Author of the publication

Virtual reality prototype for measurement of expression characteristics in emotional situations.

, , , , , , , , , and . Comp. in Bio. and Med., 39 (2): 173-179 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characteristics of Social Perception Assessed in Schizophrenia Using Virtual Reality., , , , , , , , and . Cyberpsy., Behavior, and Soc. Networking, 10 (2): 215-219 (2007)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 214-229. Springer, (2007)How to Locate a Target Binary Process and Its Derivatives in System Emulator., , , , and . SAINT, page 273-276. IEEE Computer Society, (2010)TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote., , , and . IEICE Transactions, 91-D (5): 1338-1347 (2008)Working Towards a Primary Binary Analysis System., , , , and . Security and Management, page 459-465. CSREA Press, (2010)Virtual reality prototype for measurement of expression characteristics in emotional situations., , , , , , , , , and . Comp. in Bio. and Med., 39 (2): 173-179 (2009)Pilot Study for Assessing the Behaviors of Patients with Schizophrenia towards a Virtual Avatar., , , , , , , , and . Cyberpsy., Behavior, and Soc. Networking, 9 (5): 531-539 (2006)Capturing Information Flow with Concatenated Dynamic Taint Analysis., , , and . ARES, page 355-362. IEEE Computer Society, (2009)Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage., , , , and . ACM Conference on Computer and Communications Security, page 131-145. ACM, (2018)Hooking Graceful Moments: A Security Analysis of Sudo Session Handling., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 41-60. Springer, (2016)