Author of the publication

Tele-Monitoring the Battery of an Electric Vehicle.

, , , and . EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 4 (12): e2 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big Data, Internet of Things and Cloud Convergence - An Architecture for Secure E-Health Applications., , , , , , , and . J. Medical Systems, 39 (11): 141:1-141:8 (2015)Tele-Monitoring the Battery of an Electric Vehicle., , , and . EAI Endorsed Trans. Indust. Netw. & Intellig. Syst., 4 (12): e2 (2018)Cloud-Based platform for enhancing energy consumption awareness and substantiating the adoption of energy efficiency measures within SMEs., , , and . IWCMC, page 1018-1023. IEEE, (2018)Adaptation of Irrigation Systems to Current Climate Changes., , , and . BIS (Workshops), volume 339 of Lecture Notes in Business Information Processing, page 534-549. Springer, (2018)The Use of Expert Systems in Building the Quality Model of a Web-Based Learning Platform., , and . ICWL, volume 7558 of Lecture Notes in Computer Science, page 318-327. Springer, (2012)Android Malware Detection and Crypto-Mining Recognition Methodology with Machine Learning., , , , , and . EUC, page 14-21. IEEE Computer Society, (2018)Analysis of Network Management and Monitoring Using Cloud Computing., , , , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 343-352. Springer, (2015)Rule Based Expert Systems Running over the Cloud., , , , , , and . INCoS, page 495-496. IEEE, (2012)Developing, Provisioning and Controlling Time Critical Applications in Cloud., , , , , , , , and . ESOCC Workshops, volume 824 of Communications in Computer and Information Science, page 169-174. Springer, (2017)Cyber-Attacks - The Impact Over Airports Security and Prevention Modalities., , , , and . WorldCIST (3), volume 747 of Advances in Intelligent Systems and Computing, page 154-162. Springer, (2018)