Search for persons
X
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
3
Upper Bounds on the Number of Shuffles for Two-Helping-Card..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
4
Correction to: Upper Bounds on the Number of Shuffles for T..:
, In:
?
Distributed, Ambient and Pervasive Interactions. Smart Environments, Ecosystems, and Cities; Lecture Notes in Computer Science ,
7
Smartphone Localization with Solar-Powered BLE Beacons in W..:
, In:
?
Sensor- and Video-Based Activity and Behavior Computing; Smart Innovation, Systems and Technologies ,
9
A Data-Driven Approach for Online Pre-impact Fall Detection..:
, In:
?
Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers ,
12
Nurse care activity recognition challenge : a comparativ..:
, In:
?
Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services ,
13
Gait Dependency of Smartphone Walking Speed Estimation usin..:
, In:
?
Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers ,
14