


default search action
4th IISA 2013: Piraeus/Athens, Greece
- Nikolaos G. Bourbakis, George A. Tsihrintzis, Maria Virvou:
4th International Conference on Information, Intelligence, Systems and Applications, IISA 2013, Piraeus, Greece, July 10-12, 2013. IEEE 2013 - Allan A. Sioson
:
Experiences on the use of an automatic C++ solution grader system. 1-6 - Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou
, Christina Vichou:
Agent agreement protocols based on golay error-correcting code. 1-6 - Christos Troussas, Maria Virvou
, Kurt Junshean Espinosa, Kevin Llaguno, Jaime D. L. Caro
:
Sentiment analysis of Facebook statuses using Naive Bayes classifier for language learning. 1-6 - Nicholas Zaranis:
The use of Information and Communication Technologies in the first grade of primary school for teaching rectangles based in Realistic Mathematics Education. 1-6 - Constantinos Patsakis
, Agusti Solanas
:
Privacy as a Product: A case study in the m-Health sector. 1-6 - Aristomenis S. Lampropoulos
, George A. Tsihrintzis:
Evaluation of density one-class classifiers for item-based filtering. 1-6 - Anastasios Drosou, Alkiviadis Tsimpiris, Dimitris Kugiumtzis
, Nikos Porfyriou, Dimosthenis Ioannidis
, Dimitrios Tzovaras
:
Dimensionality reduction for enhanced 3D face recognition. 1-8 - Konstantinos Drossos
, Rigas Kotsakis, George Kalliris
, Andreas Floros:
Sound events and emotions: Investigating the relation of rhythmic characteristics and arousal. 1-6 - Yasser Al-Roqi, Stylianos Papanastasiou, Evtim Peytchev
:
Performance evaluation of three GPSR-based routing protocols in a military setting. 1-4 - Mersini Paschou, Evangelos Sakkopoulos
, Athanasios K. Tsakalidis:
APPification of hospital healthcare and data management using QRcodes. 1-6 - Alvin John Burgos, Jaime D. L. Caro
:
Properties of Johnson schemes. 1-11 - Athanasia Eleftheria Chantzi, Charikleia Plessa, Iason Chatziparadeisis Gkanas, Athanasios K. Tsakalidis, Dimitrios Tsolis
:
An innovative augmented reality educational platform using Gamification to enhance lifelong learning and cultural education. 1-5 - Dionisios N. Sotiropoulos, Chris D. Kounavis, George M. Giaglis
:
Identifying semantically meaningful sub-communities within Twitter blogosphere. 1-8 - Armond C. Ave, Jaime D. L. Caro
, Diana Mae C. Pacapac, Kyla Marie G. Salamanca:
A kinesthetic game as a motivational aid and monitor in upper extremities burns rehabilitation. 1-3 - Amine Ahmed Benyahia, Amir Hajjam, Vincent Hilaire, Mohamed Hajjam, Emmanuel Andres:
E-Care telemonitoring system: Extend the platform. 1-4 - Spiros Nikolopoulos
, Symeon Papadopoulos, Yiannis Kompatsiaris:
Reality mining in urban space. 1-4 - Panagiota Vatsolaki, Alexios Tsalpatouros:
EWOS: A sealed-bid auction system design and implementation for electricity interonnector capacity allocation. 1-6 - Marios Poulos, Sozon Papavlasopoulos:
Automatic stationary detection of time series using auto-correlation coefficients and LVQ - Neural network. 1-4 - Anastasios Maronidis, Chrysanthos Voutounos, Andreas Lanitis
:
An integrated tool for virtual restoration of Byzantine icons. 1-6 - Angeliki Mikeli, Dimitris Sotiros, Dimitris Apostolou, Dimitris K. Despotis:
A multi-criteria recommender system incorporating intensity of preferences. 1-6 - Athanasios Tsitsoulis, Nikolaos G. Bourbakis:
Automatic extraction of upper human body in single images. 1-8 - Rosaly B. Alday, Ruel M. Pagayon:
MediPic: A mobile application for medical prescriptions. 1-4 - Loukia Karanikola, Isambo Karali, Sally I. McClean
:
Uncertainty reasoning for the Semantic Web based on Dempster-Shafer model. 1-4 - Kostas Michalopoulos, Michail Tsakalakis, Nikolaos G. Bourbakis:
Detecting texture paths and patterns in aerial images. 1-5 - Fivos Andritsos:
Port security & access control: A systemic approach. 1-8 - Miltiadis Alamaniotis, Lefteri H. Tsoukalas:
Layered-based approach to virtual storage for smart power systems. 1-6 - Nitesh B. Guinde, Roberto Rojas-Cessa, Sotirios G. Ziavras
:
Packet classification using rule caching. 1-6 - Sofiane Sellah, Olfa Nasraoui
:
Density-based Kernel Scale estimation for Kernel clustering. 1-4 - Radek Holy
, Marek Kalika, Jana Kalikova
:
Multi-application ID card using DESFire EV1. 1-4 - Konstantina Chrysafiadi, Maria Virvou
:
Fuzzy logic for dynamic adaptation: Represent and manage changeable user states. 1-6 - Maria Virvou
, Spyros Papadimitriou
:
Learning addition by playing an adaptive game with coins. 1-4 - Miltiadis Alamaniotis
, Hermilo Hernandez, Tatjana Jevremovic:
Application of support vector regression in removing Poisson fluctuation from pulse height gamma-ray spectra. 1-4 - Jeanelle E. Abanto, Charmailene C. Reyes, Jasmine A. Malinao
, Henry N. Adorna:
Traffic incident detection and modelling using Quantum Frequency Algorithm and AutoRegressive Integrated Moving Average models. 1-6 - Dimitris Gritzalis, Yannis Soupionis, Vasilios Katos
, Ioannis Psaroudakis, Panajotis Katsaros
, Anakreon Mentis:
The Sphinx enigma in critical VoIP infrastructures: Human or botnet? 1-6 - Dimitrios Moustis, Panayiotis Kotzanikolaou
:
Evaluating security controls against HTTP-based DDoS attacks. 1-6 - Eleni Darra, Sokratis K. Katsikas
:
Attack detection capabilities of intrusion detection systems for Wireless Sensor Networks. 1-7 - Stamatios Theocharis, George A. Tsihrintzis:
Open data for e-government the Greek case. 1-6 - Demosthenes Akoumianakis
, Giorgos Ktistakis, Giannis Milolidakis, Konstantinos Michailidis:
Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services. 1-7 - Danielle Anne F. Ayag, Ricardo C. Bautista, Maria Azriel Therese D. Eala, Rommel P. Feria
:
Acceptability of Hear-O as a mobile hearing screening tool. 1-6 - Ester Ciancamerla, Michele Minichino, S. Palmieri:
Modeling cyber attacks on a critical infrastructure scenario. 1-6 - Mike Burmester:
A trusted computing architecture for critical infrastructure protection. 1-6 - Yiannis Kokkinos, Konstantinos G. Margaritis
:
Distributed privacy-preserving P2P data mining via probabilistic neural network committee machines. 1-4 - Adamantia Psarologou, Maria Virvou
, Nikolaos G. Bourbakis:
A NLU-based method for a first level automatic categorization of AI-based security documents. 1-7 - Christos Troussas, Maria Virvou
, Jaime D. L. Caro
, Kurt Junshean Espinosa:
Evaluation of a language learning application in Facebook. 1-6 - Anna Trikalinou, Nikolaos G. Bourbakis:
A synergistic security method for control-flow hijacking detection using SPNs. 1-5 - Evangelos Theodoridis, Georgios Mylonas
, Ioannis Chatzigiannakis
:
Developing an IoT Smart City framework. 1-6 - Soufiene Ben Othman, Hani Alzaid, Abdelbasset Trad
, Habib Youssef:
An efficient secure data aggregation scheme for wireless sensor networks. 1-4 - Sam Ferguson, Emery Schubert
, Doheon Lee
, Densil Cabrera
, Gary E. McPherson
:
A comparison between continuous categorical emotion responses and Stimulus loudness parameters. 1-6 - Markku Kylänpää
, Aarne Rantala, Janne Merilinna, Mikko Nieminen:
Secure communication platform for distributed city-wide surveillance systems. 1-4 - Vladislav Martinek, Michal Zemlicka
:
Passenger path plan reliability improvement proposal. 1-4 - Maria Virvou
, Sotirios-Christos Sidiropoulos:
An Intelligent Tutoring System over a social network for mathematics learning. 1-4 - Anastasia Balia, Dimitrios Koukopoulos:
A secure collaborative multimedia learning scheme in cultural environments. 1-5 - Binbin Wang, Xinjie Hao, Lisheng Chen, Jingmin Cui, Yunqi Lei:
Face recognition based on the feature fusion of 2DLDA and LBP. 1-6 - Thomas Chatzidimitris, Evangelia Kavakli, Maria Economou
, Damianos Gavalas
:
Mobile Augmented Reality edutainment applications for cultural institutions. 1-4 - Christos Troussas, Maria Virvou
, Anna Vougiouklidou, Kurt Junshean Espinosa:
Automatic misconception diagnosis in multiple language learning over social networks. 1-6 - Christos Troussas, Maria Virvou
, Efthymios Alepis:
Multiple parameter cluster analysis in a multiple language learning system. 1-6 - Spiridon Mousouris
, Georgios D. Styliaras
:
On the creation of a Digital Cultural Heritage Map. 1-6 - Despoina Polemi, Theodoros Ntouskas, Emmanouil Georgakakis, Christos Douligeris, Marianthi Theoharidou
, Dimitris Gritzalis:
S-Port: Collaborative security management of Port Information systems. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.