Abstract is missing.
- Air and noise pollution monitoring in the city of Zagreb by using mobile crowdsensingMartina Marjanovic, Sanja Grubesa, Ivana Podnar Zarko. 1-5 [doi]
- Electric field radiated by a dipole antenna above a lossy half space: Comparison of plane wave approximation with the modified image theory approachAnna Susnjara, Dragan Poljak, Vicko Doric. 1-5 [doi]
- Selected health and law issues regarding mobile communicationsPeter Mandl, Pirmin Pezzei, David Veit, Erich Leitgeb. 1-4 [doi]
- FlowVista: Low-bandwidth SDN monitoring driven by business application interactionBartlomiej Siniarski, John Murphy 0001, Declan Delaney. 1-6 [doi]
- Slow light and dynamic buffer capability in two different photonic crystal waveguidesZaineb Gharsallah, Monia Najjar, Vijay Janyani. 1-5 [doi]
- Performance evaluation of MATLAB/Simulink models for fitting embedded multicore systemsKaouther Gasmi, Imen Amari, Asma Rebeya, Salem Hasnaoui. 1-6 [doi]
- Quality-aware network dimensioning for the VoIP serviceJanusz Henryk Klink, Tadeus Uhl. 1-6 [doi]
- Joint channel network coding for multiple access relay channel with correlated sourcesYoussef Zid, Ridha Bouallegue, Sonia Zaibi Ammar. 1-4 [doi]
- The role of blockchain and IoT in recruiting participants for digital clinical trialsFabio Angeletti, Ioannis Chatzigiannakis, Andrea Vitaletti. 1-5 [doi]
- Performance of AdaBoost classifier in recognition of superposed modulations for MIMO TWRC with physical-layer network codingWassim Ben Chikha, Slim Chaoui, Rabah Attia. 1-5 [doi]
- Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative studyImen Gaied, Farah Jemili, Ouajdi Korbaa. 1-6 [doi]
- Pushing the envelope: Beyond two billion IP routing lookups per second on commodity CPUsMarko Zec, Miljenko Mikuc. 1-6 [doi]
- Comparative experimental analysis of the quality-of-service and energy-efficiency of VMs and containers' consolidation for cloud applicationsIsmael Cuadrado-Cordero, Anne-Cécile Orgerie, Jean-Marc Menaud. 1-6 [doi]
- IoT and smart city services to support independence and wellbeing of older peopleNicola Bryant, Nikki Spencer, Annette C. King, Phil Crooks, Jude Deakin, Stuart Young. 1-6 [doi]
- Introducing GAMfIS: A generic attacker model for information securityDaniel Fraunholz, Simon Duque Antón, Hans Dieter Schotten. 1-6 [doi]
- Exploiting an IoT local middleware for the orchestration of mobile device sensors to detect outdoor and indoor user positioningAdriana Caione, Alessandro Fiore, Luca Mainetti, Luigi Manco, Roberto Vergallo. 1-5 [doi]
- Level crossing rate of macrodiversity system with three microdiversity receivers over shadowed weibull fading channelDragana Krstic, Mihajlo C. Stefanovic, Suad Suljovic, Sinisa Minic. 1-6 [doi]
- Low complexity ADMM-LP based decoding strategy for LDPC convolutional codesHayfa Ben Thameur, Bertrand Le Gal, Nadia Khouja, Fethi Tlili, Christophe Jégo. 1-5 [doi]
- Human emotions classification using bag-of-words method on single electrode brain computer interfaceLjiljana Seric, Pero Bogunovic. 1-5 [doi]
- The approach of SWIM data sharing based on multi-dimensional data encryptionZhijun Wu, Liang Liu, Changcan Yan, Jia Xu, Jin Lei. 1-6 [doi]
- Electromagnetic modeling of the GPR response to the pipe system set in the concrete slabIvan Luburic, Zvonimir Peric, Silvestar Sesnic. 1-5 [doi]
- In-service testing OFDM error floor by constellation analysisAdriana Lipovac, Sibila Isak-Zatega, Pamela Njemcevic. 1-5 [doi]
- Efficient lossless compression of CAN traffic logsAndras Gazdag, Levente Buttyán, Zsolt Szalay. 1-6 [doi]
- Pilot-aided phase noise and carriers frequency offset compensation for coherent optical UFMC PONKidsanapong Puntsri. 1-5 [doi]
- Securing RPL-based Internet of Things applied for water pipeline monitoringManel Elleuchi, Manel Boujeleben, Mohamed Abid, Mohammed S. BenSaleh. 1-7 [doi]
- Link level performance prediction of MIMO PIC receivers through QR decomposition of channel matrixAsif Khan, Aftab Ahmad Khan, Irfan Ullah, Shahid Khattak. 1-5 [doi]
- A linear approach to distributed database optimization using data reallocationAdrian Sergiu Darabant, Viorica Varga, Leon Tâmbulea. 1-6 [doi]
- Outlier detection based on data reduction in WSNs for water pipelineAya Ayadi, Oussama Ghorbel, Mohammed S. BenSaleh, Abdelfateh Obeid, Mohamed Abid. 1-6 [doi]
- Smart home medication reminder systemMilan Ramljak. 1-5 [doi]
- Steganography using local colour statisticsTomislav Jurin, Barbara Dzaja, Tonko Kovacevic. 1-6 [doi]
- Hybrid ML-MMSE adaptive multiuser detection based on joint channel estimation in SDMA-OFDM systemsUgur Yesilyurt, Özgür Ertug. 1-5 [doi]
- Gain analysis of cooperative broadcast in two-dimensional wireless networksKeyvan Gharouni Saffar, Majid Khabbazian. 1-6 [doi]
- Characterization of low voltage access network for narrowband powerline communicationsRaja Alaya, Rabah Attia. 1-6 [doi]
- Cooperative localization based on an evolved variational message passing algorithmKaouther Hedhly, Mohamed Laaraiedh, Fatma Abdelkefi, Mohamed Siala. 1-5 [doi]
- Slot assignment protocol for narrow band waveform for tactical MANETsSana Saleem, Shoab Ahmed Khan. 1-6 [doi]
- Enhancing VNF's performance using DPDK driven OVS user-space forwardingDani Vladislavic, Darko Huljenic, Julije Ozegovic. 1-5 [doi]
- Core number optimization based scheduler to order/map hardware/software applicationsAsma Rebaya, Imen Amari, Kaouther Gasmi, Salem Hasnaoui. 1-6 [doi]
- Multiple-folded antenna design for maximizing power transfer efficiency at 6.78 MHzMaja Skiljo, Zoran Blazevic, A. Grbavac, M. Kevo, M. Marovic, K. Topic. 1-4 [doi]
- Measurement of temperature inside open TEM-cell with thermal cameraKresimir Malaric, Roman Malaric, Josip Herceg. 1-5 [doi]
- ECG biometrie template protection based on secure sketch schemeEmna Kalai Zaghouani, Adel Benzina, Rabah Attia. 1-5 [doi]
- Rising edge detection used as TOA estimator for mode S signals with multipath propagationStephan Bernhart, Erich Leitgeb, Gerhard A. Hofbauer, Ulrich Feichter. 1-6 [doi]
- Delay-quality tradeoff for video streaming over MANET using network coding (DQNC)Olfa Ben Rhaiem, Lamia Chaari Fourati. 1-6 [doi]
- Symptoms investigation by means of formal concept analysis for enhancing medical diagnosesChristian Sacarea, Diana-Florina Sotropa, Diana Troanca. 1-5 [doi]
- Conceptual graphs based modeling and querying of XML dataAndrea Éva Molnár, Viorica Varga, Christian Sacarea. 1-6 [doi]
- Learner and course dashboards for intelligent learning management systemsTomislav Volaric, Hrvoje Ljubic. 1-6 [doi]
- Wearable and autonomous computing for future smart cities: Open challengesDomenico Balsamo, Geoff V. Merrett, Bahareh Zaghari, Yang Wei, Sarvapali Ramchurn, Sebastian Stein, Alex S. Weddell, Steve P. Beeby. 1-5 [doi]
- On wind turbine impedance analysis via different approachesAntonio Sunjerga, Farhad Rachidi, Dragan Poljak. 1-4 [doi]
- Analysis of Mirai malicious softwareHamdija Sinanovic, Sasa Mrdovic. 1-5 [doi]
- Business models and value oriented service design elements in ecosystem architectureDarije Ramljak. 1-6 [doi]
- Performance analysis of adaptive modulation in underwater visible light communicationsImen Sahnoun, Imran Shafique Ansari, Mohamed M. Abdallah 0001, Khalid A. Qaraqe. 1-6 [doi]
- Simulation and analysis of concurrent BLE link layer state machines running within the same physical deviceAndrás Balogh, Sándor Imre. 1-8 [doi]
- Low complexity rate compatible puncturing patterns design for LDPC codesFulvio Babich, Matteo Noschese, Alessandro Soranzo, Francesca Vatta. 1-5 [doi]
- An innovative approach for elderly behavioral analysis by adopting enabling IoT technologiesLuigi Patrono, Piercosimo Rametta, Ilaria Sergi, Ruben Mulero, Aitor Almeida. 1-6 [doi]
- Applying the multiclass classification methods for the classification of online social network friendsNikolina Sever, Luka Humski, Juraj Ilic, Zoran Skocir, Damir Pintar, Mihaela Vranic. 1-6 [doi]
- Understanding needs and requirements of the target group: Systematic perspective on interaction between system and environmentGeorg Aumayr, Doris M. Bleier, Gerhard Chroust, Nadine Sturm. 1-6 [doi]
- An innovative approach for monitoring elderly behavior by detecting home appliance's usageLuigi Patrono, Patrizio Primiceri, Piercosimo Rametta, Ilaria Sergi, Paolo Visconti. 1-7 [doi]
- Real-time localization and visualization of a sound source for virtual reality applicationsAhmet Kose, Aleksei Tepljakov, Sergei Astapov. 1-6 [doi]
- Efficient route discovery using channel adaptive probabilistic broadcasting in Zigbee wireless sensor networksHaitham Y. Adarbah, Shakeel Ahmad. 1-5 [doi]
- Virtual data planes for easy creation and operation of end-to-end virtual networksNaoki Oguchi, Motoyoshi Sekiya. 1-6 [doi]
- Combining IOT, open data and messaging for prevention of MCI/frailtyNicoletta Di Blas, Paolo Paolini, Giulia Plotti. 1-5 [doi]
- Performance analysis of pulse position based chirp spread spectrum technique for multiple accessAdam Knapp, László Pap. 1-5 [doi]
- Rule-based system for data leak threat estimationMarin Vukovic, Damjan Katusic, Renato Soic, Mario Weber. 1-5 [doi]
- Investigating educational attractors and life tracks in e-learning environments using formal concept analysisSanda Dragos, Christian Sacarea, Diana-Florina Sotropa. 1-5 [doi]
- My-active and healthy ageing (My-AHA): An ICT platform to detect frailty risk and propose interventionAlessandro Vercelli, Innocenzo Rainero, Helios de Rosario, Mathew Summers, Rainer Wieching, Georg Aumayr, Stephan Bandelow, Ludovico Ciferri, Marco Bazzani. 1-4 [doi]
- Mobile wireless sensor network gateway: A raspberry Pi implementation with a VPN backend to OpenStackEduard-Florentin Luchian, Adrian Taut, Iustin-Alexandru Ivanciu, Gabriel Lazar, Virgil Dobrota. 1-5 [doi]
- Configurable interactive environment for hybrid knowledge- and data-driven geriatric risk assessmentVladimir Urosevic, Paolo Paolini, Christos Tatsiopoulos. 1-7 [doi]
- Evaluation of quiz using a statistical calculation in learning management systemMatea Markie. 1-5 [doi]
- Asymmetric multiprocessing techniques in smart devices: Application in a drone navigation systemLaura Nao, Pierluigi Passaro, Egidio Gioia, Matteo Petracca. 1-5 [doi]
- UWB channel measurements for short range radar applicationsDavid Veit, Erich Leitgeb, Franz Teschl, Thomas Gigl. 1-5 [doi]
- Genetic algorithm optimization applied to the project of MIMO systemsIsrael A. C. Leal, Marcelo Sampaio de Alencar, Waslon Terllizzie A. Lopes. 1-5 [doi]
- On outage probability of two-way relaying data transmission and energy harvestingNouha Dahi, Noureddine Hamdi. 1-5 [doi]
- Application of the behaviour change wheel framework to the development of interventions within the City4Age projectArtur Direito, Susan Michie, Carmen E. Lefevre, Emilly I M. Collins. 1-6 [doi]
- On radiation mechanism and modeling of dipole antenna in classical electromagnetics: A tribute to first 120 years of the pocklington integral equationDragan Poljak. 1-5 [doi]
- Computation of Carson formulas using piecewise quadratic approximationIvan Krolo, Slavko Vujevic, Tonci Modric. 1-7 [doi]
- A formal model of cloud-deployed software and its application to workflow processingEinar Broch Johnsen, Ka-I Pun, Silvia Lizeth Tapia Tarifa. 1-6 [doi]
- Smart probabilistic approach with RSSI fingerprinting for indoor localizationWafa Njima, Iness Ahriz, Rafik Zayani, Michel Terré, Ridha Bouallegue. 1-6 [doi]
- Temperature increase in the extracted and compound eye modelsMario Cvetkovic, Hrvoje Dodig, Dragan Poljak. 1-6 [doi]
- Searchable symmetric encryption: Sequential scan can be practicalMáté Horváth, István Vajda. 1-5 [doi]
- Optimization of 60 GHz MIMO antenna by adding ground stub to reduce mutual coupling for WPAN applicationsSyrine Lahmadi, Jamel Bel Hadj Tahar. 1-4 [doi]
- Experimental energy profiling of energy-critical embedded applicationsKameswar Rao Vaddina, Florian Brandner, Gérard Memmi, Pierre Jouvelot. 1-6 [doi]
- Cross-layer anomaly detection in industrial cyber-physical systemsHunor Sándor, Béla Genge, Piroska Haller, Adrian-Vasile Duka, Bogdan Crainicu. 1-5 [doi]
- A smart tone reservation scheme for reducing the high PAPR of the FBMC/OQAM signalMounira Laabidi, Ridha Bouallegue. 1-5 [doi]
- Multi-modal input devices for active and healthy ageingChiara Cogerino, Giovanni Rosso, Ilaria Bosi, Antonella Frisiello, Marco Bazzani. 1-5 [doi]
- Tree and word embedding based sentence similarity for evaluation of good answers in intelligent tutoring systemEmil Brajkovic, Daniel Vasic. 1-5 [doi]
- Optimization of a new structure patch antenna for MIMO and 5G applicationsSouhir Faleh, Jamel Belhadj Tahar. 1-5 [doi]
- Sensor nodes estimation for a greenhouse monitoring system using hierarchical wireless networkHugo Sampaio, Shusaburo Motoyama. 1-5 [doi]
- Geospatial publish / subscribe systems for the Internet of ThingsIvan Livaja, Dejan Skvorc, Kresimir Pripuzic. 1-8 [doi]
- Enhanced architecture for SHM system based on optical sensor and WSNAmira Zrelli, Tahar Ezzedine. 1-6 [doi]
- Performance analysis of up-link and down-link mixed RF/FSO links with multiple relaysChadi Abou-Rjeily. 1-6 [doi]
- Investigation of induced CRAH bypass for air-cooled data centers using computational fluid dynamicsHamza Salih Erden. 1-6 [doi]
- How much can we trust RSSI for the IoT indoor location-based services?Biljana Risteska Stojkoska, Ivana Nizetic Kosovic, Tomislav Jagust. 1-6 [doi]
- A novel application of temperature monitoring using an optical fiber sensor based on time offsetAmira Zrelli, Tahar Ezzeddine. 1-5 [doi]
- Network analysis of evolving software-systemsSanja Grbac Babic, Tihana Galinac Grbac. 1-5 [doi]
- Dynamic software updating of OLTs without service interruptionTakumi Harada, Hirotaka Ujikawa, Manabu Yoshino, Noriyuki Oota, Ken-ichi Suzuki, Akihiro Otaka. 1-5 [doi]
- Electromagnetic analysis of adiabatic coaxial line with applied air gapZeljko Martinovic, Martin Dadic, Roman Malaric, Zarko Martinovic. 1-4 [doi]
- Secure management of an Internet voting system: A case study for land reclamation authorityChiara Taddia, D. Ferraretti, Mirko Pastorelli, Stefania Nanni, Gianluca Mazzini. 1-5 [doi]
- Towards authenticated network coding for named data networkingRyma Boussaha, Yacine Challal, Malika Bessedik, Abdelmadjid Bouabdallah. 1-6 [doi]
- Comparison of free space, perfect ground and fresnel's equation models to determine electric field radiated by a base station antennaMarin Galic, Dragan Poljak, Vicko Doric. 1-6 [doi]
- Experimental verification of the effectiveness of learning and teaching using intelligent tutoring system in secondary school educationPetra Ognjenovic. 1-5 [doi]
- On the error statistics of turbo decoding for hybrid concatenated codes designFulvio Babich, Francesca Vatta. 1-5 [doi]