nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive Green Routing Mechanism over Optical Networks
|
Fazili, Yashar |
|
2013 |
21 |
C |
p. 9-17 9 p. |
artikel |
2 |
A Distributed Compressive Sensing Technique for Data Gathering in Wireless Sensor Networks
|
Masoum, Alireza |
|
2013 |
21 |
C |
p. 207-216 10 p. |
artikel |
3 |
A Feasibility Study Scheme of an Android-based Integrated Wearable ECG Monitoring System
|
Widhiasi, Arini |
|
2013 |
21 |
C |
p. 407-414 8 p. |
artikel |
4 |
A Higher-order Agent Model for Ambient Systems
|
Chaouche, A.-C. |
|
2013 |
21 |
C |
p. 156-163 8 p. |
artikel |
5 |
AID: An Energy Efficient Decoding Scheme for LDPC Codes in Wireless Body Area Sensor Networks
|
Javaid, N. |
|
2013 |
21 |
C |
p. 449-454 6 p. |
artikel |
6 |
An Algebraic Approach Towards Data Cleaning
|
Khedri, Ridha |
|
2013 |
21 |
C |
p. 50-59 10 p. |
artikel |
7 |
Analysis of Lightpath Re-provisioning in Green Optical Networks
|
Nafarieh, Alireza |
|
2013 |
21 |
C |
p. 33-39 7 p. |
artikel |
8 |
Analyzing the Impact of UMLS Relations on Word-sense Disambiguation Accuracy
|
El-Rab, Wessam Gad |
|
2013 |
21 |
C |
p. 295-301 7 p. |
artikel |
9 |
An Autonomic Agent Trust Model for IoT systems
|
Xu, X. |
|
2013 |
21 |
C |
p. 107-113 7 p. |
artikel |
10 |
An 8-bit Scientific Calculator based Intel 8086 Virtual Machine Emulator
|
Al-Haija, Qasem Abu |
|
2013 |
21 |
C |
p. 506-511 6 p. |
artikel |
11 |
A Negotiation Protocol for Meeting Scheduling Agent
|
Hossain, S.M. Mozammal |
|
2013 |
21 |
C |
p. 164-173 10 p. |
artikel |
12 |
An Engineering Design of 4-bit Special Purpose Microprogrammed Processor
|
Al-Haija, Qasem Abu |
|
2013 |
21 |
C |
p. 512-516 5 p. |
artikel |
13 |
An Enhanced Energy Saving Approach for WSNs
|
Sheltami, Tarek |
|
2013 |
21 |
C |
p. 199-206 8 p. |
artikel |
14 |
A New Data Mining System for Ontology Learning Using Dynamic Time Warping Alignment as a Case
|
Djellali, Choukri |
|
2013 |
21 |
C |
p. 75-82 8 p. |
artikel |
15 |
An Optimal Energy Efficient and Minimum Delay Scheduling for Periodic WSN Applications
|
Alkhdour, Tayseer |
|
2013 |
21 |
C |
p. 40-49 10 p. |
artikel |
16 |
Apnea Detection based on Respiratory Signal Classification
|
Almazaydeh, Laiali |
|
2013 |
21 |
C |
p. 310-316 7 p. |
artikel |
17 |
Arduino Wi-Fi Network Analyzer
|
AL-Kadi, Tariq |
|
2013 |
21 |
C |
p. 522-529 8 p. |
artikel |
18 |
A Reliable A-MSDU Frame Aggregation Scheme in 802.11n Wireless Networks
|
Saif, Anwar |
|
2013 |
21 |
C |
p. 191-198 8 p. |
artikel |
19 |
A Trust-based Probabilistic Coverage Algorithm for Wireless Sensor Networks
|
Taghikhaki, Zahra |
|
2013 |
21 |
C |
p. 455-464 10 p. |
artikel |
20 |
A User-friendly Tool for Model Checking Healthcare Workflows
|
Rutle, Adrian |
|
2013 |
21 |
C |
p. 317-326 10 p. |
artikel |
21 |
Authentication Systems Using ID Cards over NFC Links: The Spanish Experience Using DNIe
|
León-Coca, J.M. |
|
2013 |
21 |
C |
p. 91-98 8 p. |
artikel |
22 |
Barriers to Health Information Systems and Electronic Medical Records Implementation. A Field Study of Saudi Arabian Hospitals
|
Khalifa, Mohamed |
|
2013 |
21 |
C |
p. 335-342 8 p. |
artikel |
23 |
Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSN
|
Al-Haija, Qasem Abu |
|
2013 |
21 |
C |
p. 517-521 5 p. |
artikel |
24 |
Centralized Management of Scalable Cyber Foraging Systems
|
Nir, Manjinder |
|
2013 |
21 |
C |
p. 265-273 9 p. |
artikel |
25 |
Centralized Micro-clouds: An Infrastructure for Service Distribution in Collaborative Smart Devices
|
Asimakopoulou, Eleana |
|
2013 |
21 |
C |
p. 83-90 8 p. |
artikel |
26 |
Contents
|
|
|
2013 |
21 |
C |
p. iii-v nvt p. |
artikel |
27 |
Context-based and Rule-based Adaptation of Mobile User Interfaces in mHealth
|
Alnanih, Reem |
|
2013 |
21 |
C |
p. 390-397 8 p. |
artikel |
28 |
Correct by Construction Security Approach to Design Fault Tolerant Smart Homes for Disabled People
|
Guillet, Sébastien |
|
2013 |
21 |
C |
p. 257-264 8 p. |
artikel |
29 |
Data Programming for Non-programmers
|
Mason, Dave |
|
2013 |
21 |
C |
p. 68-74 7 p. |
artikel |
30 |
Design of a Social Collaboration and Precise Localization Services for the Blind and Visually Impaired
|
Elbes, Mohammed |
|
2013 |
21 |
C |
p. 282-291 10 p. |
artikel |
31 |
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding
|
Xie, Xiongwei |
|
2013 |
21 |
C |
p. 430-435 6 p. |
artikel |
32 |
Dynamic Inter-domain Negotiation for Green Algorithms in Optical Networks
|
Nafarieh, Alireza |
|
2013 |
21 |
C |
p. 25-32 8 p. |
artikel |
33 |
Electroencephalograms for Ubiquitous Robotic Systems
|
Swords, David |
|
2013 |
21 |
C |
p. 174-182 9 p. |
artikel |
34 |
Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks
|
Sharma, Dixit |
|
2013 |
21 |
C |
p. 416-423 8 p. |
artikel |
35 |
Feasibility Study of Direct Communication in Wireless Sensor Networks
|
Khemapech, Ittipong |
|
2013 |
21 |
C |
p. 424-429 6 p. |
artikel |
36 |
Guidelines for Internet of Things Deployment Approaches – The Thing Commandments
|
Oriwoh, Edewede |
|
2013 |
21 |
C |
p. 122-131 10 p. |
artikel |
37 |
Hardware Design and Software Simulation for Four Classical Cryptosystems
|
Al-Haija, Qasem Abu |
|
2013 |
21 |
C |
p. 500-505 6 p. |
artikel |
38 |
Identification Protocols based on Discrete Log Representation Problem
|
Rasslan, Mohamed |
|
2013 |
21 |
C |
p. 368-373 6 p. |
artikel |
39 |
Improving Adaptation Rules Quality Using Genetic Programming
|
Soui, Makram |
|
2013 |
21 |
C |
p. 274-281 8 p. |
artikel |
40 |
Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor Networks
|
Qwasmi, Nidal |
|
2013 |
21 |
C |
p. 225-233 9 p. |
artikel |
41 |
Interaction System based on Internet of Things as Support for Education
|
Gómez, Jorge |
|
2013 |
21 |
C |
p. 132-139 8 p. |
artikel |
42 |
Keynote
|
Haas, Zygmunt J. |
|
2013 |
21 |
C |
p. 6- 1 p. |
artikel |
43 |
Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders
|
ojo, Nehinbe Joshua |
|
2013 |
21 |
C |
p. 465-470 6 p. |
artikel |
44 |
MobileCA: Accumulative Secure Group Association with a Certification Path
|
Chagnaadorj, Oyuntungalag |
|
2013 |
21 |
C |
p. 242-249 8 p. |
artikel |
45 |
Modeling and Simulation Agent-based of Natural Disaster Complex Systems
|
Mustapha, Karam |
|
2013 |
21 |
C |
p. 148-155 8 p. |
artikel |
46 |
OBAME: Optimized Bio-inspired Algorithm to Maximize Search Efficiency in P2P Databases
|
Kurid, Heba A. |
|
2013 |
21 |
C |
p. 60-67 8 p. |
artikel |
47 |
Performance Evaluation of Interoperable Micro-clouds
|
Sotiriadis, Stelios |
|
2013 |
21 |
C |
p. 99-106 8 p. |
artikel |
48 |
Personal Health Service Framework
|
Ghorbani, Shirin |
|
2013 |
21 |
C |
p. 343-350 8 p. |
artikel |
49 |
Personalized Security Approaches in E-banking Employing Flask Architecture over Cloud Environment
|
Hamidi, Nayer A. |
|
2013 |
21 |
C |
p. 18-24 7 p. |
artikel |
50 |
Preface
|
Khedri, Ridha |
|
2013 |
21 |
C |
p. 7-8 2 p. |
artikel |
51 |
Preface
|
|
|
2013 |
21 |
C |
p. 499- 1 p. |
artikel |
52 |
Preface
|
Khan, Zahoor |
|
2013 |
21 |
C |
p. 415- 1 p. |
artikel |
53 |
Preface
|
Light, Janet |
|
2013 |
21 |
C |
p. 292-294 3 p. |
artikel |
54 |
Preface
|
Sheltami, Tarek Rahil |
|
2013 |
21 |
C |
p. 471- 1 p. |
artikel |
55 |
Proceedings
|
|
|
2013 |
21 |
C |
p. 1-5 5 p. |
artikel |
56 |
Proceed with Caution: Transition from Paper to Computerized Pain Body Maps
|
Jaatun, Ellen A.A. |
|
2013 |
21 |
C |
p. 398-406 9 p. |
artikel |
57 |
Redundancy and Criticality based Scheduling in Wireless Video Sensor Networks for Monitoring Critical Areas
|
Benzerbadj, Ali |
|
2013 |
21 |
C |
p. 234-241 8 p. |
artikel |
58 |
Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks
|
Wu, Jun |
|
2013 |
21 |
C |
p. 183-190 8 p. |
artikel |
59 |
RH-mote for Next-generation Wireless Sensor Networks
|
Elkateeb, Ali |
|
2013 |
21 |
C |
p. 217-224 8 p. |
artikel |
60 |
Satellite Monitoring of Wireless Sensor Networks (WSNs)
|
Shahzad, Farrukh |
|
2013 |
21 |
C |
p. 479-484 6 p. |
artikel |
61 |
Security Techniques for Counteracting Attacks in Mobile Healthcare Services
|
Tupakula, Udaya |
|
2013 |
21 |
C |
p. 374-381 8 p. |
artikel |
62 |
Selective Power Aware Data Management Approach for Wireless Sensor Networks
|
Morsy, Hazem |
|
2013 |
21 |
C |
p. 472-478 7 p. |
artikel |
63 |
Smart, Autonomous and Reliable Internet of Things
|
Kyriazis, Dimosthenis |
|
2013 |
21 |
C |
p. 442-448 7 p. |
artikel |
64 |
Stack Memory Buffer Overflow Protection based on Duplication and Randomization
|
Alouneh, Sahel |
|
2013 |
21 |
C |
p. 250-256 7 p. |
artikel |
65 |
Tennis Racket Customization for Supporting Rehabilitation
|
Tanprasert, Thitipong |
|
2013 |
21 |
C |
p. 360-367 8 p. |
artikel |
66 |
The Effects of Interference on Video Quality Over Wireless Sensor Networks
|
Zeghilet, Houda |
|
2013 |
21 |
C |
p. 436-441 6 p. |
artikel |
67 |
The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring
|
Preuveneers, Davy |
|
2013 |
21 |
C |
p. 351-359 9 p. |
artikel |
68 |
The Talking Museum Project
|
Amato, Flora |
|
2013 |
21 |
C |
p. 114-121 8 p. |
artikel |
69 |
Towards a Context-Aware Biofeedback Activity Recommendation Mobile Application for Healthy Lifestyle
|
Badawi, Hawazin |
|
2013 |
21 |
C |
p. 382-389 8 p. |
artikel |
70 |
Towards Intelligent Personal Health Record Systems: Review, Criteria and Extensions
|
Genitsaridi, Irini |
|
2013 |
21 |
C |
p. 327-334 8 p. |
artikel |
71 |
Transparent Digital Watermark on Drug's Images
|
Seetha, Chaiwoot |
|
2013 |
21 |
C |
p. 302-309 8 p. |
artikel |
72 |
Usage-pattern based Statistical Web Testing and Reliability Measurement
|
Chen, Chao |
|
2013 |
21 |
C |
p. 140-147 8 p. |
artikel |
73 |
Wireless Sensor Networks for Leakage Detection in Underground Pipelines: A Survey Paper
|
AL-Kadi, Tariq |
|
2013 |
21 |
C |
p. 491-498 8 p. |
artikel |
74 |
Z-MAC: Performance Evaluation and Enhancements
|
Arshad, Shoieb |
|
2013 |
21 |
C |
p. 485-490 6 p. |
artikel |