default search action
2. NDT 2010: Prague, Czech Republic
- Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmeh:
Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I. Communications in Computer and Information Science 87, Springer 2010, ISBN 978-3-642-14291-8
Part 1 / Information and Data Management
- Fatih Basçiftçi, Celal Karaca:
A New Approach for Fingerprint Matching Using Logic Synthesis. 1-6 - Sang-Hong Lee, Joon S. Lim, Dong-Kun Shin:
Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions. 7-14 - Milan Simunek, Teppo Tammisto:
Distributed Data-Mining in the LISp-Miner System Using Techila Grid. 15-20 - Jan Platos, Petr Gajdos, Pavel Krömer, Václav Snásel:
Non-negative Matrix Factorization on GPU. 21-30 - Abbas Saliimi Lokman, Jasni Mohamad Zain:
Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language. 31-44 - Salima Nebti, Abdellah Boukerram:
Handwritten Digits Recognition Based on Swarm Optimization Methods. 45-54 - Wan Maseri Binti Wan Mohd, Abdullah Embong, Jasni Mohamad Zain:
A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique. 55-69 - I-En Liao, Wen-Chiao Hsu, Yu-Lin Chen:
An Efficient Indexing and Compressing Scheme for XML Query Processing. 70-84 - Eyas El-Qawasmeh, Ahmed Mansour, Mohammad Al-Towiq:
Development of a New Compression Scheme. 85-90 - Bruno Carpentieri:
Compression of Layered Documents. 91-97 - Christin Seifert, Vedran Sabol, Michael Granitzer:
Classifier Hypothesis Generation Using Visual Analysis Methods. 98-111 - Lokesh Tiwari, Hamid Shahnasser:
Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Manager. 112-119 - Miguel Velasco, Nenad Jukic:
A Framework for In-House Prediction Markets. 120-127 - Hongwu Qin, Jasni Mohamad Zain, Xiuqin Ma, Tao Hai:
Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection. 128-134 - Mehdi Ghazanfari, Mohammad Fathian, Mostafa Jafari, Saeed Rouhani:
Process Mining Approach to Promote Business Intelligence in Iranian Detectives' Police. 135-142 - Ali Al-Haj, Ashraf Odeh, Shadi Rasheed Masadeh:
Copyright Protection of Relational Database Systems. 143-150 - Chiw Yi Lee, Hamidah Ibrahim, Mohamed Othman, Razali Yaakob:
Resolving Semantic Interoperability Challenges in XML Schema Matching. 151-162 - Arsham Borumand Saeid, Marjan Kuchaki Rafsanjani:
Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras. 163-168
Part 2 / Security
- Adeeb M. Alhomoud:
The Effect of Attentiveness on Information Security. 169-174 - Bossi Masamila, Fredrick Mtenzi, Said Jafari, Rose Tinabo:
A Secured Mobile Payment Model for Developing Markets. 175-182 - Monia Ben Brahim, Maher Ben Jemaa, Mohamed Jmaiel:
Security Mapping to Enhance Matching Fine-Grained Security Policies. 183-196 - Yoshiyuki Yamashita, Masato Tsuru:
Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor. 197-212 - M. Tolga Sakalli, Bora Aslan, Ercan Bulus, Andac Sahin Mesut, Fatma Büyüksaraçoglu, Osman Karaahmetoglu:
On the Algebraic Expression of the AES S-Box Like S-Boxes. 213-227 - Marcin Kucharczyk:
Student's Polls for Teaching Quality Evaluation as an Electronic Voting System. 228-233 - Piotr Zawadzki:
An Improved Estimation of the RSA Quantum Breaking Success Rate. 234-240 - Seyed Morteza Babamir, Reyhane Nowrouzi, Hadi Naseri:
Mining Bluetooth Attacks in Smart Phones. 241-253 - Fahad Al-Harby, Rami Qahwaji, Mumtaz M. Kamala:
Users' Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model. 254-258 - Jaroslav Janácek:
Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism. 259-272 - Chih-Hung Wang, Po-Chin Lee:
A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks. 273-287 - Ahmed B. Elmadani:
Human Authentication Using FingerIris Algorithm Based on Statistical Approach. 288-296 - M. Anwar-ul-Haq, Asad Waqar Malik, Shoab Ahmed Khan:
Aerial Threat Perception Architecture Using Data Mining. 297-305 - Raoof Smko, Abdelsalam Almarimi, K. Negrat:
Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography. 306-313 - Hai Tao, Jasni Mohamad Zain, Ahmed N. Abd Alla, Hongwu Qin:
An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization. 314-320 - Abdelwadood Mesleh, Bilal Zahran, Anwar Al-Abadi, Samer Hamed, Nawal Al-Zabin, Heba Bargouthi, Iman Maharmeh:
Genetic Cryptanalysis. 321-332 - Shahidan M. Abdullah, Azizah A. Manaf:
Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques. 333-342 - Laïd Kahloul, Allaoua Chaoui, Karim Djouani:
Modeling and Analysis of Reconfigurable Systems Using Flexible Nets. 343-357 - Jong P. Yoon, Zhixiong Chen:
Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing. 358-368
Part 3 / Social Networks
- Lenuta Alboaie, Mircea-Florin Vaida:
Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities. 369-382 - Yuan-Chu Hwang:
A Collaborative Social Decision Model for Digital Content Credibility Improvement. 383-390 - Francesco Buccafurri, Gianluca Lax:
Improving Similarity-Based Methods for Information Propagation on Social Networks. 391-401 - Anna Rohunen, Jouni Markkula:
Approaches to Privacy Protection in Location-Based Services. 402-409 - Elina Annanperä, Jouni Markkula:
Social Media as Means for Company Communication and Service Design. 410-419 - Thierry Condamines:
A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems. 420-429 - Giorgos Kormaris, Marco R. Spruit:
Bridging the Gap between Web 2.0 Technologies and Social Computing Principles. 430-443
Part 4 / Ontology
- Axel Tenschert:
Using Similarity Values for Ontology Matching in the Grid. 444-450 - Andrzej Uszok, Jeffrey M. Bradshaw, Thomas C. Eskridge, James Hanna:
Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework. 451-466 - Ching-I Cheng, Damon Shing-Min Liu, Li-Ting Chen:
Incorporating Semantics into an Intelligent Clothes Search System Using Ontology. 467-472 - Younes Djaghloul, Zizette Boufaïda:
SPPODL: Semantic Peer Profile Based on Ontology and Description Logic. 473-488 - Miroslav Vacura, Vojtech Svátek:
Ontology Based Tracking and Propagation of Provenance Metadata. 489-496
Part 5 / Real Time Biometric Solutions for Networked Society
- Javier Guerra Casanova, Carmen Sánchez Ávila, Alberto de Santos Sierra, Gonzalo Bailador del Pozo, Vicente Jara Vera:
A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer. 497-503 - Isao Nakanishi, Chisei Miyamoto:
On-Demand Biometric Authentication of Computer Users Using Brain Waves. 504-514 - Bian Yang, Davrondzhon Gafurov, Christoph Busch, Patrick Bours:
Encrypting Fingerprint Minutiae Templates by Random Quantization. 515-522
Part 6 / Web Applications
- Takahiro Hatanaka, Hiroyuki Hisamatsu:
Method for Countering Social Bookmarking Pollution Using User Similarities. 523-528 - Balazs Simon, Balázs Goldschmidt:
A Human Readable Platform Independent Domain Specific Language for WSDL. 529-536 - Balazs Simon, Balázs Goldschmidt, Károly Kondorosi:
A Human Readable Platform Independent Domain Specific Language for BPEL. 537-544 - Tatiana Annoni Pazeto, Renato Moraes Silva, Shusaburo Motoyama:
Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler. 545-555 - Saleh Alwahaishi, Václav Snásel:
Assessing the LCC Websites Quality. 556-565 - Roslina Mohd Sidek, Noraziah Ahmad, Mohammad Fadel Jamil Klaib, Mohd Helmy Abd Wahab:
Expediency Heuristic in University Conference Webpage. 566-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.