A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks
IP based Wireless Sensor Networks: Performance Analysis using Simulations and Experiments
Scalable extensible middleware framework for context-aware mobile applications (SCAMMP)