Next Article in Journal
Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures
Next Article in Special Issue
Autonomous Wireless Sensor Networks in an IPM Spatial Decision Support System
Previous Article in Journal
A Novel Dictionary-Driven Mental Spelling Application Based on Code-Modulated Visual Evoked Potentials
Previous Article in Special Issue
Symmetric-Key-Based Security for Multicast Communication in Wireless Sensor Networks
Article Menu
Issue 2 (June) cover image

Export Article

Open AccessArticle
Computers 2019, 8(2), 34;

Notes on Article Versions

Action Date Notes Link
article xml file uploaded 3 May 2019 06:13 CEST Original file -
article pdf uploaded. 3 May 2019 06:13 CEST Version of Record
article xml file uploaded 31 May 2019 12:36 CEST Update -
article xml uploaded. 31 May 2019 12:36 CEST Update
article pdf uploaded. 31 May 2019 12:36 CEST Updated version of record
article html file updated 31 May 2019 12:38 CEST Original file
Computers EISSN 2073-431X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top