Author of the publication

Creating a clickable TV program by sketching and tracking freeform triggers.

, , and . Multimedia Tools Appl., 59 (3): 833-850 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of IEEE 802.15.4 Non-beacon Mode with Both Uplink and Downlink Traffic in Non-saturated Condition., , , and . MOBILIGHT, volume 13 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 357-371. Springer, (2009)Differentiated CW Policy and Strict Priority Policy for Location-Independent End-to-End Delay in Multi-Hop Wireless Mesh Networks., , , and . IEICE Transactions, 93-B (7): 1869-1880 (2010)Performance Analysis of Power Saving Class of Type I for Voice Service in Two-Way Communication in IEEE 802.16e., , and . IEICE Transactions, 95-B (3): 845-856 (2012)A Hybrid Distance Estimation for Wireless Body Sensor Networks., , and . IJDSN, (2013)Avatar Augmented Annotation Interface for e-Learning., , and . International Conference on Computational Science (3), volume 4489 of Lecture Notes in Computer Science, page 477-484. Springer, (2007)Novel MAC Protocol and Middleware Designs for Wearable Sensor-Based Systems for Health Monitoring., , , and . IJDSN, (2013)Delay analysis of extended rtPS for VoIP service in IEEE 802.16e by matrix analytic method., , , , and . Annals OR, 162 (1): 85-107 (2008)Analysis of IEEE 802.11 non-saturated DCF by matrix analytic methods., , , and . Annals OR, 162 (1): 3-18 (2008)Definition of a layered avatar behavior script language for creating and reusing scenario scripts., , , and . Multimedia Tools Appl., 37 (2): 233-259 (2008)Analytical Model of IEEE 802.15.4 Non-beacon Mode with Download Traffic by the Piggyback Method., , , and . NPC, volume 4672 of Lecture Notes in Computer Science, page 435-444. Springer, (2007)