default search action
EUSPN/ICTH 2013: Niagara Falls, Ontario, Canada
- Elhadi M. Shakshuki:
The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), Niagara Falls, Ontario, Canada, October 21-24, 2013. Procedia Computer Science 21, Elsevier 2013 - Zygmunt J. Haas:
Keynote. 6 - Ridha Khédri, Karim Djouani:
Preface. 7-8 - Yashar Fazili, Alireza Nafarieh, William Robertson:
Adaptive Green Routing Mechanism over Optical Networks. 9-17 - Nayer A. Hamidi, G. K. Mahdi Rahimi, Alireza Nafarieh, Ali Hamidi, Bill Robertson:
Personalized Security Approaches in E-banking Employing Flask Architecture over Cloud Environment. 18-24 - Alireza Nafarieh, Yashar Fazili, William Robertson:
Dynamic Inter-domain Negotiation for Green Algorithms in Optical Networks. 25-32 - Alireza Nafarieh, Yashar Fazili, William Robertson:
Analysis of Lightpath Re-provisioning in Green Optical Networks. 33-39 - Tayseer Alkhdour, Elhadi M. Shakshuki, Shokri Z. Selim, Uthman Baroudi:
An Optimal Energy Efficient and Minimum Delay Scheduling for Periodic WSN Applications. 40-49 - Ridha Khédri, Fei Chiang, Khair Eddin Sabri:
An Algebraic Approach Towards Data Cleaning. 50-59 - Heba A. Kurid, Thanaa S. Alnusairi, Hajar S. Almujahed:
OBAME: Optimized Bio-inspired Algorithm to Maximize Search Efficiency in P2P Databases. 60-67 - Dave Mason:
Data Programming for Non-programmers. 68-74 - Choukri Djellali:
A New Data Mining System for Ontology Learning Using Dynamic Time Warping Alignment as a Case. 75-82 - Eleana Asimakopoulou, Stelios Sotiriadis, Nik Bessis, Ciprian Dobre, Valentin Cristea:
Centralized Micro-clouds: An Infrastructure for Service Distribution in Collaborative Smart Devices. 83-90 - Jose Maria León-Coca, Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Federico Barrero, Nik Bessis:
Authentication Systems Using ID Cards over NFC Links: The Spanish Experience Using DNIe. 91-98 - Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Florin Pop, Valentin Cristea:
Performance Evaluation of Interoperable Micro-clouds. 99-106 - Xiaolong Xu, Nik Bessis, J. Cao:
An Autonomic Agent Trust Model for IoT systems. 107-113 - Flora Amato, Angelo Chianese, Antonino Mazzeo, Vincenzo Moscato, Antonio Picariello, Francesco Piccialli:
The Talking Museum Project. 114-121 - Edewede Oriwoh, Paul Sant, Gregory Epiphaniou:
Guidelines for Internet of Things Deployment Approaches - The Thing Commandments. 122-131 - Jorge E. Gómez, Juan F. Huete, Oscar Hoyos, Luis Perez, Daniela Grigori:
Interaction System based on Internet of Things as Support for Education. 132-139 - Chao Chen, Yihai Chen, Huaikou Miao, Hao Wang:
Usage-pattern based Statistical Web Testing and Reliability Measurement. 140-147 - Karam Mustapha, Hamid Mcheick, Sehl Mellouli:
Modeling and Simulation Agent-based of Natural Disaster Complex Systems. 148-155 - Ahmed-Chawki Chaouche, Amal El Fallah Seghrouchni, Jean-Michel Ilié, Djamel-Eddine Saïdouni:
A Higher-order Agent Model for Ambient Systems. 156-163 - S. M. Mozammal Hossain, Elhadi M. Shakshuki:
A Negotiation Protocol for Meeting Scheduling Agent. 164-173 - David Swords, Anara Sandygulova, Sameh Abdalla, Gregory M. P. O'Hare:
Electroencephalograms for Ubiquitous Robotic Systems. 174-182 - Jun Wu, Mianxiong Dong, Kaoru Ota, Zhenyu Zhou:
Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks. 183-190 - Anwar Saif, Mohamed Othman:
A Reliable A-MSDU Frame Aggregation Scheme in 802.11n Wireless Networks. 191-198 - Tarek R. Sheltami:
An Enhanced Energy Saving Approach for WSNs. 199-206 - Alireza Masoum, Nirvana Meratnia, Paul J. M. Havinga:
A Distributed Compressive Sensing Technique for Data Gathering in Wireless Sensor Networks. 207-216 - Ali Elkateeb:
RH-mote for Next-generation Wireless Sensor Networks. 217-224 - Nidal Qwasmi, Daniel Smullen, Ramiro Liscano:
Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor Networks. 225-233 - Ali Benzerbadj, Kechar Bouabdellah:
Redundancy and Criticality based Scheduling in Wireless Video Sensor Networks for Monitoring Critical Areas. 234-241 - Oyuntungalag Chagnaadorj, Jiro Tanaka:
MobileCA: Accumulative Secure Group Association with a Certification Path. 242-249 - Sahel Alouneh, Mazen Kharbutli, Rana AlQurem:
Stack Memory Buffer Overflow Protection based on Duplication and Randomization. 250-256 - Sébastien Guillet, Bruno Bouchard, Abdenour Bouzouane:
Correct by Construction Security Approach to Design Fault Tolerant Smart Homes for Disabled People. 257-264 - Manjinder Nir, Ashraf Matrawy:
Centralized Management of Scalable Cyber Foraging Systems. 265-273 - Makram Soui, Asma Abdelbaki, Marouane Kessentini, Khaled Ghédira:
Improving Adaptation Rules Quality Using Genetic Programming. 274-281 - Mohammad W. Elbes, Ala I. Al-Fuqaha:
Design of a Social Collaboration and Precise Localization Services for the Blind and Visually Impaired. 282-291 - Janet Light, Mohyuddin:
Preface. 292-294 - Wessam Gad El Rab, Osmar R. Zaïane, Mohammad El-Hajj:
Analyzing the Impact of UMLS Relations on Word-sense Disambiguation Accuracy. 295-301 - Chaiwoot Seetha, Suthida Goollawattanaporn, Chularat Tanprasert:
Transparent Digital Watermark on Drug's Images. 302-309 - Laiali Almazaydeh, Khaled Elleithy, Miad Faezipour, Ahmad Abushakra:
Apnea Detection based on Respiratory Signal Classification. 310-316 - Adrian Rutle, Fazle Rabbi, Wendy MacCaull, Yngve Lamo:
A User-friendly Tool for Model Checking Healthcare Workflows. 317-326 - Irini Genitsaridi, Haridimos Kondylakis, Lefteris Koumakis, Kostas Marias, Manolis Tsiknakis:
Towards Intelligent Personal Health Record Systems: Review, Criteria and Extensions. 327-334 - Mohamed Khalifa:
Barriers to Health Information Systems and Electronic Medical Records Implementation. A Field Study of Saudi Arabian Hospitals. 335-342 - Shirin Ghorbani, Weichang Du:
Personal Health Service Framework. 343-350 - Davy Preuveneers, Yolande Berbers, Wouter Joosen:
The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring. 351-359 - Thitipong Tanprasert, Chularat Tanprasert:
Tennis Racket Customization for Supporting Rehabilitation. 360-367 - Mohamed Rasslan, Mahmoud Nasreldin:
Identification Protocols based on Discrete Log Representation Problem. 368-373 - Udaya Kiran Tupakula, Vijay Varadharajan:
Security Techniques for Counteracting Attacks in Mobile Healthcare Services. 374-381 - Hawazin Badawi, Abdulmotaleb El-Saddik:
Towards a Context-Aware Biofeedback Activity Recommendation Mobile Application for Healthy Lifestyle. 382-389 - Reem Al-Nanih, Olga Ormandjieva, Thiruvengadam Radhakrishnan:
Context-based and Rule-based Adaptation of Mobile User Interfaces in mHealth. 390-397 - Ellen A. A. Jaatun, Dagny Faksvag Haugen, Yngve Dahl, Anders Kofod-Petersen:
Proceed with Caution: Transition from Paper to Computerized Pain Body Maps. 398-406 - Arini Widhiasi, Rosnah Idrus, Muhammad Fermi Pasha, Mohammad Syukur:
A Feasibility Study Scheme of an Android-based Integrated Wearable ECG Monitoring System. 407-414 - Zahoor Ali Khan, Nadeem Javaid:
Preface. 415 - Dixit Sharma, Ramiro Liscano, Shahram Shah-Heydari:
Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks. 416-423 - Ittipong Khemapech:
Feasibility Study of Direct Communication in Wireless Sensor Networks. 424-429 - Xiongwei Xie, Weichao Wang:
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding. 430-435 - Houda Zeghilet, Yacine Baziz, Moufida Maimour, Kechar Bouabdellah, Nadjib Badache:
The Effects of Interference on Video Quality Over Wireless Sensor Networks. 436-441 - Dimosthenis Kyriazis, Theodora A. Varvarigou:
Smart, Autonomous and Reliable Internet of Things. 442-448 - Nadeem Javaid, Obaid Ur Rehman, Nabil Ali Alrajeh, Zahoor Ali Khan, Basit Manzoor, S. Ahmed:
AID: An Energy Efficient Decoding Scheme for LDPC Codes in Wireless Body Area Sensor Networks. 449-454 - Zahra Taghikhaki, Nirvana Meratnia, Paul J. M. Havinga:
A Trust-based Probabilistic Coverage Algorithm for Wireless Sensor Networks. 455-464 - Joshua Ojo Nehinbe, Nehibe Johnson Ige:
Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders. 465-470 - Tarek R. Sheltami:
Preface. 471 - Hazem Morsy, Hesham El-Rewini:
Selective Power Aware Data Management Approach for Wireless Sensor Networks. 472-478 - Farrukh Shahzad:
Satellite Monitoring of Wireless Sensor Networks (WSNs). 479-484 - Shoieb Arshad, Azzat Al-Sadi, Abdulaziz Barnawi:
Z-MAC: Performance Evaluation and Enhancements. 485-490 - Tariq Al-Kadi, Ziyad Al-Tuwaijri, Abdullah Al-Omran:
Wireless Sensor Networks for Leakage Detection in Underground Pipelines: A Survey Paper. 491-498 - Qasem Abu Al-Haija, Hanan Al-Mubarak, Abdulla Al-Humam:
Hardware Design and Software Simulation for Four Classical Cryptosystems. 500-505 - Qasem Abu Al-Haija, Saleh Al-Abdulatif, Mohaned Al-Ghofaily:
An 8-bit Scientific Calculator based Intel 8086 Virtual Machine Emulator. 506-511 - Qasem Abu Al-Haija, Hasan Al-Amri, Mohamed Al-Nashri, Sultan Al-Muhaisen:
An Engineering Design of 4-bit Special Purpose Microprogrammed Processor. 512-516 - Qasem Abu Al-Haija, Hasan Al-Qadeeb, Abdulmohsen Al-Lwaimi:
Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSN. 517-521 - Tariq Al-Kadi, Ziyad Al-Tuwaijri, Abdullah Al-Omran:
Arduino Wi-Fi Network Analyzer. 522-529
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.