![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
CITS 2013: Athens, Greece
- International Conference on Computer, Information and Telecommunication Systems, CITS 2013, Athens, Greece, May 7-8, 2013. IEEE 2013
- Christos Troussas, Maria Virvou, Jaime D. L. Caro
, Kurt Junshean Espinosa:
Mining relationships among user clusters in Facebook for language learning. 1-5 - Abidin Altintas, Berna Örs
:
System level design of scalable encryption algorithm by using CoWare. 1-4 - Siham Ouamour
, Halim Sayoud:
Authorship attribution of ancient texts written by ten Arabic travelers using character N-Grams. 1-5 - Prodromos Makris, Dimitrios N. Skoutas
, Nikolaos Nomikos
, Demosthenes Vouyioukas
, Charalabos Skianis:
A Context-Aware Backhaul Management solution for combined H2H and M2M traffic. 1-5 - Glaucio H. S. Carvalho, Isaac Woungang, Mohammad S. Obaidat
, Alagan Anpalagan
, Md. Mizanur Rahman:
A joint call admission control-based approach for initial RAT selection in HetNets. 1-5 - Pierre André, Hélène Waeselynck, Nicolas Rivière:
A UML-based environment for test scenarios in mobile settings. 1-5 - Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Authorship verification for short messages using stylometry. 1-6 - Yuanyue Guo, Dongjin Wang, Falin Liu
, Naoto Kishi:
A novel single-mode, linearly polarized, erbium-doped fiber laser with a stabilized frequency. 1-4 - Samuel T. Valduga, Dimas Irion Alves
, Renato B. Machado
, Andrei P. Legg, Murilo Bellezoni Loiola:
A low-complexity rate-one MIMO scheme with four transmit antennas and phase feedback. 1-5 - Maria Virvou, Spyros Papadimitriou
:
Simple arithmetic lessons through an adaptive snake game. 1-4 - Nouri Omheni, Faouzi Zarai, Mohammad S. Obaidat
, Kuei-Fang Hsiao, Lotfi Kamoun:
Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks. 1-5 - P. Venkata Krishna
, Sudip Misra, Dheeraj Joshi, Mohammad S. Obaidat
:
Learning Automata Based Sentiment Analysis for recommender system on cloud. 1-5 - Rafal Mielniczuk, Harald Gebhard, Zdzislaw Papir:
Multiplexing of GNSS data for differential augmentation via satellite IP broadcast links. 1-6 - Isaac Woungang, Mohammad S. Obaidat
, Sanjay Kumar Dhurandher, Issa Traoré:
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks. 1-5 - Qi Yang, Zhongping Qin:
Secure systolic Montgomery modular multiplier resilient to Hardware Trojan and Fault-Injection attacks. 1-5 - Stamatios A. Theocharis, George A. Tsihrintzis:
Personalization as a means to improve e-services. 1-5 - Imen El Bouabidi, Faouzi Zarai, Mohammad S. Obaidat
, Lotfi Kamoun:
Secure and integrated handover authentication scheme with FMIPv6. 1-5 - Karen Miranda
, Víctor Manuel Ramos Ramos
, Tahiry Razafindralambo:
Using efficiently autoregressive estimation in wireless sensor networks. 1-5 - Angelo Coluccia
, Vincenzo Chironi, Stefano D'Amico
:
Non-idealities compensation in full-digital receivers with application to Ultra-Wide Band. 1-5 - Samar Mouakket
:
Investigating the factors influencing users' continuance intentions towards online reservation. 1-5 - Faezeh Hajiaghajani, Marjan Naderan Tahan, Hossein Pedram, Mehdi Dehghan
:
Merging and incentive-based techniques in hybrid clustering for multi-target tracking in Wireless Sensor Networks. 1-5
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.