![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
2. ICDS 2008: Sainte Luce, Martinique, French Caribbean
- Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France. IEEE Computer Society 2008, ISBN 978-0-7695-3087-1
- Erwin P. Rathgeb, Dirk Hoffstadt:
The E-Mail Honeypot System Concept, Implementation and Field Test Results. 1-6 - Rok Bojanc, Borka Jerman-Blazic:
Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention. 7-14 - Jan Porekar, Aljosa Jerman-Blazic, Tomaz Klobucar
:
Towards Organizational Privacy Patterns. 15-19 - Toshihiko Takemura, Hiroyuki Ebara:
Spam Mail Reduces Economic Effects. 20-24 - Kaveh Fayazbakhsh, Mohammadreza Razzazi:
Coordination of a Multi-commodity Supply Chain with Multiple Members Using Flow Networks. 25-30 - Zhiyong Zhang, Tiejun Lu, Xiaobin Chu, Yamin Zhang:
Design and Implementation Of Embedded Data Acquisition System Based on USB and Flash Multimediacard Memory. 31-34 - Marcella Atzori, Francesco Aymerich, Gianni Fenu
, Simone Surcis:
Analysis of Internet Policies and Civil Rights In Italy, Serbia and Burma-Myanmar: A Technological and Legal Approach. 35-41 - Eva Baaren, Lidwien van de Wijngaert, Erik Huizer:
"Who's Afraid of High Def?" Institutional Factors Influencing HDTV Diffusion in the Netherlands. 42-48 - Radhika Rajagoplan, Runa Sarkar:
Digital Networks and Sustainability: Do We Need the Government? 49-54 - Ahmad Kardan, Hamed Janzadeh:
A Multi-issue Negotiation Mechanism with Interdependent Negotiation Issues. 55-59 - Li-Qing Qiu, Bin Pang:
Analysis of Automated Evaluation for Multi-document Summarization Using Content-Based Similarity. 60-63 - Andranik Tangian:
Monitoring Flexicurity Labour Market Policies in the European Union. 64-69 - John McAuley, James D. Carswell:
Knowledge Management for Disparate Etruscan Cultural Heritage. 70-74 - Kambiz Badie, Maryam Tayefeh Mahmoudi:
View-Point Oriented Manipulation of Concepts: A Matching Perspective. 75-80 - Francis Rousseaux, Kevin Lhoste:
Towards a Collection-Based Knowledge Representation: Application to Geo-political Risks and Crisis Management. 81-87 - Laila Elfangary, Walid Adly Atteya:
Mining Medical Databases Using Proposed Incremental Association Rules Algorithm (PIA). 88-92 - J. Reerink Boulanger, C. Deroussent:
Preliminary Based Service Evaluation for Elderly People and Healthcare Professionals in Residential Home Care Units. 93-101 - Åsa Smedberg:
Enabling Cross-Usage of Public Health Systems - A Holistic Approach to Ask the Expert Systems and Online Communities. 102-106 - Kari Harno, Pekka Ruotsalainen, Pirkko Nykänen, Kyösti Kopra:
Migration from Regional to a National eHealth Network. 107-110 - Ling Chen, Hai Jin, Sheng Di:
A Semantic Double-Buffer Based Approach to Enhance Semantic Web Search. 111-116 - François Bry
, Bernhard Lorenz, Hans Jürgen Ohlbach, Martin Roeder, Marc Weinberger:
The Facility Control Markup Language FCML. 117-122 - Doris Gälle, Christian Kop, Heinrich C. Mayr:
A Uniform Web Service Description Representation for Different Readers. 123-128 - Lasse Berntzen, Evika Karamagioli:
Human Rights in the Context of the Digital Society - Input to an Ongoing Discussion on Regulatory Issues. 129-133 - Jing Du, Fujiang Ao, Xuejun Yang:
MV-FT: Efficient Implementation for Matrix-Vector Multiplication on FT64 Stream Processor. 134-139 - Lucia Vilela Leite Filgueiras, Danilo O. Correa, João S. Oliveira Neto, Renato P. Facis:
X-Gov Planning: How to Apply Cross Media to Government Services. 140-145 - Lamia Hélaoui, Jamel Bel Hadj Tahar, Fethi Choubani:
Multi-source Illumination Approach for Buried Objects Exploration. 146-149 - Thomas Dreibholz
, Erwin P. Rathgeb:
Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive Services. 150-156 - Zhun Cai:
A Password-Based Grid Security Infrastructure. 157-164 - Zhengwei Guo, Xinzheng He, Baocheng Xun:
Security Arguments for a Class of ID-Based Signatures. 165-170 - Xing Zhou, Thomas Dreibholz
, Erwin P. Rathgeb:
A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed Environments. 171-177 - Sheng Wang, Jinshu Su
:
Analysis of Reverse Traffic in Delay-Based Congestion Control. 178-183 - Sheng Wang, Jinshu Su
:
Analysis and Enhancement of Delay-Based Congestion Control. 184-189 - Andrei Alexandru Enescu, Silviu Ciochina, Constantin Paleologu:
Reduced Complexity Decoder for Orthogonal Space-Time Codes When Using QAM Constellations. 190-194
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.