Personensuche
X
?
Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science ,
1
Can Inputs' Reconstruction Information Be Coded into Machin..:
, In:
?
Adjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing ,
2
Sandbox AI: We Don't Trust Each Other but Want to Create Ne..:
, In:
?
Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers ,
3
Let's Embed Your Knowledge into AI by Trial and Error Inste..:
, In:
?
Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers ,
4
Adaptive biosignal data gathering for distributed and conti..:
, In:
?
Proceedings of the 2019 ACM International Symposium on Wearable Computers ,
5
Enhancing support for optimal muscle usage in sports : c..:
, In:
?
Proceedings of the 2018 ACM International Symposium on Wearable Computers ,
6
Practical pedaling skill items extraction for efficient ped..:
, In:
?
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing ,
7
Efficient calibration for rssi-based indoor localization by..:
, In:
?
Proceedings of the 2015 ACM International Symposium on Wearable Computers ,
9