default search action
CITS 2013: Athens, Greece
- International Conference on Computer, Information and Telecommunication Systems, CITS 2013, Athens, Greece, May 7-8, 2013. IEEE 2013
- Christos Troussas, Maria Virvou, Jaime D. L. Caro, Kurt Junshean Espinosa:
Mining relationships among user clusters in Facebook for language learning. 1-5 - Abidin Altintas, Berna Örs:
System level design of scalable encryption algorithm by using CoWare. 1-4 - Siham Ouamour, Halim Sayoud:
Authorship attribution of ancient texts written by ten Arabic travelers using character N-Grams. 1-5 - Prodromos Makris, Dimitrios N. Skoutas, Nikolaos Nomikos, Demosthenes Vouyioukas, Charalabos Skianis:
A Context-Aware Backhaul Management solution for combined H2H and M2M traffic. 1-5 - Glaucio H. S. Carvalho, Isaac Woungang, Mohammad S. Obaidat, Alagan Anpalagan, Md. Mizanur Rahman:
A joint call admission control-based approach for initial RAT selection in HetNets. 1-5 - Pierre André, Hélène Waeselynck, Nicolas Rivière:
A UML-based environment for test scenarios in mobile settings. 1-5 - Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Authorship verification for short messages using stylometry. 1-6 - Yuanyue Guo, Dongjin Wang, Falin Liu, Naoto Kishi:
A novel single-mode, linearly polarized, erbium-doped fiber laser with a stabilized frequency. 1-4 - Samuel T. Valduga, Dimas Irion Alves, Renato B. Machado, Andrei P. Legg, Murilo Bellezoni Loiola:
A low-complexity rate-one MIMO scheme with four transmit antennas and phase feedback. 1-5 - Maria Virvou, Spyros Papadimitriou:
Simple arithmetic lessons through an adaptive snake game. 1-4 - Nouri Omheni, Faouzi Zarai, Mohammad S. Obaidat, Kuei-Fang Hsiao, Lotfi Kamoun:
Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks. 1-5 - P. Venkata Krishna, Sudip Misra, Dheeraj Joshi, Mohammad S. Obaidat:
Learning Automata Based Sentiment Analysis for recommender system on cloud. 1-5 - Rafal Mielniczuk, Harald Gebhard, Zdzislaw Papir:
Multiplexing of GNSS data for differential augmentation via satellite IP broadcast links. 1-6 - Isaac Woungang, Mohammad S. Obaidat, Sanjay Kumar Dhurandher, Issa Traoré:
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks. 1-5 - Qi Yang, Zhongping Qin:
Secure systolic Montgomery modular multiplier resilient to Hardware Trojan and Fault-Injection attacks. 1-5 - Stamatios A. Theocharis, George A. Tsihrintzis:
Personalization as a means to improve e-services. 1-5 - Imen El Bouabidi, Faouzi Zarai, Mohammad S. Obaidat, Lotfi Kamoun:
Secure and integrated handover authentication scheme with FMIPv6. 1-5 - Karen Miranda, Víctor Manuel Ramos Ramos, Tahiry Razafindralambo:
Using efficiently autoregressive estimation in wireless sensor networks. 1-5 - Angelo Coluccia, Vincenzo Chironi, Stefano D'Amico:
Non-idealities compensation in full-digital receivers with application to Ultra-Wide Band. 1-5 - Samar Mouakket:
Investigating the factors influencing users' continuance intentions towards online reservation. 1-5 - Faezeh Hajiaghajani, Marjan Naderan Tahan, Hossein Pedram, Mehdi Dehghan:
Merging and incentive-based techniques in hybrid clustering for multi-target tracking in Wireless Sensor Networks. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.