Next Article in Journal
Security Property Validation of the Sensor Network Encryption Protocol (SNEP)
Previous Article in Journal
A Reference Point Construction Method Using Mobile Terminals and the Indoor Localization Evaluation in the Centroid Method
Open AccessProject Report

Article Versions Notes

Computers 2015, 4(3), 176-214; https://doi.org/10.3390/computers4030176
Action Date Notes Link
article pdf uploaded. 2 July 2015 13:55 CEST Updated version of record https://www.mdpi.com/2073-431X/4/3/176/pdf
article html file updated 21 August 2015 14:24 CEST Update https://www.mdpi.com/2073-431X/4/3/176/html
article xml file uploaded 14 October 2015 11:14 CEST Update https://www.mdpi.com/2073-431X/4/3/176/xml
article html file updated 14 October 2015 11:14 CEST Update https://www.mdpi.com/2073-431X/4/3/176/html
article html file updated 26 March 2019 05:52 CET Update https://www.mdpi.com/2073-431X/4/3/176/html
article html file updated 6 May 2019 16:32 CEST Update https://www.mdpi.com/2073-431X/4/3/176/html
Back to TopTop