nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Data Fusion Approach to Context-Aware Service Delivery in Heterogeneous Network Environments
|
TalebiFard, Peyman |
|
2011 |
5 |
C |
p. 312-319 8 p. |
artikel |
2 |
A Distributed Architecture for Micro Context-Aware Agents
|
Roy, Patrice |
|
2011 |
5 |
C |
p. 296-303 8 p. |
artikel |
3 |
A Domain-based query routing mechanism for peer-to-peer networks
|
Hassan, Ghada |
|
2011 |
5 |
C |
p. 578-585 8 p. |
artikel |
4 |
A framework for peer-to-peer video streaming over WiMax
|
Basu, Kashinath |
|
2011 |
5 |
C |
p. 713-720 8 p. |
artikel |
5 |
A Fuzzy Reputation System in Vehicular Ad hoc Networks
|
Jalali, Mohammad |
|
2011 |
5 |
C |
p. 951-956 6 p. |
artikel |
6 |
A Heuristic Method for Wireless Sensor Network Localization
|
Shahrokhzadeh, Mohamadreza |
|
2011 |
5 |
C |
p. 812-819 8 p. |
artikel |
7 |
Alignment Based Similarity distance Measure for Better Web Sessions Clustering
|
G, Poornalatha |
|
2011 |
5 |
C |
p. 450-457 8 p. |
artikel |
8 |
A Location-based Content Search System Considering Situations of Mobile Users
|
Iwata, Mayu |
|
2011 |
5 |
C |
p. 426-433 8 p. |
artikel |
9 |
ALPINe: Another Location Privacy Information Network
|
Gŕegoire, Jean-Charles |
|
2011 |
5 |
C |
p. 601-609 9 p. |
artikel |
10 |
AmbienT Intelligence at the services of inFo-mobility and Critical Transportation networks
|
|
|
2011 |
5 |
C |
p. 891- 1 p. |
artikel |
11 |
A Menu-based Content Search Support System Considering Mobile User's Situations
|
Miyamoto, Hiroki |
|
2011 |
5 |
C |
p. 434-441 8 p. |
artikel |
12 |
A Multi-Agent Framework for Ambient Systems Development
|
Hu, Xiping |
|
2011 |
5 |
C |
p. 82-89 8 p. |
artikel |
13 |
A multimodal transport network model for advanced traveler information systems
|
Zhang, Jianwei |
|
2011 |
5 |
C |
p. 912-919 8 p. |
artikel |
14 |
An Adaptive and Distributed Collision-Free MAC Protocol for Wireless Personal Area Networks
|
Lu, Juan |
|
2011 |
5 |
C |
p. 798-803 6 p. |
artikel |
15 |
An Adaptive Context-Aware and Event-Based Framework Design Model
|
Barrenechea, Eduardo S. |
|
2011 |
5 |
C |
p. 593-600 8 p. |
artikel |
16 |
An Alternative Approach to k-Anonymity for Location-Based Services
|
Masoumzadeh, Amirreza |
|
2011 |
5 |
C |
p. 522-530 9 p. |
artikel |
17 |
Analysis of LEACH Energy Parameters
|
Comeau, Frank |
|
2011 |
5 |
C |
p. 933-938 6 p. |
artikel |
18 |
An approach to use FB-AODV with Android
|
Corriero, Nicola |
|
2011 |
5 |
C |
p. 336-343 8 p. |
artikel |
19 |
An Efficient Key Distribution Scheme to Secure Data-Centric Routing Protocols in Hierarchical Wireless Sensor Networks
|
Guermazi, Abderrahmen |
|
2011 |
5 |
C |
p. 208-215 8 p. |
artikel |
20 |
A new qualitative spatial recognition model based on Egenhofer topological approach using C4.5 algorithm: experiment and results
|
Bouchard, Kevin |
|
2011 |
5 |
C |
p. 497-504 8 p. |
artikel |
21 |
An Intelligent Object Framework for Smart Living
|
Savic, Sasa |
|
2011 |
5 |
C |
p. 386-393 8 p. |
artikel |
22 |
A Novel Approach to Video Copy Detection Using Audio Fingerprints and PCA
|
Roopalakshmi, R. |
|
2011 |
5 |
C |
p. 149-156 8 p. |
artikel |
23 |
A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments
|
El Husseini, Anas |
|
2011 |
5 |
C |
p. 362-369 8 p. |
artikel |
24 |
A Personal Mobility Assistant based on Ambient Intelligence to Promote Sustainable Travel Choices
|
Magliocchetti, Daniele |
|
2011 |
5 |
C |
p. 892-899 8 p. |
artikel |
25 |
A Platform for Interactive Location-Based Services
|
Ait-Cheik-Bihi, W. |
|
2011 |
5 |
C |
p. 697-704 8 p. |
artikel |
26 |
A Robust Neural Fuzzy Petri Net Controller For A Temperature Control System
|
Abed, Ali A. |
|
2011 |
5 |
C |
p. 881-890 10 p. |
artikel |
27 |
Arresting Particle Hijack in Multitarget Tracking
|
Trivedi, Neeta |
|
2011 |
5 |
C |
p. 344-353 10 p. |
artikel |
28 |
A Scenario-based Framework for Perceiving Crossbreed Service Interactions
|
Kryvinska, Natalia |
|
2011 |
5 |
C |
p. 721-728 8 p. |
artikel |
29 |
A Secure Platform of Wireless Sensor Networks
|
Moh‘d, Abidalrahman |
|
2011 |
5 |
C |
p. 115-122 8 p. |
artikel |
30 |
A Service-oriented Approach to Mobile Code Security
|
Jones, Micah |
|
2011 |
5 |
C |
p. 531-538 8 p. |
artikel |
31 |
A Simulator for Generating and Visualizing Sensor Data for Ambient Intelligence Environments
|
Buchmayr, Mario |
|
2011 |
5 |
C |
p. 90-97 8 p. |
artikel |
32 |
Assessing and Redesigning Enterprise Networks through NS-2 to Support VoIP
|
Hussain, Tahani |
|
2011 |
5 |
C |
p. 742-748 7 p. |
artikel |
33 |
Automatic Full Text Analysis in Public Social Media – Adoption of a Software Prototype to Investigate Political Communication
|
Stieglitz, Stefan |
|
2011 |
5 |
C |
p. 776-781 6 p. |
artikel |
34 |
Building and Operating Context-aware Services for Groups of Users
|
Satoh, Ichiro |
|
2011 |
5 |
C |
p. 304-311 8 p. |
artikel |
35 |
Business potential and market opportunities of intelligent LBSs for personal mobility – A European case study
|
d’Alessandro, Cristina |
|
2011 |
5 |
C |
p. 906-911 6 p. |
artikel |
36 |
Business Process Integration using Telco Mashups
|
Chudnovskyy, Olexiy |
|
2011 |
5 |
C |
p. 677-680 4 p. |
artikel |
37 |
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS
|
Najafizadeh, Ali |
|
2011 |
5 |
C |
p. 165-172 8 p. |
artikel |
38 |
Challenges of MANET for Mobile Social Networks
|
Stieglitz, Stefan |
|
2011 |
5 |
C |
p. 820-825 6 p. |
artikel |
39 |
Cloud Services Testing: An Understanding
|
Mohammad, Atif Farid |
|
2011 |
5 |
C |
p. 513-520 8 p. |
artikel |
40 |
μCloud: Towards a New Paradigm of Rich Mobile Applications
|
March, Verdi |
|
2011 |
5 |
C |
p. 618-624 7 p. |
artikel |
41 |
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks
|
Tariq, Usman |
|
2011 |
5 |
C |
p. 157-164 8 p. |
artikel |
42 |
Collusion-Resistant Reputation Mechanism for Multi-Agents Systems
|
Khosravifar, Babak |
|
2011 |
5 |
C |
p. 181-189 9 p. |
artikel |
43 |
Composite Web Services Formation Using a Social Network of Web Services: A Preliminary Investigation
|
Elnaffar, Said |
|
2011 |
5 |
C |
p. 466-471 6 p. |
artikel |
44 |
Conceptual Selective RFID Anti-Collision Technique Management
|
Pupunwiwat, Prapassara |
|
2011 |
5 |
C |
p. 827-834 8 p. |
artikel |
45 |
CReMe: a Dynamic and Flexible Conflict Resolution Methodology for Competitive Ambient Systems
|
Silva, Thais R.M.B. |
|
2011 |
5 |
C |
p. 370-377 8 p. |
artikel |
46 |
CroudSTag: Social Group Formation with Facial Recognition and Mobile Cloud Services
|
Srirama, Satish Narayana |
|
2011 |
5 |
C |
p. 633-640 8 p. |
artikel |
47 |
Defining, executing and evolving microfranchise templates
|
De Pree, Jeff |
|
2011 |
5 |
C |
p. 669-676 8 p. |
artikel |
48 |
Delay-Reliability Trade-off in MIMO-Enabled IEEE 802.11-Based Wireless Sensor and Actuator Networks
|
Maadani, M. |
|
2011 |
5 |
C |
p. 945-950 6 p. |
artikel |
49 |
Detecting insecure person in crowd with human sensor
|
Wu, Chao |
|
2011 |
5 |
C |
p. 788-792 5 p. |
artikel |
50 |
Developing once, deploying everywhere: A case study using JIL
|
Duarte, Carlos |
|
2011 |
5 |
C |
p. 641-644 4 p. |
artikel |
51 |
Development of Intelligent Wireless Sensor Networks for Human Comfort Index Measurement
|
Rawi, Mohd Izani Mohamed |
|
2011 |
5 |
C |
p. 232-239 8 p. |
artikel |
52 |
Distributed Usage Control
|
Biswas, Debmalya |
|
2011 |
5 |
C |
p. 562-569 8 p. |
artikel |
53 |
Dynamically Reconfigurable Energy Aware Modular Software (DREAMS) Architecture for WSNs in Industrial Environments
|
El Kouche, Ahmad |
|
2011 |
5 |
C |
p. 264-271 8 p. |
artikel |
54 |
Efficient Querying of Distributed RDF Sources in Mobile Settings based on a Source Index Model
|
Paret, Elien |
|
2011 |
5 |
C |
p. 554-561 8 p. |
artikel |
55 |
Embedding and Verification of ZigBee Protocol Stack in Event-B
|
Gawanmeh, Amjad |
|
2011 |
5 |
C |
p. 736-741 6 p. |
artikel |
56 |
Empirical Comparisons of Attack and Protection Algorithms for Online Social Networks
|
Mo, Mingzhen |
|
2011 |
5 |
C |
p. 705-712 8 p. |
artikel |
57 |
Energy-Efficient Assessment of Physical Activity Level Using Duty-Cycled Accelerometer Data
|
Bosch, Stephan |
|
2011 |
5 |
C |
p. 328-335 8 p. |
artikel |
58 |
Exploration of Attacks on Current Generation Smartphones
|
Salerno, Steven |
|
2011 |
5 |
C |
p. 546-553 8 p. |
artikel |
59 |
Finding Commonalities in RFID Semantic Streams
|
Ruta, Michele |
|
2011 |
5 |
C |
p. 857-864 8 p. |
artikel |
60 |
Forecasting Daily Gas Load with OIHF-Elman Neural Network
|
Zhou, Hong |
|
2011 |
5 |
C |
p. 754-758 5 p. |
artikel |
61 |
From Context to Micro-context – Issues and Challenges in Sensorizing Smart Spaces for Assistive Living
|
Biswas, Jit |
|
2011 |
5 |
C |
p. 288-295 8 p. |
artikel |
62 |
Greedy-Face-Greedy Routing based Human Tracking in Mobile Social Networks
|
Mao, Yingchi |
|
2011 |
5 |
C |
p. 472-479 8 p. |
artikel |
63 |
Heterogeneous Clustering Of Sensor Network
|
Khair, Mazen G. |
|
2011 |
5 |
C |
p. 939-944 6 p. |
artikel |
64 |
How Wireless Sensor Networks Can Benefit from Brain Emotional Learning Based Intelligent Controller (BELBIC)
|
Kalayci, Tahir Emre |
|
2011 |
5 |
C |
p. 216-223 8 p. |
artikel |
65 |
Identifying influential stock indices from global stock markets: A social network analysis approach
|
Roy, Ram Babu |
|
2011 |
5 |
C |
p. 442-449 8 p. |
artikel |
66 |
IFHNFS: fast indexing information in mobile devices
|
Corriero, Nicola |
|
2011 |
5 |
C |
p. 765-770 6 p. |
artikel |
67 |
Improving intelligence through use of Natural Language Processing. A comparison between NLP interfaces and traditional visual GIS interfaces.
|
Calì, Davide |
|
2011 |
5 |
C |
p. 920-925 6 p. |
artikel |
68 |
Innovative technologies to estimate public transport load in-real time by video content scene analysis
|
Fiorentino, Anta |
|
2011 |
5 |
C |
p. 926-931 6 p. |
artikel |
69 |
Intelligent Monitoring and Control Architecture for Future Electrical Power Systems
|
Masaud-Wahaishi, AbdulMutalib |
|
2011 |
5 |
C |
p. 759-764 6 p. |
artikel |
70 |
Joint Power and Rate Adaptation in Ad Hoc Networks Based on Coupled Interference
|
Awuor, Fredrick Mzee |
|
2011 |
5 |
C |
p. 272-279 8 p. |
artikel |
71 |
Keynote II: User Centred Design for the Mobile Web
|
McKerliea, Diane |
|
2011 |
5 |
C |
p. 36-37 2 p. |
artikel |
72 |
Keynote I: Sensing and Identification in the Internet of Things Era
|
Hassanein, Hossam |
|
2011 |
5 |
C |
p. 34-35 2 p. |
artikel |
73 |
Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per Node
|
Sridhar, V. |
|
2011 |
5 |
C |
p. 132-140 9 p. |
artikel |
74 |
LNT: a Logical Neighbor Tree for Secure Group Management in Wireless Sensor Networks
|
Cheikhrouhou, Omar |
|
2011 |
5 |
C |
p. 198-207 10 p. |
artikel |
75 |
Load Balancing Metric with Diversity for Energy Efficient Routing in Wireless Sensor Networks
|
Moad, Sofiane |
|
2011 |
5 |
C |
p. 804-811 8 p. |
artikel |
76 |
mCHOIS: An Application of Mobile Technology for Childhood Obesity Surveillance
|
Datta, Arun K. |
|
2011 |
5 |
C |
p. 653-660 8 p. |
artikel |
77 |
Next-Generation Wireless Sensor Networks Infrastructure Development for Monitoring Applications
|
Kateeb, Ali El |
|
2011 |
5 |
C |
p. 749-753 5 p. |
artikel |
78 |
OdinTelehealth: A Mobile Service Platform for Telehealth
|
Warren, I. |
|
2011 |
5 |
C |
p. 681-688 8 p. |
artikel |
79 |
OLSR-based Topology Discovery for Mobile Situational Awareness Systems
|
Dersingh, Anand |
|
2011 |
5 |
C |
p. 418-425 8 p. |
artikel |
80 |
On Maximizing the Entropy of Complex Networks
|
Safar, Maytham H. |
|
2011 |
5 |
C |
p. 480-488 9 p. |
artikel |
81 |
Opportunistic Communications for Emergency Support Systems
|
Gorbil, Gokce |
|
2011 |
5 |
C |
p. 39-47 9 p. |
artikel |
82 |
Optimal Power Consumption in Cooperative WSNs for a random Distance using a linear propagation model
|
Mardini, Wail |
|
2011 |
5 |
C |
p. 489-496 8 p. |
artikel |
83 |
Optimized Handover Strategy with Movement Trend Awareness for Body Sensor Networks
|
Sun, Wen |
|
2011 |
5 |
C |
p. 255-263 9 p. |
artikel |
84 |
Performance Evaluation Study of Intrusion Detection Systems
|
Alhomoud, Adeeb |
|
2011 |
5 |
C |
p. 173-180 8 p. |
artikel |
85 |
Personalized Service Creation by Non-technical Users in the Homecare Domain
|
Eslami, Mohammad Zarifi |
|
2011 |
5 |
C |
p. 409-417 9 p. |
artikel |
86 |
Pervasive Integrity Checking With Coupled Objects
|
Couderc, Paul |
|
2011 |
5 |
C |
p. 320-327 8 p. |
artikel |
87 |
Preface
|
Shakshuki, Elhadi |
|
2011 |
5 |
C |
p. 10-17 8 p. |
artikel |
88 |
Preface
|
Younas, Muhammad |
|
2011 |
5 |
C |
p. 18-24 7 p. |
artikel |
89 |
Preface
|
Li, Jiang |
|
2011 |
5 |
C |
p. 25-33 9 p. |
artikel |
90 |
Proposal for Dynamic Organization of Service Networks over a Wireless Sensor and Actuator Network
|
Iwai, Takuya |
|
2011 |
5 |
C |
p. 240-247 8 p. |
artikel |
91 |
Real-time Energy Monitoring and Controlling System based on ZigBee Sensor Networks
|
Kim, Woong Hee |
|
2011 |
5 |
C |
p. 794-797 4 p. |
artikel |
92 |
Reliable and Low Latency Transmission in Industrial Wireless Sensor Networks
|
Yu, Kan |
|
2011 |
5 |
C |
p. 866-873 8 p. |
artikel |
93 |
RFID service for non-RFID enabled devices: Embedded hardware implementation
|
Botero, Oscar |
|
2011 |
5 |
C |
p. 74-81 8 p. |
artikel |
94 |
RRTL: RFID Reader Topology Language. A language to manage RFID reader's networks
|
Abad, Ismael |
|
2011 |
5 |
C |
p. 835-840 6 p. |
artikel |
95 |
Scriptable web applications as first-class citizens
|
Mikkonen, Tommi |
|
2011 |
5 |
C |
p. 661-668 8 p. |
artikel |
96 |
Security of MBAN based Health Records in Mobile Broadband Environment
|
Acharya, Debopam |
|
2011 |
5 |
C |
p. 539-545 7 p. |
artikel |
97 |
SmartGuide – A Smartphone Museum Guide with Ultrasound Control
|
Bihler, Pascal |
|
2011 |
5 |
C |
p. 586-592 7 p. |
artikel |
98 |
Software Development and Quality Problems and Solutions by TRIZ
|
Wang, Su-Hua |
|
2011 |
5 |
C |
p. 730-735 6 p. |
artikel |
99 |
Solving Incomplete Datasets in Soft Set Using Supported Sets and Aggregate Values
|
Mohd Rose, Ahmad Nazari |
|
2011 |
5 |
C |
p. 354-361 8 p. |
artikel |
100 |
Space Vector Modulation Direct Torque Speed Control Of Induction Motor
|
Lazim, Mohammed T. |
|
2011 |
5 |
C |
p. 505-512 8 p. |
artikel |
101 |
Spatio-Temporal Reasoning in Biometrics Based Smart Environments
|
Menon, Vivek |
|
2011 |
5 |
C |
p. 378-385 8 p. |
artikel |
102 |
SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSN
|
Megahed, Mohamed Helmy |
|
2011 |
5 |
C |
p. 141-148 8 p. |
artikel |
103 |
Table of Contents
|
|
|
2011 |
5 |
C |
p. 1-9 9 p. |
artikel |
104 |
Teamwork on the Road: Efficient Collaboration in VANETs with Context-based Grouping
|
Paridel, Koosha |
|
2011 |
5 |
C |
p. 48-57 10 p. |
artikel |
105 |
The effect of perceived intrusion on consumers’ attitude towards using an RFID-based marketing program
|
Boeck, Harold |
|
2011 |
5 |
C |
p. 841-848 8 p. |
artikel |
106 |
The International Symposium on Frontiers in Ambient and Mobile Systems
|
|
|
2011 |
5 |
C |
p. 729- 1 p. |
artikel |
107 |
The International Workshop on Emerging Technologies in Sensor Networks
|
|
|
2011 |
5 |
C |
p. 932- 1 p. |
artikel |
108 |
The International Workshop on Wireless Networked Control Systems
|
|
|
2011 |
5 |
C |
p. 865- 1 p. |
artikel |
109 |
The 2nd International Conference on Ambient Systems, Networks and Technologies
|
|
|
2011 |
5 |
C |
p. 38- 1 p. |
artikel |
110 |
The protection of privacy in the i-Tour framework
|
Cadzow, Scott W |
|
2011 |
5 |
C |
p. 900-905 6 p. |
artikel |
111 |
The 8th International Conference on Mobile Web Information Systems
|
|
|
2011 |
5 |
C |
p. 521- 1 p. |
artikel |
112 |
The 6th International Symposium on Intelligent Systems Techniques for Ad hoc and Wireless Sensor Networks
|
|
|
2011 |
5 |
C |
p. 793- 1 p. |
artikel |
113 |
The 5th International Workshop on RFID Technology – Concepts, Applications, Challenges
|
|
|
2011 |
5 |
C |
p. 826- 1 p. |
artikel |
114 |
The User-Context Module: A New Perspective on Future Internet Design
|
Lu, Yu |
|
2011 |
5 |
C |
p. 280-287 8 p. |
artikel |
115 |
Towards ambient communication support for power grid maintenance and repair
|
Kume, Naoto |
|
2011 |
5 |
C |
p. 98-105 8 p. |
artikel |
116 |
Towards Augmenting Federated Wireless Sensor Networks
|
Al-Turjman, Fadi M. |
|
2011 |
5 |
C |
p. 224-231 8 p. |
artikel |
117 |
Towards Building Semantic Next Generation Network – A Preliminary Study
|
Toh, Kidd S.C. |
|
2011 |
5 |
C |
p. 689-696 8 p. |
artikel |
118 |
Towards context-adaptable Web service policies
|
Yahyaoui, H. |
|
2011 |
5 |
C |
p. 610-617 8 p. |
artikel |
119 |
Towards Identifying the Challenges Associated with Emerging Large Scale Social Networks
|
Malik, Haroon |
|
2011 |
5 |
C |
p. 458-465 8 p. |
artikel |
120 |
Towards Pattern-based Generic Interaction Scenarios
|
Biel, Bettina |
|
2011 |
5 |
C |
p. 771-775 5 p. |
artikel |
121 |
Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services
|
Johnson, Gleneesha |
|
2011 |
5 |
C |
p. 782-787 6 p. |
artikel |
122 |
Towards Supporting Users in Semantic Exploration of Large Distributed Schemas
|
Sotoodeh, Mandana |
|
2011 |
5 |
C |
p. 570-577 8 p. |
artikel |
123 |
Understanding Characteristics of Available Bandwidth in Wireless Environment
|
Xing, Xinyu |
|
2011 |
5 |
C |
p. 248-254 7 p. |
artikel |
124 |
Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users
|
Stevanovic, Dusan |
|
2011 |
5 |
C |
p. 123-131 9 p. |
artikel |
125 |
Use of Wireless Mesh Network to Improve Mobile Asset Utilization in Manufacturing Industries
|
Ghosh, Srideep |
|
2011 |
5 |
C |
p. 66-73 8 p. |
artikel |
126 |
Using a Cloud-Hosted Proxy to support Mobile Consumers of RESTful Services
|
Jamal, Shomoyita |
|
2011 |
5 |
C |
p. 625-632 8 p. |
artikel |
127 |
Using RDF Data as Basis for 3D Window Management in Mobile Devices
|
Peuhkurinen, Antti |
|
2011 |
5 |
C |
p. 645-652 8 p. |
artikel |
128 |
Using Reputation Management in Participatory Sensing for Data Classification
|
Yang, HaoFan |
|
2011 |
5 |
C |
p. 190-197 8 p. |
artikel |
129 |
Using RFID to Improve Hospital Supply Chain Management for High Value and Consignment Items
|
Bendavid, Ygal |
|
2011 |
5 |
C |
p. 849-856 8 p. |
artikel |
130 |
Wearable Computing in Industrial Service Applications
|
Aleksy, Markus |
|
2011 |
5 |
C |
p. 394-400 7 p. |
artikel |
131 |
When the context changes, so does my transportation application: VESPA
|
Popovici, Dana |
|
2011 |
5 |
C |
p. 401-408 8 p. |
artikel |
132 |
Wireless Sensor Actor Network Simulation for a Fire Extinguishing System
|
Khalil, John |
|
2011 |
5 |
C |
p. 874-880 7 p. |
artikel |
133 |
Wireless Sensor Network Based Wildfire Hazard Prediction System Modeling
|
Sabit, Hakilo |
|
2011 |
5 |
C |
p. 106-114 9 p. |
artikel |
134 |
ZigBee-based indoor location system by k-nearest neighbor algorithm with weighted RSSI
|
Huang, Chih-Ning |
|
2011 |
5 |
C |
p. 58-65 8 p. |
artikel |