default search action
3. NDT 2011: Macau, China
- Simon Fong, Pit Pichappan:
Networked Digital Technologies - Third International Conference, NDT 2011, Macau, China, July 11-13, 2011. Proceedings. Communications in Computer and Information Science 136, Springer 2011, ISBN 978-3-642-22184-2
Information Security
- Hao Wang, William Emmanuel Yu:
Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. 1-12 - Khalil Challita, Hikmat Farhat, Joseph Zalaket:
Authentication and Authorization in Web Services. 13-23 - Meghdad Mirabi, Hamidah Ibrahim, Ali Mamat, Nur Izura Udzir:
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating. 24-36 - Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:
An Access Control Model for Supporting XML Document Updating. 37-46 - Daniyal M. Alghazzawi, Trigui Mohamed Salim, Syed Hamid Hasan:
A Secure Proxy Blind Signature Scheme Using ECC. 47-52 - Xin-She Yang, Suash Deb, Simon Fong:
Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications. 53-66
Networks
- Alyssa Marie Dykimching, Jan Aaron Angelo Lee, William Emmanuel Yu:
A Study on the Reliability of Data Transmission of an over the Top Network Protocol on SMS versus UDP/ GPRS (Fragmented). 67-81 - Hassan Barjini, Mohamed Othman, Hamidah Ibrahim:
QuickFlood: An Efficient Search Algorithm for Unstructured Peer-to-Peer Networks. 82-92 - Ladan Momeni, Arshin Rezazadeh, Davood Abednejad:
Improved-XY: A High Performance Wormhole-Switched Routing Algorithm for Irregular 2-D Mesh NoC. 93-104 - Saloua Chettibi, Salim Chikhi:
Routing in Mobile Ad-hoc Networks as a Reinforcement Learning Task. 128-135
Information Management
- Dezhi Wu:
Identifying Usability Issues in Personal Calendar Tools. 136-146 - Saber Benharzallah, Okba Kazar, Guy Caplat:
Adaptive Query Processing for Semantic Interoperable Information Systems. 147-163 - Hossein Tohidi, Hamidah Ibrahim, Masrah Azrifah Azmi Murad:
Statistical Character-Based Syntax Similarity Measurement for Detecting Biomedical Syntax Variations through Named Entity Recognition. 164-178 - Martin Svoboda, Irena Mlýnková:
Correction of Invalid XML Documents with Respect to Single Type Tree Grammars. 179-194 - Kensuke Baba, Masao Mori, Eisuke Ito:
Identification of Scholarly Papers and Authors. 195-202 - Sreedhar Bhukya:
A Social Network Model for Academic Collaboration. 203-211 - Ali Amer Alwan, Hamidah Ibrahim, Tan Chik Yip, Fatimah Sidi, Nur Izura Udzir:
Performance Evaluation of Preference Evaluation Techniques. 212-223 - Nitin Agarwal, Merlyna Lim, Rolf T. Wigand:
Collective Action Theory Meets the Blogosphere: A New Methodology. 224-239
Multimedia
- Yuan-Ko Huang, Lien-Fa Lin:
Evaluating K-Best Site Query on Spatial Objects. 240-250 - Phani Kidambi, Mary Fendley, Sundaram Narayanan:
Performance of Annotation-Based Image Retrieval. 251-268 - Kok-Leong Ong, Vincent C. S. Lee:
Real-Time Detection of Parked Vehicles from Multiple Image Streams. 280-291
E Learning and E Government
- Ronnie Cheung, Hassan B. Kazemian:
An Adaptive Framework for Personalized E-Learning. 292-306 - Dianne Lux Wigand:
Gov 2.0 and Beyond: Using Social Media for Transparency, Participation and Collaboration. 307-318
Web Services/Semantics
- Cihan Aksoy, Vincent Labatut, Chantal Cherifi, Jean François Santucci:
MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation. 319-333 - Gridaphat Sriharee:
Towards Ontology-Based Collaboration Framework Based on Messaging System. 345-356 - Xiuqin Ma, Norrozila Sulaiman, Hongwu Qin:
A QoS and Consumer Personality Considered Services Discovery. 357-363 - Yun Wei Zhao, Chi-Hung Chi, Chen Ding:
User Centric Homogeneity-Based Clustering Approach for Intelligence Computation. 364-372
Data Mining
- Sheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum:
Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data. 383-394 - Muhammad Usman, Russel Pears:
Multi Level Mining of Warehouse Schema. 395-408 - Satoshi Narata, Takao Miura:
On Inserting Bulk Data for Linear Hash Files. 409-422
Cloud Computing
- Seokho Son, Kwang Mong Sim:
A Negotiation Mechanism that Facilitates the Price-Timeslot-QoS Negotiation for Establishing SLAs of Cloud Service Reservation. 432-446
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.