Abstract is missing.
- Application of support vector regression in removing Poisson fluctuation from pulse height gamma-ray spectraMiltiadis Alamaniotis, Hermilo Hernandez, Tatjana Jevremovic. 1-4 [doi]
- A synergistic security method for control-flow hijacking detection using SPNsAnna Trikalinou, Nikolaos Bourbakis. 1-5 [doi]
- The use of Information and Communication Technologies in the first grade of primary school for teaching rectangles based in Realistic Mathematics EducationZaranis Nicholas. 1-6 [doi]
- Face recognition based on the feature fusion of 2DLDA and LBPBinbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Yunqi Lei. 1-6 [doi]
- An Intelligent Tutoring System over a social network for mathematics learningMaria Virvou, Sotirios-Christos Sidiropoulos. 1-4 [doi]
- Automatic stationary detection of time series using auto-correlation coefficients and LVQ - Neural networkMarios Poulos, Sozon Papavlasopoulos. 1-4 [doi]
- A secure collaborative multimedia learning scheme in cultural environmentsAnastasia Balia, Dimitrios Koukopoulos. 1-5 [doi]
- Fuzzy logic for dynamic adaptation: Represent and manage changeable user statesKonstantina Chrysafiadi, Maria Virvou. 1-6 [doi]
- Acceptability of Hear-O as a mobile hearing screening toolDanielle Anne F. Ayag, Ricardo C. Bautista, Maria Azriel Therese D. Eala, Rommel P. Feria. 1-6 [doi]
- A kinesthetic game as a motivational aid and monitor in upper extremities burns rehabilitationArmond C. Ave, Jaime D. L. Caro, Diana Mae C. Pacapac, Kyla Marie G. Salamanca. 1-3 [doi]
- A comparison between continuous categorical emotion responses and Stimulus loudness parametersSam Ferguson, Emery Schubert, Doheon Lee, Densil Cabrera, Gary E. McPherson. 1-6 [doi]
- Dimensionality reduction for enhanced 3D face recognitionAnastasios Drosou, Alkiviadis Tsimpiris, Dimitris Kugiumtzis, Nikos Porfyriou, Dimosthenis Ioannidis, Dimitrios Tzovaras. 1-8 [doi]
- Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud servicesDemosthenes Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, Konstantinos Michailidis. 1-7 [doi]
- An integrated tool for virtual restoration of Byzantine iconsAnastasios Maronidis, Chrysanthos Voutounos, Andreas Lanitis. 1-6 [doi]
- Reality mining in urban spaceSpiros Nikolopoulos, Symeon Papadopoulos, Yiannis Kompatsiaris. 1-4 [doi]
- Sentiment analysis of Facebook statuses using Naive Bayes classifier for language learningChristos Troussas, Maria Virvou, Kurt Junshean Espinosa, Kevin Llaguno, Jaime Caro. 1-6 [doi]
- Sound events and emotions: Investigating the relation of rhythmic characteristics and arousalKonstantinos Drossos, Rigas Kotsakis, George Kalliris, Andreas Floros. 1-6 [doi]
- Multiple parameter cluster analysis in a multiple language learning systemChristos Troussas, Maria Virvou, Efthymios Alepis. 1-6 [doi]
- Modeling cyber attacks on a critical infrastructure scenarioEster Ciancamerla, Michele Minichino, S. Palmieri. 1-6 [doi]
- Detecting texture paths and patterns in aerial imagesKostas Michalopoulos, Michail Tsakalakis, Nikolaos G. Bourbakis. 1-5 [doi]
- Towards a unified framework for pre-silicon validationRaghudeep Kannavara. 1-7 [doi]
- MediPic: A mobile application for medical prescriptionsRosaly B. Alday, Ruel M. Pagayon. 1-4 [doi]
- A NLU-based method for a first level automatic categorization of AI-based security documentsAdamantia Psarologou, Maria Virvou, Nikolaos G. Bourbakis. 1-7 [doi]
- EWOS: A sealed-bid auction system design and implementation for electricity interonnector capacity allocationPanagiota Vatsolaki, Alexios Tsalpatouros. 1-6 [doi]
- Attack detection capabilities of intrusion detection systems for Wireless Sensor NetworksEleni Darra, Sokratis K. Katsikas. 1-7 [doi]
- Evaluation of density one-class classifiers for item-based filteringAristomenis S. Lampropoulos, George A. Tsihrintzis. 1-6 [doi]
- Secure communication platform for distributed city-wide surveillance systemsMarkku Kylänpää, Aarne Rantala, Janne Merilinna, Mikko Nieminen. 1-4 [doi]
- Evaluating security controls against HTTP-based DDoS attacksDimitrios Moustis, Panayiotis Kotzanikolaou. 1-6 [doi]
- Distributed privacy-preserving P2P data mining via probabilistic neural network committee machinesYiannis Kokkinos, Konstantinos G. Margaritis. 1-4 [doi]
- Agent agreement protocols based on golay error-correcting codePanayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou, Christina Vichou. 1-6 [doi]
- Experiences on the use of an automatic C++ solution grader systemAllan A. Sioson. 1-6 [doi]
- A multi-criteria recommender system incorporating intensity of preferencesAngeliki Mikeli, Dimitris Sotiros, Dimitris Apostolou, Dimitris K. Despotis. 1-6 [doi]
- A trusted computing architecture for critical infrastructure protectionMike Burmester. 1-6 [doi]
- An efficient secure data aggregation scheme for wireless sensor networksSoufiene Ben Othman, Hani Alzaid, Abdelbasset Trad, Habib Youssef. 1-4 [doi]
- The Sphinx enigma in critical VoIP infrastructures: Human or botnet?Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, Panajotis Katsaros, Anakreon Mentis. 1-6 [doi]
- E-Care telemonitoring system: Extend the platformAmine Ahmed Benyahia, Amir Hajjam, Vincent Hilaire, Mohamed Hajjam, Emmanuel Andres. 1-4 [doi]
- Properties of Johnson schemesAlvin John Burgos, Jaime D. L. Caro. 1-11 [doi]
- Mobile Augmented Reality edutainment applications for cultural institutionsThomas Chatzidimitris, Evangelia Kavakli, Maria Economou, Damianos Gavalas. 1-4 [doi]
- Automatic misconception diagnosis in multiple language learning over social networksChristos Troussas, Maria Virvou, Anna Vougiouklidou, Kurt Junshean Espinosa. 1-6 [doi]
- On the creation of a Digital Cultural Heritage MapSpiridon Mousouris, Georgios D. Styliaras. 1-6 [doi]
- Performance evaluation of three GPSR-based routing protocols in a military settingYasser Al-Roqi, Stylianos Papanastasiou, Evtim Peytchev. 1-4 [doi]
- Packet classification using rule cachingNitesh B. Guinde, Roberto Rojas-Cessa, Sotirios G. Ziavras. 1-6 [doi]
- Traffic incident detection and modelling using Quantum Frequency Algorithm and AutoRegressive Integrated Moving Average modelsJeanelle E. Abanto, Charmailene C. Reyes, Jasmine A. Malinao, Henry N. Adorna. 1-6 [doi]
- Multi-application ID card using DESFire EV1Radek Holy, Marek Kalika, Jana Kalikova. 1-4 [doi]
- Identifying semantically meaningful sub-communities within Twitter blogosphereDionisios N. Sotiropoulos, Chris D. Kounavis, George M. Giaglis. 1-8 [doi]
- Developing an IoT Smart City frameworkEvangelos Theodoridis, Georgios Mylonas, Ioannis Chatzigiannakis. 1-6 [doi]
- Port security & access control: A systemic approachFivos Andritsos. 1-8 [doi]
- Uncertainty reasoning for the Semantic Web based on Dempster-Shafer modelLoukia Karanikola, Isambo Karali, Sally I. McClean. 1-4 [doi]
- Open data for e-government the Greek caseStamatios A. Theocharis, George A. Tsihrintzis. 1-6 [doi]
- Automatic extraction of upper human body in single imagesAthanasios Tsitsoulis, Nikolaos G. Bourbakis. 1-8 [doi]
- APPification of hospital healthcare and data management using QRcodesMersini Paschou, Evangelos Sakkopoulos, Athanasios K. Tsakalidis. 1-6 [doi]
- Layered-based approach to virtual storage for smart power systemsMiltiadis Alamaniotis, Lefteri H. Tsoukalas. 1-6 [doi]
- Privacy as a Product: A case study in the m-Health sectorConstantinos Patsakis, Agusti Solanas. 1-6 [doi]
- S-Port: Collaborative security management of Port Information systemsDespoina Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, Christos Douligeris, Marianthi Theoharidou, Dimitris Gritzalis. 1-6 [doi]
- Passenger path plan reliability improvement proposalVladislav Martinek, Michal Zemlicka. 1-4 [doi]
- Evaluation of a language learning application in FacebookChristos Troussas, Maria Virvou, Jaime Caro, Kurt Junshean Espinosa. 1-6 [doi]
- An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural educationChantzi Athanasia Eleftheria, Plessa Charikleia, Chatziparadeisis Gkanas Iason, Tsakalidis Athanasios, Tsolis Dimitrios. 1-5 [doi]
- Density-based Kernel Scale estimation for Kernel clusteringSofiane Sellah, Olfa Nasraoui. 1-4 [doi]
- Learning addition by playing an adaptive game with coinsMaria Virvou, Spyros Papadimitriou. 1-4 [doi]