


default search action
4th IISA 2013: Piraeus/Athens, Greece
- Nikolaos G. Bourbakis, George A. Tsihrintzis, Maria Virvou:

4th International Conference on Information, Intelligence, Systems and Applications, IISA 2013, Piraeus, Greece, July 10-12, 2013. IEEE 2013 - Allan A. Sioson

:
Experiences on the use of an automatic C++ solution grader system. 1-6 - Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou

, Christina Vichou:
Agent agreement protocols based on golay error-correcting code. 1-6 - Christos Troussas, Maria Virvou

, Kurt Junshean Espinosa, Kevin Llaguno, Jaime D. L. Caro
:
Sentiment analysis of Facebook statuses using Naive Bayes classifier for language learning. 1-6 - Nicholas Zaranis:

The use of Information and Communication Technologies in the first grade of primary school for teaching rectangles based in Realistic Mathematics Education. 1-6 - Constantinos Patsakis

, Agusti Solanas
:
Privacy as a Product: A case study in the m-Health sector. 1-6 - Aristomenis S. Lampropoulos

, George A. Tsihrintzis:
Evaluation of density one-class classifiers for item-based filtering. 1-6 - Anastasios Drosou, Alkiviadis Tsimpiris, Dimitris Kugiumtzis

, Nikos Porfyriou, Dimosthenis Ioannidis
, Dimitrios Tzovaras
:
Dimensionality reduction for enhanced 3D face recognition. 1-8 - Konstantinos Drossos

, Rigas Kotsakis, George Kalliris
, Andreas Floros:
Sound events and emotions: Investigating the relation of rhythmic characteristics and arousal. 1-6 - Yasser Al-Roqi, Stylianos Papanastasiou, Evtim Peytchev

:
Performance evaluation of three GPSR-based routing protocols in a military setting. 1-4 - Mersini Paschou, Evangelos Sakkopoulos

, Athanasios K. Tsakalidis:
APPification of hospital healthcare and data management using QRcodes. 1-6 - Alvin John Burgos, Jaime D. L. Caro

:
Properties of Johnson schemes. 1-11 - Athanasia Eleftheria Chantzi, Charikleia Plessa, Iason Chatziparadeisis Gkanas, Athanasios K. Tsakalidis, Dimitrios Tsolis

:
An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural education. 1-5 - Dionisios N. Sotiropoulos, Chris D. Kounavis, George M. Giaglis

:
Identifying semantically meaningful sub-communities within Twitter blogosphere. 1-8 - Armond C. Ave, Jaime D. L. Caro

, Diana Mae C. Pacapac, Kyla Marie G. Salamanca:
A kinesthetic game as a motivational aid and monitor in upper extremities burns rehabilitation. 1-3 - Amine Ahmed Benyahia, Amir Hajjam, Vincent Hilaire, Mohamed Hajjam, Emmanuel Andres:

E-Care telemonitoring system: Extend the platform. 1-4 - Spiros Nikolopoulos

, Symeon Papadopoulos, Yiannis Kompatsiaris:
Reality mining in urban space. 1-4 - Panagiota Vatsolaki, Alexios Tsalpatouros:

EWOS: A sealed-bid auction system design and implementation for electricity interonnector capacity allocation. 1-6 - Marios Poulos, Sozon Papavlasopoulos:

Automatic stationary detection of time series using auto-correlation coefficients and LVQ - Neural network. 1-4 - Anastasios Maronidis, Chrysanthos Voutounos, Andreas Lanitis

:
An integrated tool for virtual restoration of Byzantine icons. 1-6 - Angeliki Mikeli, Dimitris Sotiros, Dimitris Apostolou, Dimitris K. Despotis:

A multi-criteria recommender system incorporating intensity of preferences. 1-6 - Athanasios Tsitsoulis, Nikolaos G. Bourbakis:

Automatic extraction of upper human body in single images. 1-8 - Rosaly B. Alday, Ruel M. Pagayon:

MediPic: A mobile application for medical prescriptions. 1-4 - Loukia Karanikola, Isambo Karali, Sally I. McClean

:
Uncertainty reasoning for the Semantic Web based on Dempster-Shafer model. 1-4 - Kostas Michalopoulos, Michail Tsakalakis, Nikolaos G. Bourbakis:

Detecting texture paths and patterns in aerial images. 1-5 - Fivos Andritsos:

Port security & access control: A systemic approach. 1-8 - Miltiadis Alamaniotis, Lefteri H. Tsoukalas:

Layered-based approach to virtual storage for smart power systems. 1-6 - Nitesh B. Guinde, Roberto Rojas-Cessa, Sotirios G. Ziavras

:
Packet classification using rule caching. 1-6 - Sofiane Sellah, Olfa Nasraoui

:
Density-based Kernel Scale estimation for Kernel clustering. 1-4 - Radek Holy

, Marek Kalika, Jana Kalikova
:
Multi-application ID card using DESFire EV1. 1-4 - Konstantina Chrysafiadi, Maria Virvou

:
Fuzzy logic for dynamic adaptation: Represent and manage changeable user states. 1-6 - Maria Virvou

, Spyros Papadimitriou
:
Learning addition by playing an adaptive game with coins. 1-4 - Miltiadis Alamaniotis

, Hermilo Hernandez, Tatjana Jevremovic:
Application of support vector regression in removing Poisson fluctuation from pulse height gamma-ray spectra. 1-4 - Jeanelle E. Abanto, Charmailene C. Reyes, Jasmine A. Malinao

, Henry N. Adorna
:
Traffic incident detection and modelling using Quantum Frequency Algorithm and AutoRegressive Integrated Moving Average models. 1-6 - Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos

, Ioannis Psaroudakis, Panajotis Katsaros
, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? 1-6 - Dimitrios Moustis, Panayiotis Kotzanikolaou

:
Evaluating security controls against HTTP-based DDoS attacks. 1-6 - Eleni Darra, Sokratis K. Katsikas

:
Attack detection capabilities of intrusion detection systems for Wireless Sensor Networks. 1-7 - Stamatios Theocharis, George A. Tsihrintzis:

Open data for e-government the Greek case. 1-6 - Demosthenes Akoumianakis

, Giorgos Ktistakis, Giannis Milolidakis, Konstantinos Michailidis:
Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services. 1-7 - Danielle Anne F. Ayag, Ricardo C. Bautista, Maria Azriel Therese D. Eala, Rommel P. Feria

:
Acceptability of Hear-O as a mobile hearing screening tool. 1-6 - Ester Ciancamerla, Michele Minichino, S. Palmieri:

Modeling cyber attacks on a critical infrastructure scenario. 1-6 - Mike Burmester:

A trusted computing architecture for critical infrastructure protection. 1-6 - Yiannis Kokkinos, Konstantinos G. Margaritis

:
Distributed privacy-preserving P2P data mining via probabilistic neural network committee machines. 1-4 - Adamantia Psarologou, Maria Virvou

, Nikolaos G. Bourbakis:
A NLU-based method for a first level automatic categorization of AI-based security documents. 1-7 - Christos Troussas, Maria Virvou

, Jaime D. L. Caro
, Kurt Junshean Espinosa:
Evaluation of a language learning application in Facebook. 1-6 - Anna Trikalinou, Nikolaos G. Bourbakis:

A synergistic security method for control-flow hijacking detection using SPNs. 1-5 - Evangelos Theodoridis, Georgios Mylonas

, Ioannis Chatzigiannakis
:
Developing an IoT Smart City framework. 1-6 - Soufiene Ben Othman, Hani Alzaid, Abdelbasset Trad

, Habib Youssef:
An efficient secure data aggregation scheme for wireless sensor networks. 1-4 - Sam Ferguson, Emery Schubert

, Doheon Lee
, Densil Cabrera
, Gary E. McPherson
:
A comparison between continuous categorical emotion responses and Stimulus loudness parameters. 1-6 - Markku Kylänpää

, Aarne Rantala, Janne Merilinna, Mikko Nieminen:
Secure communication platform for distributed city-wide surveillance systems. 1-4 - Vladislav Martinek, Michal Zemlicka

:
Passenger path plan reliability improvement proposal. 1-4 - Maria Virvou

, Sotirios-Christos Sidiropoulos:
An Intelligent Tutoring System over a social network for mathematics learning. 1-4 - Anastasia Balia, Dimitrios Koukopoulos:

A secure collaborative multimedia learning scheme in cultural environments. 1-5 - Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Yunqi Lei:

Face recognition based on the feature fusion of 2DLDA and LBP. 1-6 - Thomas Chatzidimitris, Evangelia Kavakli, Maria Economou

, Damianos Gavalas
:
Mobile Augmented Reality edutainment applications for cultural institutions. 1-4 - Christos Troussas, Maria Virvou

, Anna Vougiouklidou, Kurt Junshean Espinosa:
Automatic misconception diagnosis in multiple language learning over social networks. 1-6 - Christos Troussas, Maria Virvou

, Efthymios Alepis:
Multiple parameter cluster analysis in a multiple language learning system. 1-6 - Spiridon Mousouris

, Georgios D. Styliaras
:
On the creation of a Digital Cultural Heritage Map. 1-6 - Despoina Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, Christos Douligeris, Marianthi Theoharidou

, Dimitris Gritzalis:
S-Port: Collaborative security management of Port Information systems. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














