Author of the publication

Improving user comfort and office energy efficiency with POEM (personal office energy monitor).

, , , , and . CHI Extended Abstracts, page 1455-1460. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of a Location Reporting System for mmWave Communication., , , and . ADHOCNETS, volume 223 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 178-188. Springer, (2017)Characterizing the Performance Limits of High Speed Image Triage Using Bayesian Search Theory., , , and . HCI (20), volume 6780 of Lecture Notes in Computer Science, page 95-103. Springer, (2011)Data-driven soft sensor for animal cell suspension culture process based on DRVM., , , , and . Appl. Soft Comput., (2019)Detect Malicious IP Addresses using Cross-Protocol Analysis., , , , , , and . SSCI, page 664-672. IEEE, (2019)Detecting mild cognitive loss with continuous monitoring of medication adherence., , , and . ICASSP, page 609-612. IEEE, (2008)Adversarial Manipulation of Reinforcement Learning Policies in Autonomous Agents., and . IJCNN, page 1-8. IEEE, (2018)Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks., , , , and . Secur. Commun. Networks, (2020)Decoupling Control Based on Support Vector Machine Inverse System in a L-lysine Fermentation Process., , , and . ICNC (2), page 51-55. IEEE Computer Society, (2008)Mutationable generative feature-based design with floating datum system., , and . Symposium on Solid Modeling and Applications, page 312-313. ACM, (1999)Large scale graph mining for web reputation inference., and . MLSP, page 1-6. IEEE, (2015)