


default search action
Journal of Ambient Intelligence and Humanized Computing, Volume 6
Volume 6, Number 1, February 2015
- Toly Chen

, Chu-Chai Chan, Hsin-Chieh Wu, Yu-Cheng Lin:
Ambient intelligence and ergonomics in Asia. 1-2 - Ming-Tang Wang, Chih-Chieh Yang:

Concept design from random algorithms for design sketching. 3-11 - Abayomi Moradeyo Otebolaku, Maria Teresa Andrade

:
Context-aware media recommendations for smart devices. 13-36 - Peng-Cheng Sung, Chun-Chin Hsu, Cheng-Lung Lee, Yuan-Shyi Peter Chiu, Huey-Long Chen:

Formulating grip strength and key pinch strength prediction models for Taiwanese: a comparison between stepwise regression and artificial neural networks. 37-46 - Chao-Tang Tseng, Ying-Lien Lee, Chien-Chih Chou:

An ambient intelligence system for water release scheduling in cascade hydropower systems. 47-55 - Hsin-Chieh Wu, Toly Chen

:
CART-BPN approach for estimating cycle time in wafer fabrication. 57-67 - Imen Jemili, Dhouha Ghrab

, Amine Dhraief
, Abdelfettah Belghith
, Bilel Derbel, Ahmad S. Al-Mogren, Hassan Mathkour:
CHRA: a coloring based hierarchical routing algorithm. 69-82 - Kevin Bing-Yung Wong, Tongda Zhang, Hamid K. Aghajan:

Extracting patterns of behavior from a network of binary sensors. 83-105 - Adrienne Heinrich, Frank H. van Heesch, Bhargava Puvvula, Mukul Rocque:

Video based actigraphy and breathing monitoring from the bedside table of shared beds. 107-120 - Lishan Ke, Zongxiang Yi, Yan Ren:

Improved broadcast encryption schemes with enhanced security. 121-129 - Can Xiang

, Chunming Tang:
Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. 131-139 - Xiang Li, Lingling Wang:

On the study of fusion techniques for bad geological remote sensing image. 141-149
Volume 6, Number 2, April 2015
- Ana M. Bernardos

, Boon-Chong Seet, Elisabetta Farella
:
Special issue on "Personalization and situation awareness in smart environments". 151-152 - Udayanto Dwi Atmojo

, Zoran A. Salcic
, Kevin I-Kai Wang, HeeJong Park:
System-level approach to the design of ambient intelligence systems based on wireless sensor and actuator networks. 153-169 - Simone Chiappino, Pietro Morerio

, Lucio Marcenaro
, Carlo S. Regazzoni
:
Bio-inspired relevant interaction modelling in cognitive crowd management. 171-192 - Ehsan Nazerfard

, Diane J. Cook:
CRAFFT: an activity prediction model based on Bayesian networks. 193-205 - Paola Andrea Jaramillo Garcia, Luis Ignacio Lopera Gonzalez

, Oliver Amft
:
Using implicit user feedback to balance energy consumption and user comfort of proximity-controlled computer screens. 207-221 - Yacine Atif

, Sujith Samuel Mathew
, Abderrahmane Lakas
:
Building a smart campus to support ubiquitous learning. 223-238 - Gian Luca Foresti, Manuela Farinosi

, Marco Vernier:
Situational awareness in smart environments: socio-mobile and sensor data fusion for emergency response to disasters. 239-257 - Giuseppe Ghiani, Jussi Polet, Ville Antila, Jani Mäntyjärvi

:
Evaluating context-aware user interface migration in multi-device environments. 259-277 - Susanna Pantsar-Syväniemi, Mari Ervasti, Kaarina Karppinen, Antti Väätänen, Virpi Oksman

, Essi Kuure:
A situation-aware safety service for children via participatory design. 279-293
Volume 6, Number 3, June 2015
- Ansar-Ul-Haque Yasar

, Zahoor Ali Khan
, Elhadi M. Shakshuki
:
Guest Editorial: new developments in ambient information systems. 295-296 - Gianni Fenu

, Pier Luigi Pau:
Evaluating complex network indices for vulnerability analysis of a territorial power grid. 297-306 - Omar Marey

, Jamal Bentahar
, Ehsan Khosrowshahi Asl, Khalid Sultan
, Rachida Dssouli:
Decision making under subjective uncertainty in argumentation-based agent negotiation. 307-323 - Radja Boukharrou

, Ahmed-Chawki Chaouche
, Amal El Fallah Seghrouchni, Jean-Michel Ilié
, Djamel-Eddine Saïdouni:
Dealing with temporal failure in ambient systems: a dynamic revision of plans. 325-336 - Marco Lützenberger, Nils Masuch, Tobias Küster, Daniel Freund, Marcus Voß, Christopher-Eyk Hrabia, Denis Pozo, Johannes Fähndrich, Frank Trollmann, Jan Keiser, Sahin Albayrak

:
A common approach to intelligent energy and mobility services in a smart city environment. 337-350 - Etienne Alain Feukeu

, Karim Djouani
, Anish Mathew Kurien:
Performance evaluation of the ADSA in a vehicular network: MAC approach in IEEE 802.11p. 351-360 - Samir Ouchani

, Gabriele Lenzini:
Generating attacks in SysML activity diagrams by detecting attack surfaces. 361-373
Volume 6, Number 4, August 2015
- Haroon Malik, Ansar-Ul-Haque Yasar

, Elhadi M. Shakshuki
:
Guest editorial: new developments in future networked systems. 375-376 - Tiago Augusto Engel, Andrea Schwertner Charão

, Manuele Kirsch-Pinheiro, Luiz Angelo Steffenel
:
Performance improvement of data mining in Weka through multi-core and GPU acceleration: opportunities and pitfalls. 377-390 - Tarek Helmy

, Ahmed Al-Nazer:
Semantic manipulation of user's queries and modeling the health and nutrition preferences. 391-405 - Salma Najar, Manuele Kirsch-Pinheiro, Carine Souveyet:

Service discovery and prediction on Pervasive Information System. 407-423 - Jason Jaskolka

, Ridha Khédri, Khair Eddin Sabri:
Investigative support for information confidentiality. 425-451 - Yaser Jararweh

, Mahmoud Al-Ayyoub, Ala Darabseh, Elhadj Benkhelifa
, Mladen A. Vouk, Andy J. Rindos:
SDIoT: a software defined based internet of things framework. 453-461 - Alireza Nafarieh, Muhammad H. Raza, William Robertson:

A comprehensive analysis of QoS-based routing mechanisms over shared mesh protected optical infrastructures. 463-472
- Ye-Wang Chen

, Jiong-Liang Wang, Yiqiao Cai, Ji-Xiang Du:
A method for Chinese text classification based on apparent semantics and latent aspects. 473-480 - Zewu Peng, Jingliang Liao, Yiqiao Cai:

Differential evolution with distributed direction information based mutation operators: an optimization technique for big data. 481-494 - Mohsen Amiribesheli

, Asma Benmansour, Abdelhamid Bouchachia
:
A review of smart homes in healthcare. 495-517 - Keita Matsuo, Donald Elmazi

, Yi Liu, Shinji Sakamoto
, Leonard Barolli:
A multi-modal simulation system for wireless sensor networks: a comparison study considering stationary and mobile sink and event. 519-529
Volume 6, Number 5, October 2015
- Fatos Xhafa, Xiaofeng Chen, Leonard Barolli:

Editorial preface for the special issue "Advances in security, privacy and trust technologies". 531-532 - Zhiguang Xiong, Kang Deng, Zhusong Liu, Yanping Liu, Xiaocui Yan:

The finite volume element method for a parameter identification problem. 533-539 - Jian Chen, Dongping Huang, Shuyue Hu, Yu Liu, Yi Cai, Huaqing Min:

An opinion mining framework for Cantonese reviews. 541-547 - Wei Zhang, Shuguang Liu, Weidong Zhong, Xiaoyuan Yang:

How to build a faster private information retrieval protocol? 549-555 - Xiaozhang Liu, Hongwei Ye:

Dual-kernel based 2D linear discriminant analysis for face recognition. 557-562 - Xuan Li, Guoji Zhang, Xia-Yan Zhang:

Image encryption algorithm with compound chaotic maps. 563-570 - Jiahai Wang, Chenglin Zhong, Ying Zhou, Yalan Zhou:

Multiobjective optimization algorithm with objective-wise learning for continuous multiobjective problems. 571-585 - Dong Liu:

A fault-tolerant architecture for ROIA in cloud. 587-595 - Caiyun Chen, Junshan Yu:

An adaptive algorithm for blind MMSE equalization of SIMO channels. 597-602
- Jihad Hamie, Benoît Denis

, Raffaele D'Errico, Cédric Richard:
On-body TOA-based ranging error model for motion capture applications within wearable UWB networks. 603-612 - Franz Gravenhorst, Christoph Thiem, Bernd Tessendorf, Rolf Adelsberger, Bert Arnrich

, Conny Draper, Richard M. Smith, Gerhard Tröster:
SonicSeat: design and evaluation of a seat position tracker based on ultrasonic sound measurements for rowing technique analysis. 613-622 - Ling Xu, Hailin Liu, Xinhua Yan, Shengping Liao, Xiaohong Zhang:

Optimization method for trajectory combination in surveillance video synopsis based on genetic algorithm. 623-633 - Donald Elmazi

, Elis Kulla, Tetsuya Oda, Evjola Spaho
, Shinji Sakamoto
, Leonard Barolli:
A comparison study of two fuzzy-based systems for selection of actor node in wireless sensor actor networks. 635-645 - Mohamed Tarik Moutacalli

, Abdenour Bouzouane, Bruno Bouchard:
The behavioral profiling based on times series forecasting for smart homes assistance. 647-659 - Baojiang Cui, Haifeng Jin, Zheli Liu, Jiangdong Deng:

Improved collaborative filtering with intensity-based contraction. 661-674 - Xiang Li, Ge Wang:

Optimal band selection for hyperspectral data with improved differential evolution. 675-688 - Chanjuan Liu, Hailin Zou, Caixia Li, Ying Liu, Yilei Wang, Shixiang Jia, Shusen Zhou:

An adaptive texture-preserved image denoising model. 689-697
Volume 6, Number 6, December 2015
- Xu An Wang

, Jianfeng Ma, Xiaoyuan Yang:
A new proxy re-encryption scheme for protecting critical information systems. 699-711 - Salvatore Distefano

:
Dependability assessment of critical systems. 713-720 - Zhiwei Gao, Yingxin Hu, Kai Lu:

CPTIAS: a new fast PKI authentication scheme based on certificate path trust index. 721-731 - Victor V. Toporkov

, Anna S. Toporkova, Alexey Tselishchev, Dmitry Yemelyanov, Petr Potekhin:
Heuristic strategies for preference-based scheduling in virtual organizations of utility grids. 733-740 - Mario Sicuranza

, Angelo Esposito
, Mario Ciampi
:
An access control model to minimize the data exchange in the information retrieval. 741-752 - Luigi Coppolino

, Salvatore D'Antonio, Valerio Formicola
, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services. 753-762 - Jianhua Yu, Xueli Wang, Wei Gao:

Improvement and applications of secure outsourcing of scientific computations. 763-772 - Domenico Pascarella

, Salvatore Venticinque
, Rocco Aversa, Massimiliano Mattei
, Luciano Blasi:
Parallel and distributed computing for UAVs trajectory planning. 773-782 - Rafal Kozik

, Michal Choras, Adam Flizikowski
, Marianthi Theocharidou
, Vittorio Rosato
, Erich Rome:
Advanced services for critical infrastructures protection. 783-795 - Xiaoqing Tan, Xiaoqian Zhang, Jin Li:

Big data quantum private comparison with the intelligent third party. 797-806 - Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu:

A brief survey on secure multi-party computing in the presence of rational parties. 807-824 - Han Shen, Chongzhi Gao, Debiao He

, Libing Wu
:
New biometrics-based authentication scheme for multi-server environment in critical systems. 825-834 - Xin Xie, Yin Xu, Qing Liu, Fengping Hu, Tijian Cai, Nan Jiang, Huandong Xiong:

A study on fast SIFT image mosaic algorithm based on compressed sensing and wavelet transform. 835-843 - Xiangyang Li, Rong Li, Qiang Huang, Jiangao Luo:

Minimized-expansion based lossless image authentication algorithm. 845-854

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














