


default search action
Journal of Innovation in Digital Ecosystems, Volume 3
Volume 3, Number 1, June 2016
- Rachid Beghdad, Amar Lamraoui:

Boundary and holes recognition in wireless sensor networks. 1-14 - Sourour Maalem, Nacereddine Zarour:

Challenge of validation in requirements engineering. 15-21 - Nacera Bahnes, Kechar Bouabdellah, Hafid Haffaf:

Cooperation between Intelligent Autonomous Vehicles to enhance container terminal operations. 22-29 - Mohamed Gasmi, Mustapha Bourahla:

Reasoning over decomposing fuzzy description logic. 30-36 - Mohamed Amine Yakoubi

, Mohamed Tayeb Laskri:
The path planning of cleaner robot for coverage region using Genetic Algorithms. 37-43
Volume 3, Number 2, December 2016
- Yannis Manolopoulos, Richard Chbeir

, Agma Juci Machado Traina, Youakim Badr, Frédéric Andrès:
Preface. 45-47
- Emilie M. D. Jean-Baptiste, Pia Rotshtein

, Martin J. Russell:
CogWatch: Automatic prompting system for stroke survivors during activities of daily living. 48-56 - Dimosthenis Ioannidis, Pantelis Tropios, Stelios Krinidis, Thanos G. Stavropoulos, Dimitrios Tzovaras, Spiridon Likothanasis:

Occupancy driven building performance assessment. 57-69 - Arnaud Castelltort

, Anne Laurent:
Rogue behavior detection in NoSQL graph databases. 70-82 - Anastasios Drosou, Ilias Kalamaras, Stavros Papadopoulos, Dimitrios Tzovaras:

An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data. 83-97 - Thaiana Lima, Rodrigo Pereira dos Santos

, Jonice Oliveira, Cláudia M. L. Werner:
The importance of socio-technical resources for software ecosystems management. 98-113 - Stamatios Giannoulakis

, Nicolas Tsapatsoulis
:
Evaluating the descriptive power of Instagram hashtags. 114-129
- Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao:

Wavelet decomposition of software entropy reveals symptoms of malicious code. 130-140 - Courtney Falk, Lauren Stuart:

Meaning-based machine learning for information assurance. 141-147 - Alexander Beck, Stefan Rass

:
Using neural networks to aid CVSS risk aggregation - An empirically validated approach. 148-154
- Larbi Guezouli

, Hassane Essafi:
CAS-based information retrieval in semi-structured documents: CASISS model. 155-162 - Rachid Beghdad, Mohamed Abdenour Hocini, Narimane Cherchour, Mourad Chelik:

PEAS-LI: PEAS with Location Information for coverage in Wireless Sensor Networks. 163-171 - Constantinos Djouvas

, Fernando Mendez, Nicolas Tsapatsoulis
:
Mining online political opinion surveys for suspect entries: An interdisciplinary comparison. 172-182 - Niek Tax

, Natalia Sidorova, Reinder Haakma, Wil M. P. van der Aalst
:
Mining local process models. 183-196 - Mohammed Alodib

:
QoS-Aware approach to monitor violations of SLAs in the IoT. 197-207

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














