


default search action
4. NDT 2012: Dubai, UAE
- Rachid Benlamri:

Networked Digital Technologies - 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II. Communications in Computer and Information Science 294, Springer 2012, ISBN 978-3-642-30566-5
Peer-to-Peer Social Networks
- Gilles Nachouki, Mohamed Quafafou:

Efficient Research in Community Semantic Overlay Networks. 1-11 - Peiqing Zhang, Bjarne E. Helvik

:
Modeling Push-Based Live P2P Streaming by Stochastic Activity Networks. 12-23 - Eiman Kanjo

, Elisabeth Platzer, Christian Kittl:
Viral Message Passing Framework for Crowd and Sensor Applications. 24-33
Quality of Service for Networked Systems
- Nermina Basic, Vlatko Lipovac

, Adriana Lipovac
:
Practical Analysis of xDR Based Signaling Network Performance and End-to-End QoS. 34-45 - Anna Rohunen, Matti Eteläperä, Kari Liukkunen, Kai Wen Chan, Tero Tulppo:

Validating Applicability of Smart-M3 Platform for a Multi-vendor Micropayment System in the Context of Small Business. 46-53
Semantic Web and Ontologies
- Lynda Djakhdjakha

, Mounir Hemam
, Zizette Boufaïda:
Multi-Viewpoints Ontology Alignment Based on Description Logics. 109-122 - Chahinez Bachtarzi, Fouzia Benchikha:

Ontology-Based Database Multi-representation Using Viewpoints and Views. 123-135 - Hedwio Carvalho e Silva, Rita de Cassia Cordeiro de Castro, Marcos José Negreiros Gomes, Anilton Salles Garcia:

Well-Founded IT Architecture Ontology: An Approach from a Service Continuity Perspective. 136-150 - Inaya Lahoud

, Davy Monticolo, Vincent Hilaire, Samuel Gomes:
A Metamodeling and Transformation Approach for Knowledge Extraction. 54-68 - Nada Bajnaid, Rachid Benlamri, Boris I. Cogan:

An SQA e-Learning System for Agile Software Development. 69-83 - Idir Amine Amarouche, Karim Benouaret, Djamal Benslimane, Zaia Alimazighi, Michael Mrissa

:
Context-Driven and Service Oriented Semantic Mediation in DaaS Composition. 84-98 - Atif Latif, Patrick Höfler

, Klaus Tochtermann:
Interlinking Scientific Authors with the LOD Cloud: A Case Study. 99-108
Security and Access Control
- Djallel Eddine Boubiche

, Azeddine Bilami
, Samir Athmani:
A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network. 151-164 - Ghazi Ben Ayed, Solange Ghernaouti-Helie:

Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework. 165-177 - Hanan El Bakkali:

Bypassing Workflow Satisfiability Problem Due to Access Control Constraints. 178-191 - Faten Omri, Ridha Hamila, Sebti Foufou

, Mohamed Jarraya:
Cloud-Ready Biometric System for Mobile Security Access. 192-200 - Abdul Razaque

, Khaled M. Elleithy
:
Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network. 201-216 - Tamer Rabie:

Digital Image Steganography: An FFT Approach. 217-230 - Serina Egawa, Ali Ismail Awad

, Kensuke Baba
:
Evaluation of Acceleration Algorithm for Biometric Identification. 231-242 - El-Sayed M. El-Alfy

, Azzat A. Al-Sadi:
High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function. 243-252 - El-Sayed M. El-Alfy

, Galal M. BinMakhashen
:
Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines. 253-261 - Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront:

Leveraging Cognitive Principles to Improve Security Visualization. 262-276 - Driss Guerchi, Emad Eldin Mohamed

:
LPC-Based Narrowband Speech Steganography. 277-288 - Alessio Di Mauro, Davide Papini, Roberto Vigo, Nicola Dragoni

:
Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. 289-301
Signal Processing and Computer Vision for Networked Systems
- Kamal A. Ahmed, Hussain Al-Ahmad

, Patrick Gaydecki
:
A New Algorithm for Watermarking Colour Images Using the Green Channel. 302-311 - Naveed Ahmed:

A New Approach to Learning System in Cognitive Radio Based on Elman Networks. 312-320 - Mohamed Fezari

, Ibrahiem M. M. El Emary, Mohamed Serghir Boumaz, Hamza Attoui:
Improvement of Spotting Words Speech Recognition Agent for Tele-Operating a Manipulator Arm. 321-331 - M. Gargi, J. Jasmine Sylvia Rani, Madhu Ramiah, N. T. Naresh Babu, A. Annis Fathima, Vijay Vaidehi:

Mobile Authentication Using Iris Biometrics. 332-341 - Abdunnaser Diaf, Rachid Benlamri, Boubakeur Boufama:

Nonlinear-Based Human Activity Recognition Using the Kernel Technique. 342-355 - S. Vasuhi, A. Annis Fathima, S. Anand Shanmugam, Vijay Vaidehi:

Object Detection and Tracking in Secured Area with Wireless and Multimedia Sensor Network. 356-367 - Muhammad Akhlaq

, Tarek R. Sheltami
:
Performance Comparison of Video Compression and Streaming over Wireless Ad Hoc and Sensor Networks Using MPEG-4 and H.264. 368-377 - Yakubu Suleiman Baguda, Norsheila Fisal, Rozeha A. Rashid

, Sharifah Kamilah Syed Yusof
, Sharifah Hafiza Syed
:
Threshold-Based Cross Layer Design for Video Streaming over Lossy Channels. 378-389 - Mokhtar Taffar

, Serge Miguet
, Mohamed Benmohammed:
Viewpoint Invariant Face Detection. 390-402
Social Networks
- Nardjes Dehimi

, Raida Elmansouri, Allaoua Chaoui
:
A Formal Framework and a Tool to Process and Simulate Labelled Reconfigurable Nets Models Based on Graph Transformation. 403-414 - Soufiane Boulehouache, Ramdane Maamri, Zaïdi Sahnoun:

Quality Adapting of Role-Based Interactive Applications. 415-428 - Toshihiko Yamakami:

Digital Social Literacy: Literacy Demands for the Virtual-World. 429-437 - Sher Afgun Khan, Muhammad Tanvir Afzal

, Muhammad Abdul Qadir
:
Exploiting Title-Keywords Relation to Develop Concept Classifier for Scientific Community. 438-448 - Erick Stattner, Martine Collard:

FLMin: An Approach for Mining Frequent Links in Social Networks. 449-463 - Nawfal A. Mehdi:

Recursive Incentives with Guided Recruiting Encouragement. 464-474 - Yu-Hsn Liu, Kok-Leong Ong, Andrzej Goscinski:

Sensor-Cloud Computing: Novel Applications and Research Problems. 475-486 - Duaa Sinnari

, Hana Abdullah Al-Nuaim:
The Use of Mobile Technology for Citizen E-Participation. 487-500
Web Services
- Samir Elmougy

:
A Dynamic Web Service and Business Process Logic Composition and Consistency. 501-521 - Ouahrani Atika, Abdelkader Belkhir:

Composing Web Services Using Profiles Similarity. 522-536 - Hayat Bendoukha, Yahya Slimani, Abdelkader Benyettou

:
UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented Workflows. 537-548

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














