on Signaling Activity., , , and . ICC, page 1-5. IEEE, (2009)An expert system for object-oriented program testing., , and . Computers and Their Applications, page 19-22. ISCA, (1998)A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments., , , and . MUE, page 313-318. IEEE Computer Society, (2007)DevilTyper: a game for CAPTCHA usability evaluation., , , and . Computers in Entertainment, 9 (1): 3:1-3:14 (2011)Pressing onward towards the goal: Engineering intelligent systems to improve clinical care., , , and . Computer Methods and Programs in Biomedicine, (2016)Performance Evaluation of BONET with PCI Express 2.0., , , and . SUComS, volume 223 of Communications in Computer and Information Science, page 125-130. Springer, (2011)Physical Presence Verification: A Test to Detect Whether A Computer Is Remotely Controlled., , , and . J. Inf. Sci. Eng., 31 (3): 943-963 (2015)Integration of Reusable Software Components and Frameworks Into a Visual Software Construction Approach., , , , and . J. Inf. Sci. Eng., 16 (6): 863-884 (2000)