Stop the war!
Остановите войну!
for scientists:
default search action
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, Volume 2
Volume 2, Number 2, February 2015
- Marius Georgescu, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi:
Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed. e1 - Tim Gerhard, Dennis Schwerdel, Paul Müller:
A networkless data exchange and control mechanism for virtual testbed devices. e2 - Héctor Martínez, Seppo Laukkanen:
Towards an augmented reality guiding system for assisted indoor remote vehicle navigation. e3 - Eric McCary, Yang Xiao:
Smart Grid Attacks and Countermeasures. e4 - Huawei Zhao, Jiankun Hu:
A Trusted Mobile Payment Scheme Based on Body Area Networks. e5
Volume 2, Number 3, May 2015
- Thierno Ahmadou Diallo, Olivier Flauzac, Luiz Angelo Steffenel, Samba N'Diaye:
GRAPP&S, a Peer-to-Peer Middleware for Interlinking and Sharing Educational Resources. e1 - Malla Reddy Sama, Yvon Gourhant, Lucian Suciu:
Cloud Based Mobile Network Sharing: A New Model. e2 - Agnes Wai Yan Chan, Eddie H. T. Ko, Eric M. Y. Ho, Dickson K. W. Chiu, Elza Yin Ling Chan:
Information seeking behaviour and purchasing decision: case study in digital cameras. e3 - Dramane Ouattara, Mohamed Aymen Chalouf, Francine Krief, Omessaad Hamdi:
Wireless Broadband Opportunities through TVWS for Networking in Rural areas of Africa. e4 - Mohiuddin Ahmed, Adnan Anwar, Abdun Naser Mahmood, Zubair Shah, Michael J. Maher:
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. e5
Volume 2, Number 4, June 2015
- Gerald Eichler, Christian Erfurth, Hacène Fouchal:
Welcome message from the Editors. e1 - Frédéric Blanchard, Amine Aït Younes, Michel Herbin:
Linking Data According to Their Degree of Representativeness (DoR). e2 - Francisco Sanchez-Fernandez, Philippe Brunet, Sidi-Mohammed Senouci:
A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions. e3 - Lynda Mokdad, Jalel Ben-Othman, Abdelli Abdelkrim:
Performance evaluation of composite Web services. e4 - Leandros A. Maglaras:
Coupling of the synchronization stations of an Extended Kanban system. e5 - Shang-Pin Ma, Shin-Jie Lee, Wen-Tin Lee, Jing-Hong Lin, Jui-Hsaing Lin:
Mobile Application Search: A QoS-Aware and Tag-Based Approach. e6
Volume 2, Number 5, September 2015
- Aya Mostafa, Khaled Hassan:
Energy Harvesting Aware Clustering and Opportunistic Transmission with Fuzzy Petri Net Reasoning. e1 - Zakaria Maamar, Noura Faci, Ejub Kajan, Sherif Sakr, Mohamed Boukhebouze, Ahmed Barnawi:
How to Make Business Processes "Socialize"? e2 - Kui-Ting Chen, Ke Fan, Yijun Dai, Takaaki Baba:
A Particle Swarm Optimization with Adaptive Multi-Swarm Strategy for Capacitated Vehicle Routing Problem. e3 - Mohammad Fal Sadikin, Marcel Kyas:
Light-weight Key Management Scheme for Active RFID Applications. e4 - Lei Shu, Xufeng Zhu, Xiwei Huang, Zhangbing Zhou, Yu Zhang, Xiaolei Wang:
A Review of Research on Acoustic Detection of Heat Exchanger Tube. e5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.