


default search action
Journal of Innovation in Digital Ecosystems, Volume 3
Volume 3, Number 1, June 2016
- Rachid Beghdad, Amar Lamraoui:
Boundary and holes recognition in wireless sensor networks. 1-14 - Sourour Maalem, Nacereddine Zarour:
Challenge of validation in requirements engineering. 15-21 - Nacera Bahnes, Kechar Bouabdellah, Hafid Haffaf:
Cooperation between Intelligent Autonomous Vehicles to enhance container terminal operations. 22-29 - Mohamed Gasmi, Mustapha Bourahla:
Reasoning over decomposing fuzzy description logic. 30-36 - Mohamed Amine Yakoubi
, Mohamed Tayeb Laskri:
The path planning of cleaner robot for coverage region using Genetic Algorithms. 37-43
Volume 3, Number 2, December 2016
- Yannis Manolopoulos, Richard Chbeir
, Agma Juci Machado Traina, Youakim Badr, Frédéric Andrès:
Preface. 45-47
- Emilie M. D. Jean-Baptiste, Pia Rotshtein
, Martin J. Russell:
CogWatch: Automatic prompting system for stroke survivors during activities of daily living. 48-56 - Dimosthenis Ioannidis, Pantelis Tropios, Stelios Krinidis, Thanos G. Stavropoulos, Dimitrios Tzovaras, Spiridon Likothanasis:
Occupancy driven building performance assessment. 57-69 - Arnaud Castelltort
, Anne Laurent:
Rogue behavior detection in NoSQL graph databases. 70-82 - Anastasios Drosou, Ilias Kalamaras, Stavros Papadopoulos, Dimitrios Tzovaras:
An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data. 83-97 - Thaiana Lima, Rodrigo Pereira dos Santos
, Jonice Oliveira, Cláudia M. L. Werner:
The importance of socio-technical resources for software ecosystems management. 98-113 - Stamatios Giannoulakis
, Nicolas Tsapatsoulis
:
Evaluating the descriptive power of Instagram hashtags. 114-129
- Michael Wojnowicz, Glenn Chisholm, Matt Wolff, Xuan Zhao:
Wavelet decomposition of software entropy reveals symptoms of malicious code. 130-140 - Courtney Falk, Lauren Stuart:
Meaning-based machine learning for information assurance. 141-147 - Alexander Beck, Stefan Rass
:
Using neural networks to aid CVSS risk aggregation - An empirically validated approach. 148-154
- Larbi Guezouli
, Hassane Essafi:
CAS-based information retrieval in semi-structured documents: CASISS model. 155-162 - Rachid Beghdad, Mohamed Abdenour Hocini, Narimane Cherchour, Mourad Chelik:
PEAS-LI: PEAS with Location Information for coverage in Wireless Sensor Networks. 163-171 - Constantinos Djouvas
, Fernando Mendez, Nicolas Tsapatsoulis
:
Mining online political opinion surveys for suspect entries: An interdisciplinary comparison. 172-182 - Niek Tax
, Natalia Sidorova, Reinder Haakma, Wil M. P. van der Aalst
:
Mining local process models. 183-196 - Mohammed Alodib
:
QoS-Aware approach to monitor violations of SLAs in the IoT. 197-207

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.