Volume 7, Number 3 (September 2016) BibTex

  • pp. 1-21 (DOI:10.22667/JOWUA.2016.09.31.001)
  • A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data
  • S├ębastien Faye, Nicolas Louveton, Gabriela Gheorghe, and Thomas Engel
  • pp. 22-39 (DOI:10.22667/JOWUA.2016.09.31.022)
  • Real-Time Implementation of Locality Sensitive Hashing Using NI WSN and LabVIEW for
    Outlier Detection in Wireless Sensor Networks
    Subhashree V.K. and Tharini C. 
  • [Abstract]
  • pp. 40-52 (DOI:10.22667/JOWUA.2016.09.31.040)
  • An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks
    Kyeonghwan Lim, Younsik Jeong, Seong-je Cho, Minkyu Park, and Sangchul Han
  • pp. 53-76 (DOI:10.22667/JOWUA.2016.09.31.053)
  • IP based Wireless Sensor Networks: Performance Analysis using Simulations and Experiments
    Sumeet Thombre, Raihan Ul Islam, Karl Andersson, and Mohammad Shahadat Hossain
  • pp. 77-98 (DOI:10.22667/JOWUA.2016.09.31.077)
  • Scalable extensible middleware framework for context-aware mobile applications (SCAMMP)
    Hassan Sbeyti, Mohamad Malli, Khalid Al-Tahat, Ahmad Fadlallah, and Mohamad Youssef

[Return to Archives]