default search action
4th IISA 2013: Piraeus/Athens, Greece
- Nikolaos G. Bourbakis, George A. Tsihrintzis, Maria Virvou:
4th International Conference on Information, Intelligence, Systems and Applications, IISA 2013, Piraeus, Greece, July 10-12, 2013. IEEE 2013 - Allan A. Sioson:
Experiences on the use of an automatic C++ solution grader system. 1-6 - Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou, Christina Vichou:
Agent agreement protocols based on golay error-correcting code. 1-6 - Christos Troussas, Maria Virvou, Kurt Junshean Espinosa, Kevin Llaguno, Jaime D. L. Caro:
Sentiment analysis of Facebook statuses using Naive Bayes classifier for language learning. 1-6 - Nicholas Zaranis:
The use of Information and Communication Technologies in the first grade of primary school for teaching rectangles based in Realistic Mathematics Education. 1-6 - Constantinos Patsakis, Agusti Solanas:
Privacy as a Product: A case study in the m-Health sector. 1-6 - Aristomenis S. Lampropoulos, George A. Tsihrintzis:
Evaluation of density one-class classifiers for item-based filtering. 1-6 - Anastasios Drosou, Alkiviadis Tsimpiris, Dimitris Kugiumtzis, Nikos Porfyriou, Dimosthenis Ioannidis, Dimitrios Tzovaras:
Dimensionality reduction for enhanced 3D face recognition. 1-8 - Konstantinos Drossos, Rigas Kotsakis, George Kalliris, Andreas Floros:
Sound events and emotions: Investigating the relation of rhythmic characteristics and arousal. 1-6 - Yasser Al-Roqi, Stylianos Papanastasiou, Evtim Peytchev:
Performance evaluation of three GPSR-based routing protocols in a military setting. 1-4 - Mersini Paschou, Evangelos Sakkopoulos, Athanasios K. Tsakalidis:
APPification of hospital healthcare and data management using QRcodes. 1-6 - Alvin John Burgos, Jaime D. L. Caro:
Properties of Johnson schemes. 1-11 - Athanasia Eleftheria Chantzi, Charikleia Plessa, Iason Chatziparadeisis Gkanas, Athanasios K. Tsakalidis, Dimitrios Tsolis:
An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural education. 1-5 - Dionisios N. Sotiropoulos, Chris D. Kounavis, George M. Giaglis:
Identifying semantically meaningful sub-communities within Twitter blogosphere. 1-8 - Armond C. Ave, Jaime D. L. Caro, Diana Mae C. Pacapac, Kyla Marie G. Salamanca:
A kinesthetic game as a motivational aid and monitor in upper extremities burns rehabilitation. 1-3 - Amine Ahmed Benyahia, Amir Hajjam, Vincent Hilaire, Mohamed Hajjam, Emmanuel Andres:
E-Care telemonitoring system: Extend the platform. 1-4 - Spiros Nikolopoulos, Symeon Papadopoulos, Yiannis Kompatsiaris:
Reality mining in urban space. 1-4 - Panagiota Vatsolaki, Alexios Tsalpatouros:
EWOS: A sealed-bid auction system design and implementation for electricity interonnector capacity allocation. 1-6 - Marios Poulos, Sozon Papavlasopoulos:
Automatic stationary detection of time series using auto-correlation coefficients and LVQ - Neural network. 1-4 - Anastasios Maronidis, Chrysanthos Voutounos, Andreas Lanitis:
An integrated tool for virtual restoration of Byzantine icons. 1-6 - Angeliki Mikeli, Dimitris Sotiros, Dimitris Apostolou, Dimitris K. Despotis:
A multi-criteria recommender system incorporating intensity of preferences. 1-6 - Athanasios Tsitsoulis, Nikolaos G. Bourbakis:
Automatic extraction of upper human body in single images. 1-8 - Rosaly B. Alday, Ruel M. Pagayon:
MediPic: A mobile application for medical prescriptions. 1-4 - Loukia Karanikola, Isambo Karali, Sally I. McClean:
Uncertainty reasoning for the Semantic Web based on Dempster-Shafer model. 1-4 - Kostas Michalopoulos, Michail Tsakalakis, Nikolaos G. Bourbakis:
Detecting texture paths and patterns in aerial images. 1-5 - Fivos Andritsos:
Port security & access control: A systemic approach. 1-8 - Miltiadis Alamaniotis, Lefteri H. Tsoukalas:
Layered-based approach to virtual storage for smart power systems. 1-6 - Nitesh B. Guinde, Roberto Rojas-Cessa, Sotirios G. Ziavras:
Packet classification using rule caching. 1-6 - Sofiane Sellah, Olfa Nasraoui:
Density-based Kernel Scale estimation for Kernel clustering. 1-4 - Radek Holy, Marek Kalika, Jana Kalikova:
Multi-application ID card using DESFire EV1. 1-4 - Konstantina Chrysafiadi, Maria Virvou:
Fuzzy logic for dynamic adaptation: Represent and manage changeable user states. 1-6 - Maria Virvou, Spyros Papadimitriou:
Learning addition by playing an adaptive game with coins. 1-4 - Miltiadis Alamaniotis, Hermilo Hernandez, Tatjana Jevremovic:
Application of support vector regression in removing Poisson fluctuation from pulse height gamma-ray spectra. 1-4 - Jeanelle E. Abanto, Charmailene C. Reyes, Jasmine A. Malinao, Henry N. Adorna:
Traffic incident detection and modelling using Quantum Frequency Algorithm and AutoRegressive Integrated Moving Average models. 1-6 - Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos, Ioannis Psaroudakis, Panajotis Katsaros, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? 1-6 - Dimitrios Moustis, Panayiotis Kotzanikolaou:
Evaluating security controls against HTTP-based DDoS attacks. 1-6 - Eleni Darra, Sokratis K. Katsikas:
Attack detection capabilities of intrusion detection systems for Wireless Sensor Networks. 1-7 - Stamatios Theocharis, George A. Tsihrintzis:
Open data for e-government the Greek case. 1-6 - Demosthenes Akoumianakis, Giorgos Ktistakis, Giannis Milolidakis, Konstantinos Michailidis:
Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services. 1-7 - Danielle Anne F. Ayag, Ricardo C. Bautista, Maria Azriel Therese D. Eala, Rommel P. Feria:
Acceptability of Hear-O as a mobile hearing screening tool. 1-6 - Ester Ciancamerla, Michele Minichino, S. Palmieri:
Modeling cyber attacks on a critical infrastructure scenario. 1-6 - Mike Burmester:
A trusted computing architecture for critical infrastructure protection. 1-6 - Yiannis Kokkinos, Konstantinos G. Margaritis:
Distributed privacy-preserving P2P data mining via probabilistic neural network committee machines. 1-4 - Adamantia Psarologou, Maria Virvou, Nikolaos G. Bourbakis:
A NLU-based method for a first level automatic categorization of AI-based security documents. 1-7 - Christos Troussas, Maria Virvou, Jaime D. L. Caro, Kurt Junshean Espinosa:
Evaluation of a language learning application in Facebook. 1-6 - Anna Trikalinou, Nikolaos G. Bourbakis:
A synergistic security method for control-flow hijacking detection using SPNs. 1-5 - Evangelos Theodoridis, Georgios Mylonas, Ioannis Chatzigiannakis:
Developing an IoT Smart City framework. 1-6 - Soufiene Ben Othman, Hani Alzaid, Abdelbasset Trad, Habib Youssef:
An efficient secure data aggregation scheme for wireless sensor networks. 1-4 - Sam Ferguson, Emery Schubert, Doheon Lee, Densil Cabrera, Gary E. McPherson:
A comparison between continuous categorical emotion responses and Stimulus loudness parameters. 1-6 - Markku Kylänpää, Aarne Rantala, Janne Merilinna, Mikko Nieminen:
Secure communication platform for distributed city-wide surveillance systems. 1-4 - Vladislav Martinek, Michal Zemlicka:
Passenger path plan reliability improvement proposal. 1-4 - Maria Virvou, Sotirios-Christos Sidiropoulos:
An Intelligent Tutoring System over a social network for mathematics learning. 1-4 - Anastasia Balia, Dimitrios Koukopoulos:
A secure collaborative multimedia learning scheme in cultural environments. 1-5 - Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Yunqi Lei:
Face recognition based on the feature fusion of 2DLDA and LBP. 1-6 - Thomas Chatzidimitris, Evangelia Kavakli, Maria Economou, Damianos Gavalas:
Mobile Augmented Reality edutainment applications for cultural institutions. 1-4 - Christos Troussas, Maria Virvou, Anna Vougiouklidou, Kurt Junshean Espinosa:
Automatic misconception diagnosis in multiple language learning over social networks. 1-6 - Christos Troussas, Maria Virvou, Efthymios Alepis:
Multiple parameter cluster analysis in a multiple language learning system. 1-6 - Spiridon Mousouris, Georgios D. Styliaras:
On the creation of a Digital Cultural Heritage Map. 1-6 - Despoina Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, Christos Douligeris, Marianthi Theoharidou, Dimitris Gritzalis:
S-Port: Collaborative security management of Port Information systems. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.