default search action
UIC/ATC/ScalCom 2014: Bali, Indonesia
- 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, Bali, Indonesia, December 9-12, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7646-1
- Ferry Pramudianto, Carlos Alberto Kamienski, Eduardo Souto, Fabrizio F. Borelli, Lucas L. Gomes, Djamel Sadok, Matthias Jarke:
IoT Link: An Internet of Things Prototyping Toolkit. 1-9 - Jiangtao Wang, Yasha Wang, Hongru Ren, Daqing Zhang:
Situation Inference by Fusion of Opportunistically Available Contexts. 10-17 - Li Jin, Ming Han, Gang-Li Liu, Ling Feng:
Detecting Cruising Flagged Taxis' Passenger-Refusal Behaviors Using Traffic Data and Crowdsourcing. 18-25 - Jun Ma, XianPing Tao, Chun Cao, Jian Lu:
Handling Influence among Multiple Applications in a Smart Space. 26-33 - Shigemi Ishida, Koki Tomishige, Akira Izumi, Shigeaki Tagashira, Yutaka Arakawa, Akira Fukuda:
Implementation of On-Demand Indoor Location-Based Service Using Ad Hoc Wireless Positioning Network. 34-41 - Tao Wu, Jianxin Li, Nannan Wu, Tao Ou, Borui Yang, Bo Li:
Shutter: Preventing Information Leakage Based on Domain Gateway for Social Networks. 42-49 - Jin B. Hong, Taehoon Eom, Jong Sou Park, Dong Seong Kim:
Scalable Security Analysis Using a Partition and Merge Approach in an Infrastructure as a Service Cloud. 50-57 - Dan Xu, Xiaojiang Chen, Weike Nie, Zhanyong Tang, Zhanglei Li, Dingyi Fang, Na An:
RPC: A Localization Method Based on Regional Partition and Cooperation. 58-65 - Hu Xu, Sung-Bae Cho:
Recognizing Semantic Locations from Smartphone Log with Combined Machine Learning Techniques. 66-71 - Martin Peres, Mohamed Aymen Chalouf, Francine Krief:
A Run-Time Generic Decision Framework for Power and Performance Management on Mobile Devices. 72-79 - Jinzhao Liu, Yue-Zhi Zhou, Di Zhang, Yujian Fang, Wei Han, Yaoxue Zhang:
Muclouds: Parallel Simulator for Large-Scale Cloud Computing Systems. 80-87 - Jun Ren, Jianhua Ma, Runhe Huang, Qun Jin, Zhigang Chen:
A Management System for Cyber Individuals and Heterogeneous Data. 88-95 - Muhammad Agus Zainuddin, Eugen Dedu, Julien Bourgeois:
Nanonetwork Minimum Energy Coding. 96-103 - Toshiya Watanabe, Naohiro Ohtsuka, Susumu Shibusawa, Masaru Kamada, Tatsuhiro Yonekura:
Design of Lower Limb Chair Exercise Support System with Depth Sensor. 104-111 - Takumi Takafuji, Kazuhisa Fujita, Takamasa Higuchi, Akihito Hiromori, Hirozumi Yamaguchi, Teruo Higashino:
Indoor Localization Utilizing Tracking Scanners and Motion Sensors. 112-119 - Yuma Akaike, Jun Komeda, Yuka Kume, Satoshi Kanamaru, Yutaka Arakawa:
AR Go-Kon: A System for Facilitating a Smooth Communication in the First Meeting. 120-126 - Chih-Min Chao, Hsiang-Yuan Fu, Liren Zhang:
An Anypath Routing Protocol for Multi-hop Cognitive Radio Ad Hoc Networks. 127-133 - Jun Komeda, Yutaka Arakawa, Morihiko Tamai, Keiichi Yasumoto:
Intuitive Appliance Control System Based on a High-Accuracy Indoor Positioning System. 134-139 - Jiahui Wen, Jadwiga Indulska, Zhiying Wang:
Discovering Latent Structures for Activity Recognition in Smart Environments. 140-147 - Fei Yi, Zhiwen Yu, Hui Wang, Bin Guo, Xingshe Zhou:
An Opportunistic Music Sharing System Based on Mobility Prediction and Preference Learning. 148-153 - Tianzhang Xing, Binbin Xie, Zhanyong Tang, Xia Zheng, Liqing Ren, Xiaojiang Chen, Dingyi Fang, Na An:
Who Move the Treasures: A RFID-based Approach for the Treasures. 154-162 - Yuichi Nakamura, Takahiro Koizumi, Kanako Obata, Kazuaki Kondo, Yasuhiko Watanabe:
Behaviors and Communications in Working Support through First Person Vision Communication. 163-170 - Viktoriya Degeler, Edward Curry:
Human-Assisted Rule Satisfaction in Partially Observable Environments. 171-178 - Wenqian Nan, Bin Guo, Shenlong Huangfu, Zhiwen Yu, Huihui Chen, Xingshe Zhou:
A Cross-Space, Multi-interaction-Based Dynamic Incentive Mechanism for Mobile Crowd Sensing. 179-186 - Hiroya Nagao, Kazuyuki Shudo:
GFRT-chord: Flexible Structured Overlay Using Node Groups. 187-195 - Zhiwei Sun, Wenge Rong, Yikang Shen, Yuanxin Ouyang, Chao Li, Zhang Xiong:
Influencing Factors Analysis of People's Answering Behaviours on Social Network Based Questions. 196-203 - Wassim Derguech, Eanna Burke, Edward Curry:
An Autonomic Approach to Real-Time Predictive Analytics Using Open Data and Internet of Things. 204-211 - Umair ul Hassan, Edward Curry:
A Multi-armed Bandit Approach to Online Spatial Task Assignment. 212-219 - Prthvi Raj, Sumi Helal:
Palantir: Crowdsourced Newsification Using Twitter. 220-227 - Liu Cao, Yuqing Sun, Haoran Xu:
Historical Trajectories Based Location Privacy Protection Query. 228-235 - Roland Assam, Thomas Seidl:
Near-Optimal Activity Prediction through Efficient Wavelet Modulus Maxima Partitioning and Conditional Random Fields. 236-243 - Chao Chen, Daqing Zhang, Leye Wang, Xiaojuan Ma, Xiao Han, Edwin Hsing-Mean Sha:
Taxi Exp: A Novel Framework for City-Wide Package Express Shipping via Taxi Crowd Sourcing. 244-251 - Bo Chen, Xi Li, Xuehai Zhou, Tengfu Liu, Zongwei Zhu:
Towards Energy Optimization Based on Delay-Sensitive Traffic for WiFi Network. 252-259 - Yuntao Wang, Chun Yu, Lin Du, Jin Huang, Yuanchun Shi:
BodyRC: Exploring Interaction Modalities Using Human Body as Lossy Signal Transmission Medium. 260-267 - Junhua Yan, Chen Tian, Wenyu Liu, Lai Tu, Benxiong Huang:
Multi-source Broadcast Scheduling Algorithm of Barrage Relay Network in Tactical MANET. 268-275 - Shao Zhao, Zhe Zhao, Yifan Zhao, Runhe Huang, Shijian Li, Gang Pan:
Discovering People's Life Patterns from Anonymized WiFi Scanlists. 276-283 - Yongqiang Qin, Yue Shi, Yuanchun Shi:
uStitchHub: Stitching Multi-touch Trajectories on Tiled Very Large Tabletops. 284-289 - Yao-Chung Hsu, Chi-Han Lin, Wen-Tsuen Chen:
Design of a Sensing Service Architecture for Internet of Things with Semantic Sensor Selection. 290-298 - Shu Chen, Hongwei Wu, Lai Tu, Benxiong Huang:
Identifying Hot Lines of Urban Spatial Structure Using Cellphone Call Detail Record Data. 299-304 - Yuying Wang, Xingshe Zhou, Lijun Shan, Kejian Miao:
Study on Complex Event Processing for CPS: An Event Model Perspective. 305-310 - Rui Neves Madeira, Pedro Albuquerque Santos, André Vieira, Nuno Correia:
Model-Based Solution for Personalization of the User Interaction in Ubiquitous Computing. 311-318 - Chunyao Liu, Lichen Zhang, Daqiang Zhang:
Task Scheduling in Cyber-Physical Systems. 319-324 - Hongsheng Chen, Ke Shi, Yao Lin:
Data Collection Oriented Topology Control for Predictable Delay-Tolerant Networks. 325-330 - Qiguang Miao, Xing Tang, Yi-Ning Quan:
A Novel Email Virus Propagation Model with Local Group. 331-336 - Muhamad Risqi Utama Saputra, Widyawan, Paulus Insap Santosa:
Obstacle Avoidance for Visually Impaired Using Auto-Adaptive Thresholding on Kinect's Depth Image. 337-342 - Estefanía Serral, Johannes De Smedt, Jan Vanthienen:
Making Business Environments Smarter: A Context-Adaptive Petri Net Approach. 343-348 - Mohd Nazrin Muhammad, Zoran Salcic, Kevin I-Kai Wang:
Subtractive Clustering as ZUPT Detector. 349-355 - Youn-Sik Hong, Sung-Hyun Han, Saemina Kim:
An Indoor Location-Tracking Using Wireless Sensor Networks Cooperated with Relative Distance Finger Printing. 356-361 - Yuntao Wang, Chun Yu, Yuhang Zhao, Jin Huang, Yuanchun Shi:
Defining and Analyzing a Gesture Set for Interactive TV Remote on Touchscreen Phones. 362-365 - Weiwei Li, Yuqing Sun:
Privacy Perceptive Wireless Service Game Model. 366-371 - Mingyang Zhong, Jadwiga Indulska, Peizhao Hu, Marius Portmann, Mohan J. Kumar:
Development of Collaborative Video Streaming for Mobile Networks: From Overview to Prototype. 372-377 - Lyes Khelladi, Djamel Djenouri, Noureddine Lasla, Nadjib Badache, Abdelmadjid Bouabdallah:
MSR: Minimum-Stop Recharging Scheme for Wireless Rechargeable Sensor Networks. 378-383 - Rim Helali, Nadia Ben Azzouna, Khaled Ghédira:
Service Selection in Ubiquitous Environments: A Novel Approach Using CBR and Skyline Computing. 384-389 - Igor Petukhov, Luydmila Steshina, Ilya Tanryverdiev:
Remote Sensing of Forest Stand Parameters for Automated Selection of Trees in Real-Time Mode in the Process of Selective Cutting. 390-395 - Thomas Renner, Andreas Kliem, Odej Kao:
The Device Cloud - Applying Cloud Computing Concepts to the Internet of Things. 396-401 - Qiang Yang, Jie Liu, Yongqiang Qin, Chun Yu, Qing Yuan, Yuanchun Shi:
Studying Accessible States of User Interfaces on Tabletops. 402-405 - Amrita Ghosal, Subir Halder:
Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks. 406-411 - Si Zhao, Hongwei Wu, Lai Tu, Benxiong Huang:
Segmentation of Urban Areas Using Vector-Based Model. 412-416 - Mourad Elhadef:
A Machine Learning Approach for Self-Diagnosing Multiprocessors Systems under the Generalized Comparison Model. 417-424 - Yukihiro Watanabe, Hiroshi Otsuka, Yasuhide Matsumoto:
Failure Prediction for Cloud Datacenter by Hybrid Message Pattern Learning. 425-432 - Wei-Chih Huang, William J. Knottenbelt:
Self-Adaptive Containers: Interoperability Extensions and Cloud Integration. 433-440 - Hiromasa Shimada, Tatsuo Nakajima:
Automatically Generating External OS Kernel Integrity Checkers for Detecting Hidden Rootkits. 441-448 - Fabian Rigoll, Christian Hirsch, Sebastian Kochanneck, Hartmut Schmeck, Ingo Mauser:
A Privacy-Aware Architecture for Energy Management Systems in Smart Grids. 449-455 - Li Tang, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, He Li, Shaoyin Cheng:
Awareness and Control of Personal Data Based on the Cyber-I Privacy Model. 456-463 - Tran Phuong Thao, Lee Chin Kho, Azman Osman Lim:
SW-POR: A Novel POR Scheme Using Slepian-Wolf Coding for Cloud Storage. 464-472 - Tomohiro Nakao, Jun-nosuke Teramae, Naoki Wakamiya:
Distributed Routing Protocol Based on Biologically-Inspired Attractor Selection with Active Stochastic Exploration and a Short-Term Memory. 473-478 - Cong Cao, Jun Yan:
Towards a Trust Model for Trust Establishment and Management in Business-to-Consumer E-Commerce. 479-486 - Junqiang Dai, Guanfeng Liu, Jiajie Xu, An Liu, Lei Zhao, Xiaofang Zhou:
An Efficient Trust-Oriented Trip Planning Method in Road Networks. 487-494 - Xia Yang, Peng Shi, Bo Tian, Bing Zeng, Wei Xiao:
Trust-E: A Trusted Embedded Operating System Based on the ARM Trustzone. 495-501 - Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda:
An Adaptivity-Enhanced Multipath Routing Method for Secure Dispersed Data Transfer Method in Ad Hoc Networks with Varying Node Density. 502-509 - Salah H. Abbdal, Hai Jin, Deqing Zou, Ali A. Yassen:
Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage. 510-517 - Shoma Nakahara, Tomoyuki Ohta, Yoshiaki Kakuda:
A Routing Scheme Based on Autonomous Clustering and P2P Overlay Network in MANETs. 518-524 - Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
Privacy Protection against Query Prediction in Location-Based Services. 525-532 - Qaisar Ayub, Mohd Soperi Mohd Zahid, Sulma Rashid, Abdul Hanan Abdullah:
Forwarding Impact Aware Routing Protocol for Delay Tolerant Network. 533-539 - Young-Woo Jung, Hag-Young Kim, Sang-Wook Kim:
An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices. 540-547 - Imen Ben Lahmar, Djamel Belaïd:
An Autonomic Container for the Management of Component-Based Applications in Pervasive Environments. 548-555 - Takahiro Shigeta, Eitaro Kohno, Yoshiaki Kakuda:
An Efficient Algorithm for Deriving Mobility Scenarios from New Mobility Model Representing Spatially and Temporally Biased Change of Node Mobility and Node Density for Mobile Ad Hoc Networks. 556-562 - Jameel Almalki, Haifeng Shen:
Compatibility in Service-Oriented Revision Control Systems. 563-570 - Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan:
International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds. 571-576 - Satoru Ohta, Atsushi Sakai:
Virtual Machine Migration Methods for Heterogeneous Power Consumption. 577-582 - Wangping Xiong, Jianqiang Du, Wang Nie:
Partial Least Squares Improvement and Research Principal Component Regression Extraction Methods. 583-585 - Yukikazu Nakamoto, Akihiro Yamaguchi, Kenya Sato, Shinya Honda, Hiroaki Takada:
Toward Data-Centric Software Architecture for Automotive Systems - Embedded Data Stream Processing Approach. 586-589 - Anna Lan, Zhen Han, Dawei Zhang, Yichen Jiang, Tianhua Liu, Meihong Li:
An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack. 590-595 - Eyad Saleh, Johannes Sianipar, Ibrahim Takouna, Christoph Meinel:
SecPlace: A Security-Aware Placement Model for Multi-tenant SaaS Environments. 596-602 - Ganis Zulfa Santoso, Young-Woo Jung, Hag-Young Kim:
Analysis of Virtual Machine Monitor as Trusted Dependable Systems. 603-608 - Hiroaki Yagi, Eitaro Kohno, Yoshiaki Kakuda:
On the Applicability of the Tree-Based Group ID Reassignment Routing Method for MANETs. 609-614 - Yuya Minami, Yuya Kitaura, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda:
Delay- and Disruption-Tolerant Bluetooth MANET-Based Dual-Purpose Systems for Normal and Disaster Situations. 615-619 - Jaesik Lee, Youngseok Oh:
A Study on Providing the Reliable and Secure SMS Authentication Service. 620-624 - Curtis E. Dyreson:
Vacuuming XML. 625-628 - David Allenotor, Ruppa K. Thulasiram:
A Discrete Time Financial Option Pricing Model for Cloud Services. 629-636 - Shinji Kitagami, Yohtaro Miyanishi, Yoshiyori Urano, Norio Shiratori:
Proposal of a Distributed Cooperative M2M System for Flood Disaster Prevention. 637-642 - Mohammed Hussain, Mohamed Basel Almourad:
Trust in Mobile Cloud Computing with LTE-based Deployment. 643-648 - Khaled Bakhit, Sirine Taleb, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab:
CAVE: Hybrid Approach for In-Network Content Caching. 649-654 - Hiroaki Takasaki, Samih Mohemmed Mostafa, Shigeru Kusakabe:
Monitoring Hadoop by Using IEEE1888 in Implementing Energy-Aware Thread Scheduling. 655-658 - Xin Zhu, Xina Zhou, Wenxi Chen, Keiichiro Kitamura, Tetsu Nemoto:
Estimation of Sleep Quality of Residents in Nursing Homes Using an Internet-Based Automatic Monitoring System. 659-665 - Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Bei Pei:
A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things. 666-671 - Hong Lu, Bohong Yang, Rui Zhao, Pengliang Qu, Wenqiang Zhang:
Intelligent Human Fall Detection for Home Surveillance. 672-676 - Felipe Silva Ferraz, Carlos André Guimarães Ferraz:
More than Meets the Eye in Smart City Information Security: Exploring Security Issues Far beyond Privacy Concerns. 677-685 - Jingru Wei, Lin Lu, Chenglei Yang, Xu Yin, Xiangxu Meng:
Interactive Design and Simulation System for Deploying Wireless Sensor Networks Based on Centriod Multi-touch Screen. 686-691 - Masato Yamanouchi, Hideya Ochiai, Y. K. Reddy, Hiroshi Esaki, Hideki Sunahara:
Case Study of Constructing Weather Monitoring System in Difficult Environment. 692-696 - Kashif Naseer Qureshi, Abdul Hanan Abdullah, Ghufran Ullah:
Sensor Based Vehicle Environment Perception Information System. 697-700 - Xiaoxin Qiu, Hong Lu, Wenqiang Zhang, Yunhan Bai, Qianzhong Fu:
Vision Based Mapping and Localization in Unknown Environment for Intelligent Mobile Robot. 701-706 - Suwilai Phumpho, Poomyos Payakkawan, Anurak Jansri, Direk Tongaram, Chirasak Promprayoon, Pithuk Keattipun, Boonchu Ruengpongsrisuck, Chanachai Punnua, Satree Areejit, Pitikhate Sooraksa:
Anti-copy of 2D Barcode Using Multi-encryption Technique. 707-711 - Zhenyu Liu, Mingang Chen, Lizhi Cai:
A Novel Automated Software Test Technology with Cloud Technology. 712-716 - Sehoon Kim, Jin-Young Hong, Seil Kim, Sung-Hoon Kim, Jun-Hyung Kim, Jake Chun:
Restful Design and Implementation of Smart Appliances for Smart Home. 717-722 - Wang Ning:
The Latent Appreciation Effect of Interactive Design in Internet Communication. 723-726 - Wang Ning:
The Key Features and Applications of Newmedia Interactive Design. 727-731 - Weishan Zhang, Pengcheng Duan, Qinghua Lu, Xin Liu:
A Realtime Framework for Video Object Detection with Storm. 732-737 - Fu Ning, Junhua Duan, Guo Yan:
A Service Composition Environment Based on Enterprise Service Bus. 738-743 - Kevin I-Kai Wang, Ashwin Rajamohan, Shivank Dubey, Samuel A. Catapang, Zoran Salcic:
A Wearable Internet of Things Mote with Bare Metal 6LoWPAN Protocol for Pervasive Healthcare. 750-756 - Xiaohu Fan, Hao Huang, Changsheng Xie, Zhigang Tang, Jing Zeng:
Private Smart Space: Cost-Effective ADLs (Activities of Daily Livings) Recognition Based on Superset Transformation. 757-762 - Remus-Alexandru Dobrican, Denis Zampuniéris:
A Proactive Approach for Information Sharing Strategies in an Environment of Multiple Connected Ubiquitous Devices. 763-770 - Hanzi Mao, Chen Tian, Jingdong Sun, Junhua Yan, Weimin Wu, Benxiong Huang:
Shadow VoD: Performance Evaluation as a Capability in Production P2P-CDN Hybrid VoD Networks. 771-776 - Xiao Zhang, Yufeng Dou, Junfeng Zhan, Yinchuang Xie, Xuejin Wan:
Estimate Dynamic Road Travel Time Based on Uncertainty Feedback. 777-782 - Brojeshwar Bhowmick, Apurbaa Mallik, Arindam Saha:
Mobiscan3D: A Low Cost Framework for Real Time Dense 3D Reconstruction on Mobile Devices. 783-788 - Wei Gai, Lin Lu, Chenglei Yang, Shuo Feng, Tingting Cui, Xiangxu Meng:
Computing Realistic Images for Audience Interaction in Projection-Based Multi-view Display System. 789-793 - Jega Anish Dev:
Human Computer Interaction Advancement by Usage of Smart Phones for Motion Tracking and Remote Operation. 794-799 - Toshiya Watanabe, Naohiro Ohtsuka, Susumu Shibusawa, Masaru Kamada, Tatsuhiro Yonekura:
Motion Detection and Evaluation of Chair Exercise Support System with Depth Image Sensor. 800-807 - Tetsuya Kanachi, Hiroaki Higaki:
Wireless Multihop Transmissions for Secret Sharing Communication. 808-813 - Hiroki Hanawa, Hiroaki Higaki:
DTN Data Message Transmission by Inter-vehicle Communication with Help of Road Map and Statistical Traffic Information in VANET. 814-820 - Thomas Canhao Xu, Jussi Toivonen, Tapio Pahikkala, Ville Leppänen:
BDMap: A Heuristic Application Mapping Algorithm for the Big Data Era. 821-828 - Yi Yang, Yanhua Chen, Caihong Li, Xiangquan Gui, Lian Li:
Network Traffic Prediction Based on LSSVM Optimized by PSO. 829-834 - Boris Moltchanov, Oscar Rodriguez Rocha:
Cloud Wave Smart Middleware for DevOps in Clouds. 835-837 - Li Li, Yunlong Guo, Yu Xiang, Xiao Xu, WeiGang Zeng:
Entity Linking and Name Disambiguation in Chinese Micro-Blogs. 838-843 - Xiaolei Huang, Lei Zhang, David Chiu, Tianli Liu, Xin Li, Tingshao Zhu:
Detecting Suicidal Ideation in Chinese Microblogs with Psychological Lexicons. 844-849 - Jun Zhong, Li Liu, Ye Wei, Dashi Luo, Letian Sun, Yonggang Lu:
Personalized Activity Recognition Using Molecular Complex Detection Clustering. 850-854 - Changjie Hu, Xiaoli Hou, Yonggang Lu:
Improving the Architecture of an Autoencoder for Dimension Reduction. 855-858 - Yohtaro Miyanishi, Akira Kanaoka, Fumiaki Sato, Xiaogong Han, Shinji Kitagami, Yoshiyori Urano, Norio Shiratori:
New Methods to Ensure Security to Increase User's Sense of Safety in Cloud Services. 859-866 - David Ademola Oyemade, David Allenotor:
A Trade Gap Scalability Model for the Forex Market. 867-873 - Hongyun Yu, Hongming Cai, Cheng Xie, Lihong Jiang:
Multi-tenant Oriented Elastic Data-Centric Cloud Service Based on Resource Meta-Model. 874-879 - K. S. Gayathri, Susan Elias, S. Shivashankar:
Composite Activity Recognition in Smart Homes Using Markov Logic Network. 880-887 - Choonsung Shin, Byoung-Ha Park, Gwang-Mo Jung, Sung Hee Hong:
Mobile Augmented Reality Mashup for Furture IoT Environment. 888-891 - Mounir Mokhtari, Thibaut Tiberghien, Jit Biswas, Aung Aung Phyo Wai:
Futuring Digital Health and Wellness. 892-896
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.