IBSC System for Victims Management in Emergency Scenarios
暂无分享,去创建一个
Alexandra Rivero-García | Iván Santos-González | Candelaria Hernández-Goya | Pino Caballero-Gil | Iván Santos-González | P. Caballero-Gil | C. Hernández-Goya | Alexandra Rivero-García
[1] Yu-Wei Su,et al. A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi , 2007, IECON 2007 - 33rd Annual Conference of the IEEE Industrial Electronics Society.
[2] Lirong Zheng,et al. Radio frequency identification enabled wireless sensing for intelligent food logistics , 2014, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[3] Leena Jain,et al. Traveling Salesman Problem: A Case Study , 2012, BIOINFORMATICS 2012.
[4] Mojtaba Alizadeh,et al. Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..
[5] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[6] Robert W. Knox. Marcq Saint-Hilaire Without Tears , 2015 .
[7] Michael R. Cohen,et al. Practical guide to bar coding for patient medication safety. , 2003, American journal of health-system pharmacy : AJHP : official journal of the American Society of Health-System Pharmacists.
[8] Majid Sarrafzadeh,et al. The Advanced Health and Disaster Aid Network: A Light-Weight Wireless Medical System for Triage , 2007, IEEE Transactions on Biomedical Circuits and Systems.
[9] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution , 2009 .
[10] P. Caballero Gil,et al. Alternative communication system for emergency situations , 2014 .
[11] Sébastien Le Digabel,et al. Computational study of valid inequalities for the maximum k-cut problem , 2016, Ann. Oper. Res..
[12] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[13] Roy Want,et al. Near field communication , 2011, IEEE Pervasive Computing.
[14] P. Hespanha,et al. An Efficient MATLAB Algorithm for Graph Partitioning , 2006 .
[15] D. N. Mudaliar,et al. Unraveling Travelling Salesman Problem by genetic algorithm using m-crossover operator , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.
[16] Delaunay Triangulations,et al. Delaunay Triangulations , 2009 .
[17] Nigel P. Smart. Hash Functions, Message Authentication Codes and Key Derivation Functions , 2016 .
[18] Maxim Sviridenko,et al. An Approximation Algorithm for Hypergraph Max k-Cut with Given Sizes of Parts , 1999 .
[19] Alexandra Rivero-García,et al. FastTriaje: A Mobile System for Victim Classification in Emergency Situations , 2014, WEBIST.