


default search action
EUSPN/ICTH 2013: Niagara Falls, Ontario, Canada
- Elhadi M. Shakshuki:

The 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), Niagara Falls, Ontario, Canada, October 21-24, 2013. Procedia Computer Science 21, Elsevier 2013 - Zygmunt J. Haas:

Keynote. 6 - Ridha Khédri, Karim Djouani

:
Preface. 7-8 - Yashar Fazili

, Alireza Nafarieh, William Robertson:
Adaptive Green Routing Mechanism over Optical Networks. 9-17 - Nayer A. Hamidi, G. K. Mahdi Rahimi, Alireza Nafarieh, Ali Hamidi, Bill Robertson:

Personalized Security Approaches in E-banking Employing Flask Architecture over Cloud Environment. 18-24 - Alireza Nafarieh, Yashar Fazili

, William Robertson:
Dynamic Inter-domain Negotiation for Green Algorithms in Optical Networks. 25-32 - Alireza Nafarieh, Yashar Fazili

, William Robertson:
Analysis of Lightpath Re-provisioning in Green Optical Networks. 33-39 - Tayseer Alkhdour

, Elhadi M. Shakshuki
, Shokri Z. Selim
, Uthman Baroudi
:
An Optimal Energy Efficient and Minimum Delay Scheduling for Periodic WSN Applications. 40-49 - Ridha Khédri, Fei Chiang, Khair Eddin Sabri

:
An Algebraic Approach Towards Data Cleaning. 50-59 - Heba A. Kurid, Thanaa S. Alnusairi, Hajar S. Almujahed:

OBAME: Optimized Bio-inspired Algorithm to Maximize Search Efficiency in P2P Databases. 60-67 - Dave Mason

:
Data Programming for Non-programmers. 68-74 - Choukri Djellali:

A New Data Mining System for Ontology Learning Using Dynamic Time Warping Alignment as a Case. 75-82 - Eleana Asimakopoulou, Stelios Sotiriadis, Nik Bessis

, Ciprian Dobre
, Valentin Cristea:
Centralized Micro-clouds: An Infrastructure for Service Distribution in Collaborative Smart Devices. 83-90 - Jose Maria León-Coca, Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Federico Barrero

, Nik Bessis
:
Authentication Systems Using ID Cards over NFC Links: The Spanish Experience Using DNIe. 91-98 - Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis

, Florin Pop, Valentin Cristea:
Performance Evaluation of Interoperable Micro-clouds. 99-106 - Xiaolong Xu, Nik Bessis

, J. Cao:
An Autonomic Agent Trust Model for IoT systems. 107-113 - Flora Amato

, Angelo Chianese, Antonino Mazzeo
, Vincenzo Moscato
, Antonio Picariello
, Francesco Piccialli
:
The Talking Museum Project. 114-121 - Edewede Oriwoh, Paul Sant

, Gregory Epiphaniou
:
Guidelines for Internet of Things Deployment Approaches - The Thing Commandments. 122-131 - Jorge E. Gómez

, Juan F. Huete
, Oscar Hoyos, Luis Perez, Daniela Grigori:
Interaction System based on Internet of Things as Support for Education. 132-139 - Chao Chen, Yihai Chen, Huaikou Miao, Hao Wang

:
Usage-pattern based Statistical Web Testing and Reliability Measurement. 140-147 - Karam Mustapha, Hamid Mcheick

, Sehl Mellouli
:
Modeling and Simulation Agent-based of Natural Disaster Complex Systems. 148-155 - Ahmed-Chawki Chaouche

, Amal El Fallah Seghrouchni, Jean-Michel Ilié
, Djamel-Eddine Saïdouni:
A Higher-order Agent Model for Ambient Systems. 156-163 - S. M. Mozammal Hossain, Elhadi M. Shakshuki

:
A Negotiation Protocol for Meeting Scheduling Agent. 164-173 - David Swords, Anara Sandygulova

, Sameh Abdalla, Gregory M. P. O'Hare
:
Electroencephalograms for Ubiquitous Robotic Systems. 174-182 - Jun Wu, Mianxiong Dong

, Kaoru Ota
, Zhenyu Zhou
:
Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks. 183-190 - Anwar Saif, Mohamed Othman:

A Reliable A-MSDU Frame Aggregation Scheme in 802.11n Wireless Networks. 191-198 - Tarek R. Sheltami

:
An Enhanced Energy Saving Approach for WSNs. 199-206 - Alireza Masoum, Nirvana Meratnia, Paul J. M. Havinga:

A Distributed Compressive Sensing Technique for Data Gathering in Wireless Sensor Networks. 207-216 - Ali Elkateeb:

RH-mote for Next-generation Wireless Sensor Networks. 217-224 - Nidal Qwasmi, Daniel Smullen, Ramiro Liscano:

Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor Networks. 225-233 - Ali Benzerbadj

, Kechar Bouabdellah:
Redundancy and Criticality based Scheduling in Wireless Video Sensor Networks for Monitoring Critical Areas. 234-241 - Oyuntungalag Chagnaadorj, Jiro Tanaka:

MobileCA: Accumulative Secure Group Association with a Certification Path. 242-249 - Sahel Alouneh

, Mazen Kharbutli, Rana AlQurem:
Stack Memory Buffer Overflow Protection based on Duplication and Randomization. 250-256 - Sébastien Guillet, Bruno Bouchard, Abdenour Bouzouane:

Correct by Construction Security Approach to Design Fault Tolerant Smart Homes for Disabled People. 257-264 - Manjinder Nir, Ashraf Matrawy:

Centralized Management of Scalable Cyber Foraging Systems. 265-273 - Makram Soui

, Asma Abdelbaki, Marouane Kessentini, Khaled Ghédira:
Improving Adaptation Rules Quality Using Genetic Programming. 274-281 - Mohammad W. Elbes, Ala I. Al-Fuqaha

:
Design of a Social Collaboration and Precise Localization Services for the Blind and Visually Impaired. 282-291 - Janet Light, Mohyuddin:

Preface. 292-294 - Wessam Gad El Rab, Osmar R. Zaïane, Mohammad El-Hajj:

Analyzing the Impact of UMLS Relations on Word-sense Disambiguation Accuracy. 295-301 - Chaiwoot Seetha, Suthida Goollawattanaporn, Chularat Tanprasert:

Transparent Digital Watermark on Drug's Images. 302-309 - Laiali Almazaydeh, Khaled Elleithy

, Miad Faezipour
, Ahmad Abushakra
:
Apnea Detection based on Respiratory Signal Classification. 310-316 - Adrian Rutle, Fazle Rabbi

, Wendy MacCaull, Yngve Lamo
:
A User-friendly Tool for Model Checking Healthcare Workflows. 317-326 - Irini Genitsaridi, Haridimos Kondylakis

, Lefteris Koumakis
, Kostas Marias
, Manolis Tsiknakis:
Towards Intelligent Personal Health Record Systems: Review, Criteria and Extensions. 327-334 - Mohamed Khalifa

:
Barriers to Health Information Systems and Electronic Medical Records Implementation. A Field Study of Saudi Arabian Hospitals. 335-342 - Shirin Ghorbani, Weichang Du:

Personal Health Service Framework. 343-350 - Davy Preuveneers, Yolande Berbers, Wouter Joosen:

The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes Monitoring. 351-359 - Thitipong Tanprasert, Chularat Tanprasert:

Tennis Racket Customization for Supporting Rehabilitation. 360-367 - Mohamed Rasslan

, Mahmoud Nasreldin:
Identification Protocols based on Discrete Log Representation Problem. 368-373 - Udaya Kiran Tupakula, Vijay Varadharajan

:
Security Techniques for Counteracting Attacks in Mobile Healthcare Services. 374-381 - Hawazin Badawi, Abdulmotaleb El-Saddik

:
Towards a Context-Aware Biofeedback Activity Recommendation Mobile Application for Healthy Lifestyle. 382-389 - Reem Al-Nanih

, Olga Ormandjieva, Thiruvengadam Radhakrishnan:
Context-based and Rule-based Adaptation of Mobile User Interfaces in mHealth. 390-397 - Ellen A. A. Jaatun, Dagny Faksvag Haugen, Yngve Dahl

, Anders Kofod-Petersen:
Proceed with Caution: Transition from Paper to Computerized Pain Body Maps. 398-406 - Arini Widhiasi, Rosnah Idrus, Muhammad Fermi Pasha

, Mohammad Syukur
:
A Feasibility Study Scheme of an Android-based Integrated Wearable ECG Monitoring System. 407-414 - Zahoor Ali Khan

, Nadeem Javaid
:
Preface. 415 - Dixit Sharma, Ramiro Liscano, Shahram Shah-Heydari:

Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks. 416-423 - Ittipong Khemapech:

Feasibility Study of Direct Communication in Wireless Sensor Networks. 424-429 - Xiongwei Xie, Weichao Wang:

Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding. 430-435 - Houda Zeghilet, Yacine Baziz, Moufida Maimour

, Kechar Bouabdellah, Nadjib Badache:
The Effects of Interference on Video Quality Over Wireless Sensor Networks. 436-441 - Dimosthenis Kyriazis

, Theodora A. Varvarigou:
Smart, Autonomous and Reliable Internet of Things. 442-448 - Nadeem Javaid

, Obaid Ur Rehman, Nabil Ali Alrajeh
, Zahoor Ali Khan
, Basit Manzoor, S. Ahmed:
AID: An Energy Efficient Decoding Scheme for LDPC Codes in Wireless Body Area Sensor Networks. 449-454 - Zahra Taghikhaki, Nirvana Meratnia, Paul J. M. Havinga:

A Trust-based Probabilistic Coverage Algorithm for Wireless Sensor Networks. 455-464 - Joshua Ojo Nehinbe

, Nehibe Johnson Ige:
Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders. 465-470 - Tarek R. Sheltami

:
Preface. 471 - Hazem Morsy, Hesham El-Rewini:

Selective Power Aware Data Management Approach for Wireless Sensor Networks. 472-478 - Farrukh Shahzad:

Satellite Monitoring of Wireless Sensor Networks (WSNs). 479-484 - Shoieb Arshad, Azzat Al-Sadi, Abdulaziz Barnawi:

Z-MAC: Performance Evaluation and Enhancements. 485-490 - Tariq Al-Kadi, Ziyad Al-Tuwaijri, Abdullah Al-Omran:

Wireless Sensor Networks for Leakage Detection in Underground Pipelines: A Survey Paper. 491-498 - Qasem Abu Al-Haija

, Hanan Al-Mubarak, Abdulla Al-Humam:
Hardware Design and Software Simulation for Four Classical Cryptosystems. 500-505 - Qasem Abu Al-Haija

, Saleh Al-Abdulatif, Mohaned Al-Ghofaily:
An 8-bit Scientific Calculator based Intel 8086 Virtual Machine Emulator. 506-511 - Qasem Abu Al-Haija

, Hasan Al-Amri, Mohamed Al-Nashri, Sultan Al-Muhaisen:
An Engineering Design of 4-bit Special Purpose Microprogrammed Processor. 512-516 - Qasem Abu Al-Haija

, Hasan Al-Qadeeb, Abdulmohsen Al-Lwaimi:
Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSN. 517-521 - Tariq Al-Kadi, Ziyad Al-Tuwaijri, Abdullah Al-Omran:

Arduino Wi-Fi Network Analyzer. 522-529

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














