Sheikh Iqbal Ahamed

According to our database1, Sheikh Iqbal Ahamed
  • authored at least 172 papers between 2003 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
AnonPri: A secure anonymous private authentication protocol for RFID systems.
Inf. Sci., 2017

Classification of physical activities using wearable sensors.
Intelligent Automation & Soft Computing, 2017

A privacy preserving framework for RFID based healthcare systems.
Future Generation Comp. Syst., 2017

A Novel Real-Time Non-invasive Hemoglobin Level Detection Using Video Images from Smartphone Camera.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Pain Level Detection From Facial Image Captured by Smartphone.
JIP, 2016

Privacy Challenges and Goals in mHealth Systems.
Advances in Computers, 2016

Dryhootch Quick Reaction Force: Collaborative Information Design to Prevent Crisis in Military Veterans.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

Activity Detection Using Time-Delay Embedding in Multi-modal Sensor System.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

Towards Modeling Confidentiality in Persuasive Robot Dialogue.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

An approach to localization in crowded area.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Message from the MediComp Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from STPSA 2016 Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Your Walk is My Command: Gait Detection on Unconstrained Smartphone Using IoT System.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from the NATA Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Privacy Preservation in Affect-Driven Personalization.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

The Use of a mHealth Decision Tree Support Program for Epinephrine Auto-injector (EAI) Administration Training of Adolescents.
Proceedings of the AMIA 2016, 2016

2015
e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh.
Personal and Ubiquitous Computing, 2015

Applying SPOCs for Programming Course to Improve Study Quality.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

Collaborative Design with Veterans: Identifying challenges of designing mhealth solution for veterans.
Proceedings of the 17th International Conference on E-health Networking, 2015

iPeer: A Sociotechnical Systems Approach for Helping Veterans with Civilian Reintegration.
Proceedings of the 2015 Annual Symposium on Computing for Development, 2015

An Open Message from Professor Stephen S. Yau's Students.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Message from NATA Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

A Novel Wireless System to Monitor Gait Using Smartshoe-Worn Sensors.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

A Novel Activity Detection System Using Plantar Pressure Sensors and Smartphone.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Message from the SSS-MediComp 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Assessment of Pain Using Facial Pictures Taken with a Smartphone.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

A Reference Architecture for Social Media Intelligence Applications in the Cloud.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols.
Personal and Ubiquitous Computing, 2014

A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud Providers.
Proceedings of the 2014 International Conference on Trustworthy Systems and their Applications, 2014

Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Smartphone based multimodal activity detection system using plantar pressure sensors.
Proceedings of the Symposium on Applied Computing, 2014

A personalized model for monitoring vital signs using camera of the smart phone.
Proceedings of the Symposium on Applied Computing, 2014

Applying affective feedback to reinforcement learning in ZOEI, a comic humanoid robot.
Proceedings of the 23rd IEEE International Symposium on Robot and Human Interactive Communication, 2014

PriSN: a privacy protection framework for healthcare social networking sites.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

Findings of mobile based palliative care system: towards formulating a generic framework for measuring QoL.
Proceedings of the 8th International Conference on Pervasive Computing Technologies for Healthcare, 2014

A Reference Architecture for Improving Security and Privacy in Internet of Things Applications.
Proceedings of the IEEE Third International Conference on Mobile Services, Anchorage, AK, USA, June 27, 2014

A Novel Light Weight Balance Monitoring Tool for Elderly Care.
Proceedings of the Intelligent Systems and Applications, 2014

iCanLearn: A Mobile Application for Creating Flashcards and Social Stories™ for Children with Autism.
Proceedings of the Smart Homes and Health Telematics - 12th International Conference, 2014

ShowMeHow: Using Smart, Interactive Tutorials in Elderly Software Development.
Proceedings of the Smart Homes and Health Telematics - 12th International Conference, 2014

Agile Development for the Creation of Proper Human-Computer Interfaces for the Elderly.
Proceedings of the Smart Homes and Health Telematics - 12th International Conference, 2014

Remote Monitoring Using Smartphone Based Plantar Pressure Sensors: Unimodal and Multimodal Activity Detection.
Proceedings of the Smart Homes and Health Telematics - 12th International Conference, 2014

A Mobile Survey Tool for Smoking Dependency Among Native Americans.
Proceedings of the Smart Homes and Health Telematics - 12th International Conference, 2014

PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Designing Interpersonal Communication Software for the Abilities of Elderly Users.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Your Phone Knows You: Almost Transparent Authentication for Smartphones.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

SPTP: A Trust Management Protocol for Online and Ubiquitous Systems.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Mobile peer-mentoring: An approach to make veterans seek mental health-care support a normality.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Pilot assessment of a caregiver decision support mobile health (mHealth) application for food allergy & anaphylaxis in the school environment.
Proceedings of the AMIA 2014, 2014

2013
Recent Advances in Energy-Efficient Sensor Networks.
IJDSN, 2013

Preserving User Privacy in Pervasive Environments with a Collaborative Model.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

iPrevention: towards a novel real-time smartphone-based fall prevention system.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

smartPrediction: a real-time smartphone-based fall risk prediction and prevention system.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Towards in situ affect detection in mobile devices: a multimodal approach.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

Considerations in Designing Human-Computer Interfaces for Elderly People.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

PriGen: A Generic Framework to Preserve Privacy of Healthcare Data in the Cloud.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

Towards Improving Reliability of Computational RFID Based Smart Healthcare Monitoring Systems.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

Identifying Phases of Gait and Development of Walking Model from Pressure and Accelerometer Data and It's Ramifications in Elderly Walking.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

Elderly Safety: A Smartphone Based Real Time Approach.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

A System Implementation of Interruption Management for Mobile Devices.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

RSSI Based Indoor Localization for Smartphone Using Fixed and Mobile Wireless Node.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Toward an mHealth Intervention for Smoking Cessation.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Toward Collective Intelligence for Fighting Obesity.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Evolution of Energy Awareness Using an Open Carbon Footprint Calculation Platform.
Proceedings of the Handbook of Energy-Aware and Green Computing - Two Volume Set., 2012

User privacy protection in pervasive social networking applications using PCO.
IJSCCPS, 2012

Let EcoDrive be your guide: development of a mobile tool to reduce carbon footprint and promote green transport.
Proceedings of the ACM Symposium on Applied Computing, 2012

DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks.
Proceedings of the ACM Symposium on Applied Computing, 2012

MonAC: detecting missing tags for improved accuracy in computational RFID based assisted environments.
Proceedings of the Research in Applied Computation Symposium, 2012

Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

e-ESAS: improving quality of life for breast cancer patients in developing countries.
Proceedings of the 2nd ACM international workshop on Pervasive Wireless Healthcare, 2012

I am not a goldfish in a bowl: A privacy preserving framework for RFID based healthcare systems.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

Gesthaar: An accelerometer-based gesture recognition method and its application in NUI driven pervasive healthcare.
Proceedings of the 2012 IEEE International Conference on Emerging Signal Processing Applications, 2012

Americans with Disabilities Act - Compliance Assessment Toolkit on Smartphone.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

KnockAround: Location Based Service via Social Knowledge.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Findings of e-ESAS: a mobile based symptom monitoring system for breast cancer patients in rural Bangladesh.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
Special issue of computer communications on information and future communication security.
Computer Communications, 2011

Preface to Special Section on Intelligent Multimedia Systems and Data Management for UBI-COM.
Computing and Informatics, 2011

Home-Healthcare-Network (H2N): An Autonomous Care-Giving System for Elderly People.
Proceedings of the Information Quality in e-Health, 2011

An approach to open carbon footprint calculation platform design.
Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications, 2011

IRENE: Context aware mood sharing for social network.
Proceedings of the 2011 IEEE International Conference on Service-Oriented Computing and Applications, 2011

ProQuPri: towards anonymity protection with privacy quantification for context-aware applications.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

REBIVE: a reliable private data aggregation scheme for wireless sensor networks.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction.
Proceedings of the Research in Applied Computation Symposium, 2011

A context-aware cost of interruption model for mobile devices.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

AnonPri: An efficient anonymous private authentication protocol.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment.
Proceedings of the Modern Approaches in Applied Intelligence, 2011

2010
Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
Wireless Personal Communications, 2010

A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment.
Telecommunication Systems, 2010

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Advanced Mobile Applications and Intelligent Multimedia systems for Ubi-Com".
MONET, 2010

A Mobile Intelligent Interruption Management System.
J. UCS, 2010

Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments.
Journal of Systems and Software, 2010

Preventing multi-query attack in location-based services.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Computational thinking for the sciences: a three day workshop for high school science teachers.
Proceedings of the 41st ACM technical symposium on Computer science education, 2010

Mobile intelligent interruptions management (MIIM): a context aware unavailability system.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

S-search: finding RFID tags using scalable and secure search protocol.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Context Aware Interruption Management System for Mobile Devices.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

UCFC - Ubiquitous personal Carbon Footprint Calculation Platform.
Proceedings of the International Green Computing Conference 2010, 2010

An Approach for Ensuring Robust Safeguard against Location Privacy Violation.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Self-healing for Autonomic Pervasive Computing.
Proceedings of the Autonomic Communication, 2010

2009
Collaboration through computation: incorporating trust model into service-based software systems.
Service Oriented Computing and Applications, 2009

Design and implementation of S-MARKS: A secure middleware for pervasive computing applications.
Journal of Systems and Software, 2009

ePet: when cellular phone learns to recognize its owner.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Trust based security auto-configuration for smart assisted living environments.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Towards a landmark influence framework to protect location privacy.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Supporting recovery, privacy and security in RFID systems using a robust authentication protocol.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Towards developing a trust-based security solution.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Message from the Workshop Co-Organizers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An XML Based Access Control Architecture for Pervasive Computing.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Towards Universal Access to Home Monitoring for Assisted Living Environment.
Proceedings of the Universal Access in Human-Computer Interaction. Intelligent and Ubiquitous Interaction Environments, 2009

Intelligent Mobile Health Monitoring System (IMHMS).
Proceedings of the Electronic Healthcare - Second International ICST Conference, 2009

ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Ubi-App: a ubiquitous application for universal access from handheld devices.
Universal Access in the Information Society, 2008

An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2008

Architecture and Implementation of a trust Model for Pervasive Applications.
J. Mobile Multimedia, 2008

A trust-based secure service discovery (TSSD) model for pervasive computing.
Computer Communications, 2008

CAT: a context-aware trust model for open and dynamic systems.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Ubicomp secretary: a web service based ubiquitous computing application.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Secured tag identification using EDSA (enhanced distributed scalable architecture).
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Special track on Middleware Engineering (ME): editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Service sharing with trust in pervasive environment: now it's time to break the jinx.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

CCTB: Context Correlation for Trust Bootstrapping in Pervasive Environment.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Towards a Simple Secured Searching Protocol for Future RFID Applications.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

ERAP: ECC Based RFID Authentication Protocol.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

FPCS: A Formal Approach for Privacy-Aware Context-Based Services.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

STPSA 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the STPSA 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

WiFi Radar: Design and Implementation of an Infrastructure-less Location Tracking System for Pervasive Environment.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
A software-based trust framework for distributed industrial management systems.
Journal of Systems and Software, 2007

ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications.
I. J. Network Security, 2007

Usability of Mobile Computing Technologies to Assist Cancer Patients.
Proceedings of the HCI and Usability for Medicine and Health Care, 2007

Self-healing for autonomic pervasive computing.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Wellness assistant: a virtual wellness assistant using pervasive computing.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Smart Tracker: Light Weight Infrastructure-less Assets Tracking solution for Ubiquitous Computing Environment.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Co-learn: Collaborative Learning Engine a Vision for Pervasive Collaboration in E-Learning.
Proceedings of the Universal Access in Human-Computer Interaction. Applications and Services, 2007

An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

A Robust Lightweight Solution for RFID Security.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Design and Implementation of EPARK Wireless Parking Payment System Using Pervasive Computing.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments.
Proceedings of the The Second International Conference on Availability, 2007

Privacy in Pervasive Computing and Open Issues.
Proceedings of the The Second International Conference on Availability, 2007

2006
Security in Pervasive Computing: Current Status and Open Issues.
I. J. Network Security, 2006

Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies.
Elektrotechnik und Informationstechnik, 2006

Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing).
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

A Survey of Middleware for Sensor Network and Challenges.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Model for Global Software Engineering Project Life Cycle and How to Use it in Classroom for Preparing Our Students for the Globalization.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Trust Framework for Pervasive Computing Environments.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

A Dependable Device Discovery Approach for Pervasive Computing Middleware.
Proceedings of the The First International Conference on Availability, 2006

2005
A Smart Meeting Room with Pervasive Computing Technologies.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) inPervasive Computing Environments.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Towards an Intrusion Detection System for Pervasive Computing Environments.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Knowledge Usability and its Characteristics for Pervasive Computing.
Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005

PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Component-based Embedded Database for Mobile Embedded Systems.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Towards Framework Selection Criteria and Suitability for an Application Framework.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping Experience.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Survey on Current and Future Pervasive Computing Devices and Applications.
Proceedings of the International Conference on Wireless Networks, 2004

Towards the Design and Implementation of Embedded Database for Pervasive Computing Applications.
Proceedings of the International Conference on Wireless Networks, 2004

Towards Developing Sensor Networks Monitoring as a Middleware Service.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

Challenges in Monitoring Sensor Networks and a Solution Framework.
Proceedings of the International Conference on Embedded Systems and Applications, 2004

2003
Experiences in Teaching an Object-oriented Design and Data Structure Course.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

An Approach to Developing Information Dissemination Service for Ubiquitous Computing Applications.
Proceedings of the 6th International Symposium on Autonomous Decentralized Systems (ISADS 2003), 2003


  Loading...