Integrating RFID Technology with Intelligent Classifiers for Meaningful Prediction Knowledge
Author(s): Peter Darcy | Steven Tucker | Bela Stantic
Volume: 03
Issue: 02
Year: 2013




Evaluation of Microblog Users’ Influence Based on PageRank and Users Behavior Analysis
Author(s): Lijuan Huang | Yeming Xiong
Volume: 03
Issue: 02
Year: 2013




Personal Perspectives: Individual Privacy in the IOT
Author(s): Johanna Virkki | Liquan Chen
Volume: 03
Issue: 02
Year: 2013




Comprehensive Study on the Basis of Eye Blink, Suggesting Length of Text Line, Considering Typographical Variables the Way How to Improve Reading from Computer Screen
Volume: 03
Issue: 01
Year: 2013



Application of Full Text Search Engine Based on Lucene
Author(s): Rujia Gao | Danying Li | Wanlong Li | Yaze Dong
Volume: 02
Issue: 04
Year: 2012




UMIS: A Service for User Model Interoperability
Author(s): Federica Cena | Roberto Furnari
Volume: 02
Issue: 04
Year: 2012




Inkjet-Printed UHF RFID Tags on Renewable Materials
Author(s): Juha Virtanen | Johanna Virkki | Leena Ukkonen | Lauri Sydänheimo
Volume: 02
Issue: 04
Year: 2012




A Space Unrestricted Multi-Robot Combat Internet of Things System
Author(s): Omar Said | Mehedi Masud
Volume: 02
Issue: 03
Year: 2012




The Influence of Memetic Primers in Online Comments in Video Game Blogs
Author(s): Ibrahim Yucel
Volume: 02
Issue: 03
Year: 2012




A Semantic Model for Socially Aware Objects
Author(s): Giulia Biamino
Volume: 02
Issue: 03
Year: 2012




P2P Model Based on Isolated Broadcast Domains
Author(s): Jianchun Li | Gongbing Guo | Jianyong Li | Daoying Huang
Volume: 02
Issue: 03
Year: 2012




Design and Implementation of a Low-Power Active RFID for Container Tracking at 2.4 GHz Frequency
Author(s): Dawood Moeinfar | Hossein Shamsi | Fatemeh Nafar
Volume: 02
Issue: 02
Year: 2012




Automatic Service Discovery of IP Cameras over Wide Area Networks with NAT Traversal
Author(s): Chien-Min Ou | Wei-De Wu
Volume: 02
Issue: 02
Year: 2012




Evaluation of Different Electronic Product Code Discovery Service Models
Author(s): Su Mon Kywe | Jie Shi | Yingjiu Li | Raghuwanshi Kailash
Volume: 02
Issue: 02
Year: 2012




Cyber-Physical-Social Based Security Architecture for Future Internet of Things
Author(s): Huansheng Ning | Hong Liu
Volume: 02
Issue: 01
Year: 2012




An Architecture for “Web of Things” Using SOCKS Protocol Based IPv6/IPv4 Gatewaying for Heterogeneous Communication
Author(s): P. Shrinivasan R. Patnaikuni | Raj B. Kulkarni
Volume: 02
Issue: 01
Year: 2012




Advances in Intrusion Detection System for WLAN
Author(s): Ravneet Kaur
Volume: 01
Issue: 03
Year: 2011




Side-Channel Analysis for Detecting Protocol Tunneling
Author(s): Harakrishnan Bhanu | Jason Schwier | Ryan Craven | Richard R. Brooks | Kathryn Hempstalk | Daniele Gunetti | Christopher Griffin
Volume: 01
Issue: 02
Year: 2011




Secured Electronic Voting Protocol Using Biometric Authentication
Author(s): Kalaichelvi Visvalingam | R. M. Chandrasekaran
Volume: 01
Issue: 02
Year: 2011




Internet of Things: Services and Applications Categorization
Author(s): Matthew Gigli | Simon Koo
Volume: 01
Issue: 02
Year: 2011




WiFi/WiMAX Seamless Convergence with Adaptive Vertical Handover for Continuity of Internet Access
Author(s): Rashid Abdelhaleem Saeed | Hafizal Mohamad | Mazlan Abbas | Borhanuddin Mohd Ali
Volume: 01
Issue: 02
Year: 2011




Developing E-society Cognitive Platform Based on the Social Agent E-learning Goal Oriented
Author(s): Jamal Raiyn
Volume: 01
Issue: 01
Year: 2011




Integrating RFIDs and Smart Objects into a UnifiedInternet of Things Architecture
Author(s): Evangelos A. Kosmatos | Nikolaos D. Tselikas | Anthony C. Boucouvalas
Volume: 01
Issue: 01
Year: 2011



