default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 5
Volume 5, Number 1, February 2014
- Bin Guo, Daqing Zhang, Zhiwen Yu, Francesco Calabrese:
Extracting social and community intelligence from digital footprints. 1-2 - Xiangye Xiao, Yu Zheng, Qiong Luo, Xing Xie:
Inferring social ties between users with human location history. 3-19 - Frederico Araújo Durão, Peter Dolog:
Improving tag-based recommendation with the collaborative value of wiki pages for knowledge sharing. 21-38 - Chao Ma, Jiannong Cao, Lei Yang, Jun Ma, Yanxiang He:
Effective social relationship measurement based on user trajectory analysis. 39-50 - Xinmiao Wu, Jianmin Wang:
Micro-blog in China: identify influential users and automatically classify posts on Sina micro-blog. 51-63 - Nikolaos Vastardis, Kun Yang:
An enhanced community-based mobility model for distributed mobile social networks. 65-75 - Yi Zhan, Tadahiro Kuroda:
Wearable sensor-based human activity recognition from environmental background sounds. 77-89 - Rahat Iqbal:
Information retrieval, decision making process and user needs in the context of ubiquitous and collaborative computing. 91-92 - Babak Akhgar, Esmael Salahi Parvin, Mohammad Hussein Sherkat:
Axiomatic agent based architecture for agile decision making in strategic information systems. 93-104 - Saeedeh Maleki-Dizaji, Jawed I. A. Siddiqi, Yasaman Soltan-Zadeh, Fazilatur Rahman:
Adaptive information retrieval system via modelling user behaviour. 105-110 - Saad Liaquat Kiani, Ashiq Anjum, Nick Antonopoulos, Michael Knappmeyer:
Context-aware service utilisation in the clouds and energy conservation. 111-131 - Kashif Iqbal, Michael O. Odetayo, Anne E. James:
Face detection of ubiquitous surveillance images for biometric security from an image enhancement perspective. 133-146 - Faiyaz Doctor, Rahat Iqbal, Raouf N. Gorgui-Naguib:
A fuzzy ambient intelligent agents approach for monitoring disease progression of dementia patients. 147-158 - Farzad Amirjavid, Abdenour Bouzouane, Bruno Bouchard:
Activity modeling under uncertainty by trace of objects in smart homes. 159-167
Volume 5, Number 2, April 2014
- Kangbin Yim, Aniello Castiglione, Ilsun You:
Prosperity of IT security technologies in homeland defense. 169-171 - Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security issues on IT systems during disasters: a survey. 173-185 - Bjørnar Solhaug, Fredrik Seehusen:
Model-driven risk analysis of evolving critical infrastructures. 187-204 - Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Kangbin Yim, Ilsun You:
Secure and distributed video surveillance via portable devices. 205-213 - Matteo Cristani, Erisa Karafili, Luca Viganò:
Tableau systems for reasoning about risk. 215-247 - Massimo Ficco:
Calibration-less indoor location systems based on wireless sensors. 249-261
Volume 5, Number 3, June 2014
- Francesco Marcelloni, Daniele Puccinelli, Alessio Vecchio:
Special issue on sensing and mobility in pervasive computing. 263-264 - Laura Ferrari, Marco Mamei, Massimo Colonna:
Discovering events in the city via mobile network analysis. 265-277 - Michela Papandrea, Silvia Giordano:
Location prediction and mobility modelling for enhanced localization solution. 279-295 - Venet Osmani, Iacopo Carreras, Aleksandar Matic, Piret Saar:
An analysis of distance estimation to detect proximity in social interactions. 297-306 - Olga Saukh, David Hasenfratz, Lothar Thiele:
Route selection for mobile sensor nodes on public transport networks. 307-321 - Bhanu K. Kamapantula, Ahmed Abdelzaher, Preetam Ghosh, Michael L. Mayo, Edward J. Perkins, Sajal K. Das:
Leveraging the robustness of genetic networks: a case study on bio-inspired wireless sensor network topologies. 323-339
- Quan Z. Sheng, Elhadi M. Shakshuki, Jiangang Ma:
Advances in ambient intelligence technologies. 341-342 - Qinglei Zhang, Ridha Khédri, Jason Jaskolka:
An aspect-oriented language for feature-modeling. 343-356 - Gerold Hoelzl, Marc Kurz, Alois Ferscha:
Goal oriented recognition of composed activities for reliable and adaptable intelligence systems. 357-367 - Jing Li, Jin He, Anish Arora:
ThermoNet: fine-grain assessment of building comfort and efficiency. 369-382 - Vivek Menon, Bharat Jayaraman, Venu Govindaraju:
Probabilistic spatio-temporal retrieval in smart spaces. 383-392 - Luk Knapen, Ansar-Ul-Haque Yasar, Sungjin Cho, Daniel Keren, Abed Abu Dbai, Tom Bellemans, Davy Janssens, Geert Wets, Assaf Schuster, Izchak Sharfman, Kanishka Bhaduri:
Exploiting graph-theoretic tools for matching in carpooling applications. 393-407 - Zahoor Ali Khan, Shyamala C. Sivakumar, William J. Phillips, Nauman Aslam:
A new patient monitoring framework and Energy-aware Peering Routing Protocol (EPR) for Body Area Network communication. 409-423 - Hakem Beitollahi, Geert Deconinck:
ConnectionScore: a statistical technique to resist application-layer DDoS attacks. 425-442
Volume 5, Number 4, August 2014
- Markus Aleksy, Mikko J. Rissanen:
Utilizing wearable computing in industrial service applications. 443-454 - Fahmida Abedin, Kuo-Ming Chao, Nick Godwin:
An agenda based multi issue negotiation approach. 455-473 - Koosha Paridel, Theofrastos Mantadelis, Ansar-Ul-Haque Yasar, Davy Preuveneers, Gerda Janssens, Yves Vanrompay, Yolande Berbers:
Analyzing the efficiency of context-based grouping on collaboration in VANETs with large-scale simulation. 475-490 - Regina Frei, Traian-Florin Serbanuta, Giovanna Di Marzo Serugendo:
Self-organising assembly systems formally specified in Maude. 491-510 - Maria De Marsico, Stefano Levialdi, Michele Nappi, Stefano Ricciardi:
FIGI: floating interface for gesture-based interaction. 511-524 - Vivek Srivastava, Bipin Kumar Tripathi, Vinay Kumar Pathak:
Biometric recognition by hybridization of evolutionary fuzzy clustering with functional neural networks. 525-537 - Anahid Basiri, Mohammad Reza Malek:
Providing relevant information in an ambient services using service requester's "logical area". 539-549 - Xiannuan Liang, Yang Xiao:
A survey of biological collaboration models. 551-563 - Fulvio Corno, Faisal Razzak:
SAT based enforcement of domotic effects in smart environments. 565-579 - Fulvio Corno, Muhammad Sanaullah:
Design-time formal verification for smart environments: an exploratory perspective. 581-599 - Ziling Wei, Baokang Zhao, Bo Liu, Jinshu Su, Liyang Xu, Erci Xu:
A novel steganography approach for voice over IP. 601-610 - Tarek R. Sheltami, Abdulsalam Basabaa, Elhadi M. Shakshuki:
A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs. 611-620
Volume 5, Number 5, October 2014
- Tom Redant, Wim Dehaene:
An MLS-Prony implementation for a cm-Precise Super 10 m range 802.15.3c-PHY 60 GHz positioning application. 623-634 - Floris De Smedt, Lars Struyf, Sander Beckers, Joost Vennekens, Gorik De Samblanx, Toon Goedemé:
Faster and more intelligent object detection by combining OpenCL and KR. 635-643 - Tetsushi Ikeda, Hiroshi Ishiguro, Takahiro Miyashita, Norihiro Hagita:
Pedestrian identification by associating wearable and environmental sensors based on phase dependent correlation of human walking. 645-654 - Alejandro Castillo Atoche, Renan Quijano Cetina, Orlando Palma Marrufo:
An improved RBR image reconstruction architecture based on super-systolic techniques. 655-666 - Tuan Anh Nguyen, Andrea Raspitzu, Marco Aiello:
Ontology-based office activity recognition with applications for energy savings. 667-681 - B. Rosario Campomanes-Álvarez, Oscar Cordón, Sergio Damas, Óscar Ibáñez:
Computer-based craniofacial superimposition in forensic identification using soft computing. 683-697 - Sílvia Resendes, Paulo Carreira, André C. Santos:
Conflict detection and resolution in home and building automation systems: a literature review. 699-715 - Farzad Amirjavid, Abdenour Bouzouane, Bruno Bouchard:
Data driven modeling of the simultaneous activities in ambient environments - Case study: automatic data driven anomaly recognition for interruptive activities in smart home. 717-740 - Susanna Clemente, Vincenzo Loia, Mario Veniero:
Applying cognitive situation awareness to collision avoidance for harbour last-mile area safety. 741-745 - Alba Amato, Beniamino Di Martino, Salvatore Venticinque:
Agents based multi-criteria decision-aid. 747-758 - Kevin Bouchard, Bruno Bouchard, Abdenour Bouzouane:
Spatial recognition of activities for cognitive assistance: realistic scenarios using clinical data from Alzheimer's patients. 759-774
Volume 5, Number 6, December 2014
- Peyman TalebiFard, Victor C. M. Leung:
Context-aware dissemination of information and services in heterogeneous network environments. 775-787 - Frederick E. Petry, Ronald R. Yager:
Principles for organization of creative groups. 789-797 - Ciro D'Apice, Carmine De Nicola, Rosanna Manzo, Vincenzo Moccia:
Optimal scheduling for aircraft departures. 799-807 - Paul Elmore, Frederick E. Petry, Ronald R. Yager:
Comparative measures of aggregated uncertainty representations. 809-819 - Giuseppina Formato, Luigi Troiano, Alfredo Vaccaro:
Achieving consensus in self-organizing multi agent systems for smart microgrids computing in the presence of interval uncertainty. 821-828 - Adrienne Heinrich, Vincent Jeanne, Xin Zhao:
Lifestyle applications from sleep research. 829-842 - Guglielmo Cola, Alessio Vecchio, Marco Avvenuti:
Improving the performance of fall detection systems through walk recognition. 843-855 - Chuan Yao, Li Xu, Xinyi Huang, Joseph K. Liu:
A secure remote data integrity checking cloud storage system from threshold encryption. 857-865 - Tongda Zhang, Kevin Bing-Yung Wong, Hamid K. Aghajan:
Concurrent activation events based trajectory propagation in smart environments. 867-880 - M. Venakata Swamy, Nitin Agarwal, Srini Ramaswamy:
C-CBPM: collective context based privacy model. 881-895 - Tong Liu, Jun Liu, Xiaomu Luo:
Radio tomographic imaging based body pose sensing for fall detection. 897-907 - Luigi Catuogno, Clemente Galdi:
On user authentication by means of video events recognition. 909-918 - Nan Jiang, Fenyong Li, Tao Wan, Lingfeng Liu:
PDF: poisson dynamics in fitness evolution model for wireless sensor networks. 919-927
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.