default search action
34th AINA 2020: Caserta, Italy - Workshops
- Leonard Barolli, Flora Amato, Francesco Moscato, Tomoya Enokido, Makoto Takizawa:
Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications, AINA Workshops 2020, Caserta, Italy, 15-17 April. Advances in Intelligent Systems and Computing 1150, Springer 2020, ISBN 978-3-030-44037-4
The 16th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2020)
- Fangrong Zhou, Yi Ma, Yutang Ma, Hao Pan:
Infrared Image Fault Identification of Power Equipment Based on Residual Network. 3-13 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii:
Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet. 14-23 - James Robertson, Jianhua Yang, W. Scott Gunter, Peter Keres, Thomas Wingate, Anthony Obando:
Educational Microclimate Mesonet System Design. 24-33 - Ziyad Elbanna, Ilya Afanasyev, Luiz Jonatã Pires de Araújo, Rasheed Hussain, Mansur Khazeev, Joseph Lamptey, Manuel Mazzara, Swati Megha, Diksha Moolchandani, Dragos Strugar:
A Machine to Machine Framework for the Charging of Electric Autonomous Vehicles. 34-45 - Zakaria Maamar, Mohamed Sellami, Thar Baker, Said Elnaffar, Maj Alshibly:
Atomicity in the Internet of Transactional Things (Io2T). 46-55 - Junke Nie, Xu An Wang, Yang Su, Bo Wang:
Intrusion Detection Based on Cluster Analysis and Nonsymmetric Autoencoder. 56-64 - Andreas Grüner, Alexander Mühle, Michael Meinig, Christoph Meinel:
A Taxonomy of Trust Models for Attribute Assurance in Identity Management. 65-76 - Qian Du, Bo Zhang, Jiuru Wang, Wenyin Zhang, Weifa Liu:
Design and Development of a New Tea-Making Ecosystem. 77-82 - Amna Fekih, Sonia Gaied Fantar, Habib Youssef:
SDN-Based Replication Management Framework for CCN Networks. 83-99 - Marcelo Silva Freitas, Pedro Frosi Rosa, Flávio de Oliveira Silva:
ConForm: In-Band Control Flows Self-establishment with Integrated Topology Discovery to SDN-Based Networks. 100-109 - Olli Väänänen, Mikhail Zolotukhin, Timo Hämäläinen:
Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data Sets. 110-121 - Farhan Amin, Jin-Ghoo Choi, Gyu Sang Choi:
Community Detection Based on Social Influence in Large Scale Networks. 122-137 - Kaiyang Zhao, Xu An Wang, Yao Liu, Jiasen Liu, Songyin Zhao:
Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing. 138-148 - Bacem Mbarek, Nafaâ Jabeur, Tomás Pitner:
Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme. 149-158 - Tesnim Mekki, Issam Jabri, Lamia Chaari, Abderrezak Rachedi:
A Survey on Vehicular Fog Computing: Motivation, Architectures, Taxonomy, and Issues. 159-168 - Hao-Hsiang Ku:
Design of an Ontology-Oriented Hand Rehabilitation Service Platform for Rheumatoid Arthritis Patients. 169-177 - Raj Sanjay Shah, Ashutosh Bhatia:
Bitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics Framework. 178-189 - Sandhya Rathee, K. Haribabu, Parth Patel, Ashutosh Bhatia, Ujjwal Gandhi:
Analysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDN. 190-200 - Di Huang, Zhan Xu, Zhigang Tian:
Deployment of NRF in the Docker and Kubernetes - Based NFV Platform. 201-213 - Annibale Elia, Alessandro Maisto, Giandomenico Martorelli, Serena Pelosi, Pierluigi Vitale:
Textual Statistics and Named Entity Recognition Applied to Game of Thrones Novels. 214-222 - Kamrun Nahar, Asif Qumer Gill:
A Review Towards the Development of Ontology Based Identity and Access Management Metamodel. 223-232 - El-hacen Diallo, Khaldoun Al Agha, Omar Dib, Alexandre Laubé, Hafedh Mohamed-Babou:
Toward Scalable Blockchain for Data Management in VANETs. 233-244 - Nadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah:
A New SDN Architecture Based on Trust Management and Access Control for IoT. 245-254 - Masataka Akasaka, Hiroyoshi Miwa:
Efficient Method for Link Protection Under Multiple Constraints Using ZDD. 255-264
The 16th International Workshop on Heterogeneous Wireless Networks (HWISE-2020)
- Fatima Tariq, Maria Anwar, Abdul Rehman Janjua, Muhammad Haseeb Khan, Asad Ullah Khan, Nadeem Javaid:
Blockchain in WSNs, VANets, IoTs and Healthcare: A Survey. 267-279 - Razvan Bocu:
A Constructive Review Regarding the Significance of 5G Networks for the Internet of Things. 280-298 - Rahma Gantassi, Bechir Ben Gouissem, Jalel Ben-Othman:
Routing Protocol LEACH-K Using K-Means Algorithm in Wireless Sensor Network. 299-309 - Eirini Barri, Christos Bouras:
Efficient Mechanism of eNB Bandwidth in D2D Communication in 5G. 310-319 - Mubariz Rehman, Zahoor Ali Khan, Muhammad Umar Javed, Muhammad Zohaib Iftikhar, Usman Majeed, Imam Bux, Nadeem Javaid:
A Blockchain Based Distributed Vehicular Network Architecture for Smart Cities. 320-331 - Makoto Ikeda, Shogo Nakasaki, Yoshiki Tada, Leonard Barolli:
Performance Evaluation of a Message Relaying Method with Enhanced Dynamic Timer in Vehicular DTN. 332-340 - M. Hamza Bin Waheed, Rao Naveed Bin Rais, Hassan Khan, Mukhtiar Bano, Syed Sherjeel A. Gilani:
Indoor Mobile Localization Using Wireless Sensor Networks (WSNs). 341-351 - Dardouri Soumaya, Samia Dardouri, Ridha Bouallegue:
Performance Evaluation of Routing Protocols for Vehicular AD-HOC Networks Using NS2/SUMO. 352-365 - Mukhtiar Bano, Rao Naveed Bin Rais, Syed Sherjeel A. Gilani, Amir Qayyum:
SDNHybridMesh: A Hybrid Routing Architecture for SDN Based Wireless Mesh Networks. 366-375 - Khaoula Ammar, Oussama Ben Haj Belkacem, Ridha Bouallegue:
DSSS Transmission Technique to Joint Radar Sensing and Wireless Communications in V2V System. 376-385
The 13th International Symposium on Mining and Web (MAW-2020)
- Nathanael Mercaldo, Wei Lu:
Classification of Web Applications Using AiFlow Features. 389-399 - Sergey Koziakov, Manuel Mazzara:
Proximity-Based Context Information Retrieval for Bluetooth Enabled Devices. 400-409 - Ariel Rodríguez, Koji Okamura:
Cybersecurity Text Data Classification and Optimization for CTI Systems. 410-419 - Alessandro Maisto:
LG-Starship: A Framework for Text Analysis. 420-428 - Reda A. Zayed, Lamiaa Fattouh Ibrahim, Hesham A. Hefny, Hesham Abou El Fetouh Salman:
Shilling Attacks Detection in Collaborative Recommender System: Challenges and Promise. 429-439 - Hiroakik Fuma, Kosuke Takano:
A Face and Posture Recognition Model Using CNN for Adapting Different Resolution Images. 440-446 - Linlin Zhang, Kin Fun Li:
Factors for Academic Performance Prediction. 447-457
The 13th International Workshop on Bio and Intelligent Computing (BICom-2020)
- Fangrong Zhou, Yi Ma, Yutang Ma, Hao Pan:
Infrared Image Fault Identification Method Based on YOLO Target Detection Algorithm. 461-470 - Arooj Arif, Nadeem Javaid, Mubbashra Anwar, Afrah Naeem, Hira Gul, Sahiba Fareed:
Electricity Load and Price Forecasting Using Machine Learning Algorithms in Smart Grid: A Survey. 471-483 - Seyed M.-H. Mansourbeigi:
Recurrent Neural Networks Analysis Application Effect of Economy Sentiment on Car Manufacturing. 484-493 - Tong Zhang, Caiquan Xiong:
Person Re-identification Based on Camera Style Adaptation. 494-503 - Seiji Ohara, Admir Barolli, Phudit Ampririt, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
A Comparison Study of Constriction and Random Inertia Weight Router Replacement Methods for WMNs Using WMN-PSODGA Hybrid Intelligent System. 504-515
The 13th International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2020)
- Wei Hsu, Jung-Shan Lin, Yi-Chi Chen, Chun-Yen Wang, Chun-Tuan Huang:
An Automatic Software Quality and Function Assurance Case Study for Agile. 519-525 - Kiana Dziubinski, Masaki Bandai:
Your Neighbor Knows What You're Doing: Defending Smart Home IoT Device Traffic from Privacy LAN Attacks. 526-534 - Arisa Sekine, Masaki Bandai:
Tile Quality Selection Method in 360-Degree Tile-Based Video Streaming. 535-544 - Jan Feng, Bing-Kai Hong, Shin-Ming Cheng:
DDoS Attacks in Experimental LTE Networks. 545-553 - Shih-Hao Chang, Yan Pei, Ping-Tsai Chung:
Hash Flow: An Access Control Mechanism for Software Defined Network. 554-565 - Yuma Morino, Hiroyoshi Miwa:
Method by Protection to Reduce Probability of Cascade Failure. 566-575
The 11th International Workshop on Disaster and Emergency Information Network Systems (IWDENS-2020)
- Yudai Taniguchi, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata:
Proposal of a Self-help Support System in a Mega Disaster. 579-586 - Yoshitaka Shibata, Akira Sakuraba, Yoshikazu Arai, Yoshiya Saito, Jun Hakura:
Road State Information Platform for Automotive EV in Snow Country. 587-594 - Akira Sakuraba, Yoshitaka Shibata, Goshi Sato, Noriki Uchida, Toshihiro Tamura:
Social Experimental Evaluation of Road State Information System in Snow Country. 595-604 - Noriki Uchida, Misaki Fukumoto, Tomoyuki Ishida, Yoshitaka Shibata:
Static Body Detecting Methods by Locational and Rotational Sensors on Smartphone for DTN Based Disaster Information System. 605-613
The 8th International Workshop on Collaborative Emerging Systems (COLLABES-2020)
- WenChuan Yang, Jing Peng:
Research on EVM-Based Smart Contract Runtime Self-protection Technology Framework. 617-627 - Maroua Nouioua, Adel Alti, Belhassen Zouari:
Document Business Process Model Extension for Modeling Secure Ubiquitous Documents. 628-639 - François Aïssaoui, Samuel Berlemont, Marc Douet, Emna Mezghani:
A Semantic Model Toward Smart IoT Device Management. 640-650 - Kenshiro Mitsugi, Keita Matsuo, Leonard Barolli:
A Comparison Study of Control Devices for an Omnidirectional Wheelchair. 651-661 - Yiyi Wang, Koji Okamura:
Implementation and Evaluation on Automated E-Learning Contents Creation Based on Natural Language Processing Techniques. 662-670 - Faisal Shehzad, Nadeem Javaid, Usman Farooq, Hamza Tariq, Israr Ahmad, Sadia Jabeen:
IoT Enabled E-Business via Blockchain Technology Using Ethereum Platform. 671-683
The 8th International Workshop on Cloud Computing Project and Initiatives (CCPI-2020)
- Marta Catillo, Massimiliano Rak, Umberto Villano:
2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. 687-696 - Alfonso Marino, Paolo Pariso:
Digital Divide vs e-Government: Analyzing Italian Public Service. 697-708 - Beniamino Di Martino, Antonio Esposito, Stefania Nacchia, Salvatore Augusto Maisto, Uwe Breitenbücher:
An Ontology for OASIS TOSCA. 709-719 - Giuseppe Ferretti, Gianluigi Renzi:
Unconventional Usage of a Web-Based Survey: Gathering Quality Data for Green Awareness in Lawmaking. 720-729 - Fiammetta Marulli, Emanuele Bellini, Stefano Marrone:
A Security-Oriented Architecture for Federated Learning in Cloud Environments. 730-741
The 7th International Workshop on Privacy and Security Intricacies on the Web (INTRICATE-SEC-2020)
- Motoharu Takahashi, Masaki Narita, Toshimitsu Inomata, Eiji Sugino:
Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached Communication. 745-755 - Linhua Ding, Jiuru Wang, Yingkui Li, Wenyin Zhang:
On Security Information Interaction Model of Smart Grid Emergency System. 756-765 - Bacem Mbarek, Stanislav Chren, Bruno Rossi, Tomás Pitner:
An Enhanced Blockchain-Based Data Management Scheme for Microgrids. 766-775 - Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:
Colluding Android Apps Detection via Model Checking. 776-786 - Swati Megha, Joseph Lamptey, Hamza Mohamed Salem, Manuel Mazzara:
A Survey of Blockchain-Based Solutions for Energy Industry. 787-797 - Hadda Ben Elhadj, Rihab Jmal, Hajer Chelligue, Lamia Chaari Fourati:
A2ISDIoT: Artificial Intelligent Intrusion Detection System for Software Defined IoT Networks. 798-809 - Stefania Loredana Nita, Marius Iulian Mihailescu:
A Searchable Encryption Scheme Based on Elliptic Curves. 810-821 - Albandari Alsumayt:
Control of DoS Attacks During Merging Process Over the Internet of Things. 822-833 - Hisaaki Yamaba, Yuki Nagatomo, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMG. 834-844
The 7th International Workshop on Energy-Aware Systems, Communications and Security (EASyCoSe-2020)
- Massimo Ficco:
Comparing API Call Sequence Algorithms for Malware Detection. 847-856 - Nicola Cibin, Meriem Guerar, Alessio Merlo, Mauro Migliardi, Luca Verderame:
Towards a SIP-based DDoS Attack to the 4G Network. 857-866 - Luca Verderame, Davide Caputo, Mauro Migliardi, Alessio Merlo:
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems. 867-876 - Navid Shaghaghi, Zach Cameron, Nicholas Kniveton, Jesse Mayer, Will Tuttle, Peter Ferguson:
ÂB: An Energy Aware Communications Protocol (EACP) for the Internet of Things (IoT). 877-889 - Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, Antonella Santone:
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources. 890-901
The 6th International Workshop on Engineering Energy Efficient Internet Worked Smart seNsors (E3WSN-2020)
- Zaib Ullah, Roberto Gagliardi, Orhan Gemikonakli, Fadi Al-Turjman:
Network Lifetime Efficiency Based on Equal and Unequal Size Clustering Strategies. 905-916 - Matteo Micheletti, Roberto Gagliardi, Fausto Marcantoni, Alessandro Aloisio:
Unequal Rotating Energy Efficient Clustering for Heterogeneous Devices (UREECHD). 917-925 - Serafino Cicerone:
On Building Networks with Limited Stretch Factor. 926-936 - Alessandro Aloisio:
Coverage Subject to a Budget on Multi-Interface Networks with Bounded Carving-Width. 937-946 - Renato De Leone, Leonardo Mostarda:
Optimal Cluster Head Rotation for Heterogeneous WSNs. 947-955
The 5th International Workshop on Big Data Processing in Online Social Network (BOSON-2020)
- Fabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone:
Predicting Probability of Default Under IFRS 9 Through Data Mining Techniques. 959-969 - Alessandra Amato, Marco Giacalone:
Analysis of Data for SCAN Project. 970-977 - Alessandra Amato, Marco Giacalone:
Data Management in the European Project SCAN. 978-983 - Antonino Ferraro, Marco Giacalone:
Representing Knowledge on the European Small Claims Procedure. 984-992 - Alessandra Amato, Marco Giacalone:
Quality Control in the Process of Data Extraction. 993-1002 - Roberto Canonico, Giovanni Cozzolino, Antonino Ferraro, Vincenzo Moscato, Antonio Picariello, Fabio Raimondo Sorrentino, Giancarlo Sperlì:
A Smart ChatBot for Specialist Domains. 1003-1010 - Francesca Esposito, Mariacristina Falco, Pierluigi Vitale:
Experiencing Museums A Qualitative and Quantitative Description About Igers' Narration of an Exhibit Space. 1011-1018 - Marco Balzano, Walter Balzano, Loredana Sorrentino, Silvia Stranieri:
Smart Destination-Based Parking for the Optimization of Waiting Time. 1019-1027 - Walter Balzano, Chiara Pellecchia, Marco Balzano:
Lectures Retrieval: Improving Students' E-learning Process with a Search Engine Based on ASR Model. 1028-1034
The 3rd International Workshop on Internet of Everything and Machine Learning Applications (IOEMLA-2020)
- Omar Darwish, Christopher M. Stone, Ola Karajeh, Belal Alsinglawi:
Survey of Educational Cyber Ranges. 1037-1045 - Anderson B. de Lima, Bibek Gurung, Sardar M. Farhad:
Efficient App Based Smart Door Lock System Using Bluetooth. 1046-1055 - Hamza Malik, Sabin Sapkota, Sardar M. Farhad:
Reliable and Convenient Smart Light Control System Using Mobile App. 1056-1064 - Anju Rana, Farshid Hajati:
A Survey on Privacy and Security in Mobile Cloud Computing. 1065-1076 - Mahmoud Elkhodr, Jay K. Patel, Mehregan Mahdavi, Ergun Gide:
Prevention of Cross-Site Scripting Attacks in Web Applications. 1077-1086 - Alaa M. Allakany, Geeta Yadav, Kolin Paul, Koji Okamura:
Detection and Mitigation of LFA Attack in SDN-IoT Network. 1087-1096 - Maede Fotros, Javad Rezazadeh, Omid Ameri Sianaki:
A Survey on VANETs Routing Protocols for IoT Intelligent Transportation Systems. 1097-1115
The 2nd International Workshop on Multi-Clouds and Mobile Edge Computing (M2EC-2020)
- Yiannis Verginadis, Ioannis Patiniotakis, Marcin Prusinski, Marta Rózanska, Sebastian Thomas Schork, Gregoris Mentzas:
A Security and Privacy-Preserving Path for Enhancing Information Systems that Manage Cross-Cloud Applications. 1119-1132 - Evgenia Psarra, Yiannis Verginadis, Ioannis Patiniotakis, Dimitris Apostolou, Gregoris Mentzas:
A Context-Aware Security Model for a Combination of Attribute-Based Access Control and Attribute-Based Encryption in the Healthcare Domain. 1133-1142 - Thomas Dreibholz:
Flexible 4G/5G Testbed Setup for Mobile Edge Computing Using OpenAirInterface and Open Source MANO. 1143-1153 - Simon Kollberg, Ewnetu Bayuh Lakew, Petter Svärd, Erik Elmroth, Johan Tordsson:
Spreading the Heat: Multi-cloud Controller for Failover and Cross-Site Offloading. 1154-1164
The 2nd International Workshop on Artificial Intelligence and Machine Learning (AIMAL-2020)
- Afrah Naeem, Hira Gul, Arooj Arif, Sahiba Fareed, Mubbashra Anwar, Nadeem Javaid:
Short-Term Load Forecasting Using EEMD-DAE with Enhanced CNN in Smart Grid. 1167-1180 - Zahoor Ali Khan, Sahiba Fareed, Mubbashra Anwar, Afrah Naeem, Hira Gul, Arooj Arif, Nadeem Javaid:
Short Term Electricity Price Forecasting Through Convolutional Neural Network (CNN). 1181-1188 - Muhammad Adil, Nadeem Javaid, Nazia Daood, Muhammad Asim, Irfan Ullah, Muhammad Bilal:
Big Data Based Electricity Price Forecasting Using Enhanced Convolutional Neural Network in the Smart Grid. 1189-1201 - Lei Zhou, Caiquan Xiong, Na Deng, Li Shen:
Personalized Recommendation Algorithm Based on User Preference and User Profile. 1202-1211 - Nazia Daood, Zahoor Ali Khan, Ashraf Ullah, Muhammad Jaffar Khan, Muhammad Adil, Nadeem Javaid:
Electricity Price Forecasting Based on Enhanced Convolutional Neural Network in Smart Grid. 1212-1226 - Xi Chen, Caiquan Xiong, Na Deng:
Research on Friend Recommendation Based on Topic Model and Association Rules. 1227-1236
The 2nd International Workshop on Intelligent Computing and Measurements (InCM-2020)
- Shigeru Kato, Tomomichi Kagawa, Naoki Wada, Takanori Hino, Hajime Nobuhara:
Citrus Brand Classification by CNN Considering Load and Sound. 1239-1249 - Cuong Nguyen Cong, Ricardo Rodríguez Jorge, Nghien Nguyen Ba, Chuong Trinh Trong, Nghia Nguyen Anh:
Design of Optimal PI Controllers Using the Chemical Reaction Optimization Algorithm for Indirect Power Control of a DFIG Model with MPPT. 1250-1260 - Krzysztof Zatwarnicki:
Intelligent HTTP Request Distribution Strategies in One and Two-Layer Architectures of Cloud-Based Web Systems. 1261-1273 - Piotr Milczarski, Zofia Stawska:
Classification of Skin Lesions Shape Asymmetry Using Machine Learning Methods. 1274-1286 - Agnieszka Landowska, Ben Robins:
Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with Autism. 1287-1297 - Jolanta Wrzuszczak-Noga, Leszek Borzemski:
Prediction of Load Time for Different Agent Locations and Browsers. 1298-1307 - Jolanta Mizera-Pietraszko, Jolanta Tancula, Ireneusz Jozwiak:
Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers. 1308-1320 - Michal Szczepanik, Ireneusz J. Józwiak, Piotr P. Józwiak, Michal Kedziora, Jolanta Mizera-Pietraszko:
Android Hook Detection Based on Machine Learning and Dynamic Analysis. 1321-1329 - Martin Tabakov, Bartosz Jablonski:
A New Region Growing Medical Image Segmentation Algorithm Based on Interval Type-2 Fuzzy Sets. 1330-1340
The 1st International Workshop on Smart and Sustainable Mobility (SSUM-2020)
- Rocco Aversa, Dario Branco, Beniamino Di Martino, Salvatore Venticinque:
GreenCharge Simulation Tool. 1343-1351 - Marilisa Botte, Ilaria Tufano, Luca D'Acierno:
Infrastructure Access Policies to Promote Sustainable Driving Behaviours in Railway Contexts. 1352-1361 - Mariano Gallo, Mario Marinelli, Ivan Cavaiuolo:
The Effects of Accessibility on the Location of Manufacturing Companies: The Italian Case Study. 1362-1372 - Geir Horn, Tomasz Przezdziek, Monika Büscher, Salvatore Venticinque, Rocco Aversa, Beniamino Di Martino, Antonio Esposito, Pawel Skrzypek, Mark Leznik:
An Event-Driven Multi Agent System for Scalable Traffic Optimization. 1373-1382 - Armando Cartenì, Ilaria Henke, Clorinda Molitierno, Assunta Errico:
Towards E-mobility: Strengths and Weaknesses of Electric Vehicles. 1383-1393 - Marit K. Natvig, Shanshan Jiang, Svein O. Hallsteinsen:
Stakeholder Motivation Analysis for Smart and Green Charging for Electric Mobility. 1394-1407 - Luigi Pariota, Luca Di Costanzo, Francesco Spera, Gennaro Nicola Bifulco:
Simulation Experiments for an Approximate Definition of the Macroscopic Fundamental Diagram. 1408-1417 - Walter Balzano, Aniello Murano, Loredana Sorrentino, Silvia Stranieri:
Behavioral Clustering: A New Approach for Traffic Congestion Evaluation. 1418-1427
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.