


default search action
2. NDT 2010: Prague, Czech Republic
- Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmeh:

Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I. Communications in Computer and Information Science 87, Springer 2010, ISBN 978-3-642-14291-8
Part 1 / Information and Data Management
- Fatih Basçiftçi

, Celal Karaca
:
A New Approach for Fingerprint Matching Using Logic Synthesis. 1-6 - Sang-Hong Lee, Joon S. Lim, Dong-Kun Shin:

Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions. 7-14 - Milan Simunek, Teppo Tammisto:

Distributed Data-Mining in the LISp-Miner System Using Techila Grid. 15-20 - Jan Platos

, Petr Gajdos
, Pavel Krömer
, Václav Snásel:
Non-negative Matrix Factorization on GPU. 21-30 - Abbas Saliimi Lokman

, Jasni Mohamad Zain
:
Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language. 31-44 - Salima Nebti, Abdellah Boukerram:

Handwritten Digits Recognition Based on Swarm Optimization Methods. 45-54 - Wan Maseri Binti Wan Mohd, Abdullah Embong, Jasni Mohamad Zain

:
A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique. 55-69 - I-En Liao, Wen-Chiao Hsu, Yu-Lin Chen:

An Efficient Indexing and Compressing Scheme for XML Query Processing. 70-84 - Eyas El-Qawasmeh, Ahmed Mansour, Mohammad Al-Towiq:

Development of a New Compression Scheme. 85-90 - Bruno Carpentieri

:
Compression of Layered Documents. 91-97 - Christin Seifert

, Vedran Sabol, Michael Granitzer
:
Classifier Hypothesis Generation Using Visual Analysis Methods. 98-111 - Lokesh Tiwari, Hamid Shahnasser:

Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Manager. 112-119 - Miguel Velasco

, Nenad Jukic:
A Framework for In-House Prediction Markets. 120-127 - Hongwu Qin, Jasni Mohamad Zain

, Xiuqin Ma, Tao Hai
:
Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection. 128-134 - Mehdi Ghazanfari

, Mohammad Fathian, Mostafa Jafari, Saeed Rouhani
:
Process Mining Approach to Promote Business Intelligence in Iranian Detectives' Police. 135-142 - Ali Al-Haj, Ashraf Odeh, Shadi Rasheed Masadeh:

Copyright Protection of Relational Database Systems. 143-150 - Chiw Yi Lee, Hamidah Ibrahim, Mohamed Othman, Razali Yaakob

:
Resolving Semantic Interoperability Challenges in XML Schema Matching. 151-162 - Arsham Borumand Saeid

, Marjan Kuchaki Rafsanjani:
Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras. 163-168
Part 2 / Security
- Adeeb M. Alhomoud:

The Effect of Attentiveness on Information Security. 169-174 - Bossi Masamila, Fredrick Mtenzi

, Said Jafari, Rose Tinabo:
A Secured Mobile Payment Model for Developing Markets. 175-182 - Monia Ben Brahim, Maher Ben Jemaa, Mohamed Jmaiel:

Security Mapping to Enhance Matching Fine-Grained Security Policies. 183-196 - Yoshiyuki Yamashita, Masato Tsuru:

Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor. 197-212 - M. Tolga Sakalli, Bora Aslan, Ercan Bulus

, Andac Sahin Mesut, Fatma Büyüksaraçoglu, Osman Karaahmetoglu:
On the Algebraic Expression of the AES S-Box Like S-Boxes. 213-227 - Marcin Kucharczyk:

Student's Polls for Teaching Quality Evaluation as an Electronic Voting System. 228-233 - Piotr Zawadzki:

An Improved Estimation of the RSA Quantum Breaking Success Rate. 234-240 - Seyed Morteza Babamir

, Reyhane Nowrouzi, Hadi Naseri
:
Mining Bluetooth Attacks in Smart Phones. 241-253 - Fahad Al-Harby, Rami Qahwaji

, Mumtaz M. Kamala:
Users' Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model. 254-258 - Jaroslav Janácek:

Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism. 259-272 - Chih-Hung Wang, Po-Chin Lee:

A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks. 273-287 - Ahmed B. Elmadani:

Human Authentication Using FingerIris Algorithm Based on Statistical Approach. 288-296 - M. Anwar-ul-Haq, Asad Waqar Malik

, Shoab Ahmed Khan:
Aerial Threat Perception Architecture Using Data Mining. 297-305 - Raoof Smko, Abdelsalam Almarimi, K. Negrat:

Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography. 306-313 - Hai Tao

, Jasni Mohamad Zain
, Ahmed N. Abd Alla
, Hongwu Qin:
An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization. 314-320 - Abdelwadood Mesleh, Bilal Zahran

, Anwar Al-Abadi, Samer Hamed
, Nawal Al-Zabin, Heba Bargouthi, Iman Maharmeh:
Genetic Cryptanalysis. 321-332 - Shahidan M. Abdullah

, Azizah A. Manaf:
Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques. 333-342 - Laid Kahloul

, Allaoua Chaoui
, Karim Djouani
:
Modeling and Analysis of Reconfigurable Systems Using Flexible Nets. 343-357 - Jong P. Yoon, Zhixiong Chen:

Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing. 358-368
Part 3 / Social Networks
- Lenuta Alboaie, Mircea-Florin Vaida:

Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities. 369-382 - Yuan-Chu Hwang:

A Collaborative Social Decision Model for Digital Content Credibility Improvement. 383-390 - Francesco Buccafurri

, Gianluca Lax
:
Improving Similarity-Based Methods for Information Propagation on Social Networks. 391-401 - Anna Rohunen, Jouni Markkula:

Approaches to Privacy Protection in Location-Based Services. 402-409 - Elina Annanperä, Jouni Markkula:

Social Media as Means for Company Communication and Service Design. 410-419 - Thierry Condamines:

A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems. 420-429 - Giorgos Kormaris, Marco R. Spruit

:
Bridging the Gap between Web 2.0 Technologies and Social Computing Principles. 430-443
Part 4 / Ontology
- Axel Tenschert:

Using Similarity Values for Ontology Matching in the Grid. 444-450 - Andrzej Uszok

, Jeffrey M. Bradshaw
, Thomas C. Eskridge
, James Hanna:
Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework. 451-466 - Ching-I Cheng, Damon Shing-Min Liu, Li-Ting Chen:

Incorporating Semantics into an Intelligent Clothes Search System Using Ontology. 467-472 - Younes Djaghloul, Zizette Boufaïda:

SPPODL: Semantic Peer Profile Based on Ontology and Description Logic. 473-488 - Miroslav Vacura, Vojtech Svátek:

Ontology Based Tracking and Propagation of Provenance Metadata. 489-496
Part 5 / Real Time Biometric Solutions for Networked Society
- Javier Guerra Casanova, Carmen Sánchez Ávila

, Alberto de Santos Sierra, Gonzalo Bailador del Pozo, Vicente Jara Vera:
A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer. 497-503 - Isao Nakanishi, Chisei Miyamoto:

On-Demand Biometric Authentication of Computer Users Using Brain Waves. 504-514 - Bian Yang, Davrondzhon Gafurov, Christoph Busch, Patrick Bours:

Encrypting Fingerprint Minutiae Templates by Random Quantization. 515-522
Part 6 / Web Applications
- Takahiro Hatanaka, Hiroyuki Hisamatsu:

Method for Countering Social Bookmarking Pollution Using User Similarities. 523-528 - Balazs Simon, Balázs Goldschmidt:

A Human Readable Platform Independent Domain Specific Language for WSDL. 529-536 - Balazs Simon, Balázs Goldschmidt, Károly Kondorosi:

A Human Readable Platform Independent Domain Specific Language for BPEL. 537-544 - Tatiana Annoni Pazeto, Renato Moraes Silva

, Shusaburo Motoyama:
Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler. 545-555 - Saleh Alwahaishi

, Václav Snásel:
Assessing the LCC Websites Quality. 556-565 - Roslina Mohd Sidek, Noraziah Ahmad

, Mohammad Fadel Jamil Klaib, Mohd Helmy Abd Wahab
:
Expediency Heuristic in University Conference Webpage. 566-576

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














