nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Brief Review of Holonic Multi-Agent Models for Traffic and Transportation Systems
|
Haman Tchappi, Igor |
|
2018 |
134 |
C |
p. 137-144 |
artikel |
2 |
Affiliated Workshops
|
|
|
2018 |
134 |
C |
p. 309 |
artikel |
3 |
A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise.
|
Chen, Ling |
|
2018 |
134 |
C |
p. 212-218 |
artikel |
4 |
AMSEP: Automated Multi-level Security Management for Multimedia Event Processing
|
Abdallah, Hichem Ben |
|
2018 |
134 |
C |
p. 452-457 |
artikel |
5 |
Analysis of the allocation of classes, threads and CPU used in embedded systems for Java applications
|
Medromi, Hicham |
|
2018 |
134 |
C |
p. 334-339 |
artikel |
6 |
An Enhanced AODV Protocol for Avoiding Black Holes in MANET
|
Yaseen, Qussai M. |
|
2018 |
134 |
C |
p. 371-376 |
artikel |
7 |
A Novel Approach for Optimizing Governance, Risk management and Compliance for Enterprise Information security using DEMATEL and FoM
|
Ramalingam, Dharmalingam |
|
2018 |
134 |
C |
p. 365-370 |
artikel |
8 |
A Per-Face Popularity Scheme to Increase Cache Robustness in Information-Centric Networks
|
Baugh, John P. |
|
2018 |
134 |
C |
p. 267-274 |
artikel |
9 |
A PMIPv6-based User Mobility Pattern Scheme for SDN-defined Smart Factory Networking
|
Ahn, Dae Jun |
|
2018 |
134 |
C |
p. 235-242 |
artikel |
10 |
A proposal of low-cost and low-power embedded wireless image sensor node for IoT applications
|
Tresanchez, M. |
|
2018 |
134 |
C |
p. 99-106 |
artikel |
11 |
A Qualitative Evaluation of IPv6 for the Industrial Internet of Things
|
Feldner, Benjamin |
|
2018 |
134 |
C |
p. 377-384 |
artikel |
12 |
A Recursive K-means towards trade-off between PLM Competences, Positions, and Offers
|
Messaadia, Mourad |
|
2018 |
134 |
C |
p. 297-302 |
artikel |
13 |
Artificial Neural Network Model to relate Organization Characteristics and Construction Project Delivery Methods
|
Gazder, Uneb |
|
2018 |
134 |
C |
p. 59-66 |
artikel |
14 |
A Smart Mobile Assessment Tool for Collecting Data in Large-Scale Educational Studies
|
Andrews, Kevin |
|
2018 |
134 |
C |
p. 67-74 |
artikel |
15 |
A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing
|
Makkaoui, Khalid El |
|
2018 |
134 |
C |
p. 83-90 |
artikel |
16 |
Automatic data collection for detecting travel behavior: the IPET platform
|
Piras, Francesco |
|
2018 |
134 |
C |
p. 421-426 |
artikel |
17 |
Blind Maternal-Fetal ECG Separation Based on the Time-Scale Image TSI and SVD – ICA Methods
|
Ziani, Said |
|
2018 |
134 |
C |
p. 322-327 |
artikel |
18 |
Building An Anomaly Detection Engine (ADE) For IoT Smart Applications
|
Mohamudally, Nawaz |
|
2018 |
134 |
C |
p. 10-17 |
artikel |
19 |
Clustering analysis of online discussion participants
|
Krammer, Peter |
|
2018 |
134 |
C |
p. 186-195 |
artikel |
20 |
Comfort Index CI(bus): A methodology to measure the comfort on board
|
Barone, Vincenzo |
|
2018 |
134 |
C |
p. 439-444 |
artikel |
21 |
Components for Smart Autonomous Ship Architecture Based on Intelligent Information Technology
|
Im, Illkyun |
|
2018 |
134 |
C |
p. 91-98 |
artikel |
22 |
Context Data Categories and Privacy Model for Mobile Data Collection Apps
|
Beierle, Felix |
|
2018 |
134 |
C |
p. 18-25 |
artikel |
23 |
Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments
|
Brun, Olivier |
|
2018 |
134 |
C |
p. 458-463 |
artikel |
24 |
Design and Implementation of Monitoring System Architecture for Smart Bicycle Platform
|
Lee, YeongKyun |
|
2018 |
134 |
C |
p. 464-469 |
artikel |
25 |
Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark
|
Chen, Liguo |
|
2018 |
134 |
C |
p. 310-315 |
artikel |
26 |
Energy Efficiency: Improving the renewable energy penetration in a smart and green community
|
Abdelwahab, Haddaoui |
|
2018 |
134 |
C |
p. 352-357 |
artikel |
27 |
Energy efficient clustering and routing in a wireless sensor networks
|
G.R., Asha |
|
2018 |
134 |
C |
p. 178-185 |
artikel |
28 |
Evaluation of a Compound Node Selection Function for a Greedy Routing in Urban Vehicular Ad Hoc Networks
|
Ngo, Chi Trung |
|
2018 |
134 |
C |
p. 259-266 |
artikel |
29 |
Fine-grained Access Control Framework for Igor, a Unified Access Solution to The Internet of Things
|
Wen Shieng, Pauline Sia |
|
2018 |
134 |
C |
p. 385-392 |
artikel |
30 |
Fog Computing: Data Streaming Services for Mobile End-Users
|
Sheltami, Tarek R. |
|
2018 |
134 |
C |
p. 289-296 |
artikel |
31 |
How blockchain improves the supply chain: case study alimentary supply chain
|
Casado-Vara, Roberto |
|
2018 |
134 |
C |
p. 393-398 |
artikel |
32 |
Human Mobility Prediction Through Twitter
|
Comito, Carmela |
|
2018 |
134 |
C |
p. 129-136 |
artikel |
33 |
IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors
|
Chawki, El Balmany |
|
2018 |
134 |
C |
p. 328-333 |
artikel |
34 |
Keynote I
|
Benitez, Domingo |
|
2018 |
134 |
C |
p. 6 |
artikel |
35 |
Keynote II
|
Bentahar, Jamal |
|
2018 |
134 |
C |
p. 7-8 |
artikel |
36 |
Low-cost smartphone-based speed surveying methods in proximity to traffic calming devices
|
Berloco, Nicola |
|
2018 |
134 |
C |
p. 415-420 |
artikel |
37 |
Mobile for emergencies M4EM: a cooperative software tool for emergency management operations
|
Astarita, Vittorio |
|
2018 |
134 |
C |
p. 433-438 |
artikel |
38 |
Mobile Systems applied to Traffic Management and Safety: a state of the art
|
Astarita, Vittorio |
|
2018 |
134 |
C |
p. 407-414 |
artikel |
39 |
Model-Based Runtime Monitoring of Smart City Systems
|
Incki, Koray |
|
2018 |
134 |
C |
p. 75-82 |
artikel |
40 |
Monitoring System Using Internet of Things For Potential Landslides
|
Moulat, Meryem El |
|
2018 |
134 |
C |
p. 26-34 |
artikel |
41 |
Multi-Agent based platform dedicated to C-ITS
|
Zrari, Chadha |
|
2018 |
134 |
C |
p. 243-250 |
artikel |
42 |
Multi Criteria Decision Making (MCDM) based Spectrum Moderator for Fog-Assisted Internet of Things
|
Eswaran, Subha P |
|
2018 |
134 |
C |
p. 399-406 |
artikel |
43 |
Network State Conservation in Dynamic Spectrum Access: the IEEE 802.11 DCF Case
|
Peng, Jun |
|
2018 |
134 |
C |
p. 275-282 |
artikel |
44 |
One query to retrieve XML and Relational Data
|
Nassiri, Hassana |
|
2018 |
134 |
C |
p. 340-345 |
artikel |
45 |
On Hierarchical Crossing-layer Binding Update Scheme for Industrial Mobile Networking
|
Hwang, Soonsung |
|
2018 |
134 |
C |
p. 161-168 |
artikel |
46 |
On Microcell-Macrocell Handoff Queueing scheme in Heterogeneous Industrial Networks
|
Um, Changyong |
|
2018 |
134 |
C |
p. 169-176 |
artikel |
47 |
On PMIPv6-based Cost-Effective Function-distributed Mobility Management Scheme for Industrial Future Internet
|
Kim, Jeong-A |
|
2018 |
134 |
C |
p. 43-50 |
artikel |
48 |
Optimally Protecting Elections with Uncertainty about Voter Preferences
|
Li, Mingchu |
|
2018 |
134 |
C |
p. 251-258 |
artikel |
49 |
Optimal Resource Allocation in Cyber-Security: A Game Theoretic Approach
|
Sokri, Abderrahmane |
|
2018 |
134 |
C |
p. 283-288 |
artikel |
50 |
PentaNoc: A New Scalable and self-similar NoC Architecture
|
Boudellioua, Ahlem |
|
2018 |
134 |
C |
p. 358-364 |
artikel |
51 |
Preface
|
Shakshuki, Elhadi |
|
2018 |
134 |
C |
p. 4-5 |
artikel |
52 |
Preface
|
Yasar, Ansar-Ul-Haque |
|
2018 |
134 |
C |
p. 1-3 |
artikel |
53 |
Proceeding
|
|
|
2018 |
134 |
C |
p. 9 |
artikel |
54 |
Proceeding
|
|
|
2018 |
134 |
C |
p. 177 |
artikel |
55 |
Proposal of a Big data System Based on the Recommendation and Profiling Techniques for an Intelligent Management of Moroccan Tourism
|
Boulaalam, Oumayma |
|
2018 |
134 |
C |
p. 346-351 |
artikel |
56 |
Referenceable mobile crowdsensing architecture: A healthcare use case
|
Mehdi, Muntazir |
|
2018 |
134 |
C |
p. 445-451 |
artikel |
57 |
Security of Join Procedure and its Delegation in LoRaWAN v1.1
|
Dönmez, Tahsin C.M. |
|
2018 |
134 |
C |
p. 204-211 |
artikel |
58 |
Security of LoRaWAN v1.1 in Backward Compatibility Scenarios
|
Dönmez, Tahsin C.M. |
|
2018 |
134 |
C |
p. 51-58 |
artikel |
59 |
Simulation Platform of Optical Transmission System in Matlab Simulink
|
Šalík, Pavol |
|
2018 |
134 |
C |
p. 196-203 |
artikel |
60 |
SMS: Smart Management Scheme via Software Defined Networks
|
Quttoum, Ahmad Nahar |
|
2018 |
134 |
C |
p. 303-308 |
artikel |
61 |
Table of Contents
|
|
|
2018 |
134 |
C |
p. iii-vi |
artikel |
62 |
The hybrid neural model to strengthen the e-nose restricted in real complex conditions
|
Ouhmad, Slimane |
|
2018 |
134 |
C |
p. 107-113 |
artikel |
63 |
The use of Smartphones to assess the Feasibility of a Cooperative Intelligent Transportation Safety System based on Surrogate Measures of Safety
|
Astarita, Vittorio |
|
2018 |
134 |
C |
p. 427-432 |
artikel |
64 |
Third-generation sequencing data analytics on mobile devices: cache oblivious and out-of-core approaches as a proof-of-concept
|
Milicchio, Franco |
|
2018 |
134 |
C |
p. 219-226 |
artikel |
65 |
Towards a Beacon-based Situational Prioritization Framework for Process-Aware Information Systems
|
Stach, Michael |
|
2018 |
134 |
C |
p. 153-160 |
artikel |
66 |
Towards a New approach for automating the simulation of QoS mechanisms in a smart digital environment
|
Bahnasse, Ayoub |
|
2018 |
134 |
C |
p. 227-234 |
artikel |
67 |
Towards a Real-time Occupancy Detection Approach for Smart Buildings
|
Elkhoukhi, H. |
|
2018 |
134 |
C |
p. 114-120 |
artikel |
68 |
Towards Distributed Containerized Serverless Architecture in Multi Cloud Environment
|
Soltani, Boubaker |
|
2018 |
134 |
C |
p. 121-128 |
artikel |
69 |
Towards Incentive Management Mechanisms in the Context of Crowdsensing Technologies based on TrackYourTinnitus Insights
|
Agrawal, Kushal |
|
2018 |
134 |
C |
p. 145-152 |
artikel |
70 |
Trust-based Context-aware Authentication System for Ubiquitous Systems
|
Yaici, Malika |
|
2018 |
134 |
C |
p. 35-42 |
artikel |
71 |
Unpredictable cryptographic primitives for the Robust Wireless Network Security
|
Asimi, Younes |
|
2018 |
134 |
C |
p. 316-321 |
artikel |