The Resource Networked digital technologies : 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II, Rachid Benlamri (eds.), (electronic resource)

Networked digital technologies : 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II, Rachid Benlamri (eds.), (electronic resource)

Label
Networked digital technologies : 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II
Title
Networked digital technologies
Title remainder
4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings
Title number
Part II
Statement of responsibility
Rachid Benlamri (eds.)
Title variation
NDT 2012
Creator
Contributor
Provider
Subject
Genre
Language
eng
Summary
This two-volume-set (CCIS 293 and CCIS 294) constitutes the refereed proceedings of the International Conference on Networked Digital Technologies, NDT 2012, held in Dubai, UAE, in April 2012. The 96 papers presented in the two volumes were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on collaborative systems for e-sciences; context-aware processing and ubiquitous systems; data and network mining; grid and cloud computing; information and data management; intelligent agent-based systems; internet modeling and design; mobile, ad hoc and sensor network management; peer-to-peer social networks; quality of service for networked systems; semantic Web and ontologies; security and access control; signal processing and computer vision for networked systems; social networks; Web services
Member of
Cataloging source
GW5XE
Image bit depth
0
LC call number
TK5105.5
LC item number
.I58 2012
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
International Conference on Networked Digital Technologies
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • SpringerLink
  • Benlamri, Rachid
Series statement
Communications in Computer and Information Science,
Series volume
294
http://library.link/vocab/subjectName
  • Information networks
  • Internet
  • Information networks
  • Internet
  • Informatique
Label
Networked digital technologies : 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II, Rachid Benlamri (eds.), (electronic resource)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • pt. 1.
  • Peer-to-Peer Social Networks.
  • Efficient Research in Community Semantic Overlay Networks
  • Gilles Nachouki and Mohamed Quafafou
  • Modeling Push-Based Live P2P Streaming by Stochastic Activity Networks
  • Peiqing Zhang and Bjarne E. Helvik
  • Viral Message Passing Framework for Crowd and Sensor Applications
  • Eiman Kanjo, Elizabeth Platzer and Christian Kittl
  • pt. 2.
  • Quality of Service for Networked Systems.
  • Practical Analysis of xDR Based Signaling Network Performance and End-to-End QoS
  • Nermina Basic, Vlatko Lipovac and Adriana Lipovac
  • Validating Applicability of Smart-M3 Platform for a Multi-vendor Micropayment System in the Context of Small Business
  • Anna Rohunen, Matti Eteläperä, Kari Liukkunen, Kai Wen Chan and Tero Tulppo
  • Interlinking Scientific Authors with the LOD Cloud: A Case Study
  • Atif Latif, Patrick Hoefler and Klaus Tochtermann
  • Multi-Viewpoints Ontology Alignment Based on Description Logics
  • Lynda Djakhdjakha, Mounir Hemam and Zizette Boufaida
  • Ontology-Based Database Multi-representation Using Viewpoints and Views
  • Chahinez Bachtarzi and Fouzia Benchikha
  • Well-Founded IT Architecture Ontology: An Approach from a Service Continuity Perspective
  • Hedwio Carvalho e Silva, Rita de Cassia Cordeiro de Castro, Marcos Jose Negreiros Gomes and Anilton Salles Garcia
  • pt. 3.
  • Semantic Web and Ontologies.
  • A Metamodeling and Transformation Approach for Knowledge Extraction
  • Inaya Lahoud, Davy Monticolo, Vincent Hilaire and Samuel Gomes
  • An SQA e-Learning System for Agile Software Development
  • Nada Bajnaid, Rachid Benlamri and Boris Cogan
  • Context-Driven and Service Oriented Semantic Mediation in DaaS Composition
  • Idir Amine Amarouche, Karim Benouaret, Djamal Benslimane, Zaia Alimazighi and Michael Mrissa
  • Cloud-Ready Biometric System for Mobile Security Access
  • F. Omri, R. Hamila, S. Foufou and M. Jarraya
  • Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network
  • Abdul Razaque and Khaled Elleithy
  • Digital Image Steganography: An FFT Approach
  • Tamer Rabie
  • Evaluation of Acceleration Algorithm for Biometric Identification
  • Serina Egawa, Ali Ismail Awad and Kensuke Baba
  • High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function
  • El-Sayed M. El-Alfy and Azzat A. Al-Sadi
  • pt. 4.
  • Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines
  • El-Sayed M. El-Alfy and Galal M. BinMakhashen
  • Leveraging Cognitive Principles to Improve Security Visualization
  • Matthew Dunlop, William Urbanski, Randy Marchany and Joseph Tront
  • LPC-Based Narrowband Speech Steganography
  • Driss Guerchi and Emad Eldin Mohamed
  • Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks
  • Alessio Di Mauro, Davide Papini, Roberto Vigo and Nicola Dragoni
  • Security and Access Control.
  • A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network
  • Djallel Eddine Boubiche, Azeddine Bilami and Samir Athmani
  • Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework
  • Ghazi Ben Ayed and Solange Ghernaouti-Hélie
  • Bypassing Workflow Satisfiability Problem Due to Access Control Constraints
  • Hanan El Bakkali
  • Mobile Authentication Using Iris Biometrics
  • M. Gargi, J. Jasmine Sylvia Rani, Madhu Ramiah, N. T. Naresh Babu and A. Annis Fathima, et al.
  • Nonlinear-Based Human Activity Recognition Using the Kernel Technique
  • A. Diaf, R. Benlamri and B. Boufama
  • Object Detection and Tracking in Secured Area with Wireless and Multimedia Sensor Network
  • S. Vasuhi, A. Annis Fathima, S. Anand Shanmugam and V. Vaidehi
  • Performance Comparison of Video Compression and Streaming over Wireless Ad Hoc and Sensor Networks Using MPEG-4 and H.264
  • M. Akhlaq and Tarek R. Sheltami
  • Threshold-Based Cross Layer Design for Video Streaming over Lossy Channels
  • Yakubu S. Baguda, Norsheila Fisal, Rozeha A. Rashid, Sharifah K. Yusof and Sharifah H. Syed
  • pt. 5.
  • Viewpoint Invariant Face Detection
  • Mokhtar Taffar, Serge Miguet and Mohammed Benmohammed
  • Signal Processing and Computer Vision for Networked Systems.
  • A New Algorithm for Watermarking Colour Images Using the Green Channel
  • Kamal A. Ahmed, Hussain Al-Ahmad and Patrick Gaydecki
  • A New Approach to Learning System in Cognitive Radio Based on Elman Networks
  • Naveed Ahmed
  • Improvement of Spotting Words Speech Recognition Agent for Tele-Operating a Manipulator Arm
  • Mohamed Fezari, Ibrahiem El-Emary, Mohamed Serghir Boumaz and Hamza Attoui
  • Exploiting Title-Keywords Relation to Develop Concept Classifier for Scientific Community
  • Sher Afgun Khan, Muhammad Tanvir Afzal and Muhammad Abdul Qadir
  • FLMin: An Approach for Mining Frequent Links in Social Networks
  • Erick Stattner and Martine Collard
  • Recursive Incentives with Guided Recruiting Encouragement
  • Nawfal A. Mehdi
  • Sensor-Cloud Computing: Novel Applications and Research Problems
  • Yu-Hsn Liu, Kok-Leong Ong and Andrzej Goscinski
  • The Use of Mobile Technology for Citizen E-Participation
  • Duaa Sinnari and Hana Al-Nuaim
  • pt. 6.
  • Social Networks.
  • A Formal Framework and a Tool to Process and Simulate Labelled Reconfigurable Nets Models Based on Graph Transformation
  • Nardjes Dehimi, Raida Elmansouri and Allaoua Chaoui
  • Quality Adapting of Role-Based Interactive Applications
  • Soufiane Boulehouache, Remdane Maamri and Zaidi Sahnoun
  • Digital Social Literacy: Literacy Demands for the Virtual-World
  • Toshihiko Yamakami
  • pt. 7.
  • Web Services.
  • A Dynamic Web Service and Business Process Logic Composition and Consistency
  • Samir Elmougy
  • Composing Web Services Using Profiles Similarity
  • Ouahrani Atika and Belkhir Abedelkader
  • UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented Workflows
  • Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Dimensions
unknown
Extent
1 online resource.
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642305672
Level of compression
uncompressed
Other control number
10.1007/978-3-642-30567-2
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)813838367
  • (OCoLC)ocn813838367
Label
Networked digital technologies : 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II, Rachid Benlamri (eds.), (electronic resource)
Publication
Note
International conference proceedings
Antecedent source
mixed
Bibliography note
Includes bibliographical references and author index
Color
not applicable
Contents
  • pt. 1.
  • Peer-to-Peer Social Networks.
  • Efficient Research in Community Semantic Overlay Networks
  • Gilles Nachouki and Mohamed Quafafou
  • Modeling Push-Based Live P2P Streaming by Stochastic Activity Networks
  • Peiqing Zhang and Bjarne E. Helvik
  • Viral Message Passing Framework for Crowd and Sensor Applications
  • Eiman Kanjo, Elizabeth Platzer and Christian Kittl
  • pt. 2.
  • Quality of Service for Networked Systems.
  • Practical Analysis of xDR Based Signaling Network Performance and End-to-End QoS
  • Nermina Basic, Vlatko Lipovac and Adriana Lipovac
  • Validating Applicability of Smart-M3 Platform for a Multi-vendor Micropayment System in the Context of Small Business
  • Anna Rohunen, Matti Eteläperä, Kari Liukkunen, Kai Wen Chan and Tero Tulppo
  • Interlinking Scientific Authors with the LOD Cloud: A Case Study
  • Atif Latif, Patrick Hoefler and Klaus Tochtermann
  • Multi-Viewpoints Ontology Alignment Based on Description Logics
  • Lynda Djakhdjakha, Mounir Hemam and Zizette Boufaida
  • Ontology-Based Database Multi-representation Using Viewpoints and Views
  • Chahinez Bachtarzi and Fouzia Benchikha
  • Well-Founded IT Architecture Ontology: An Approach from a Service Continuity Perspective
  • Hedwio Carvalho e Silva, Rita de Cassia Cordeiro de Castro, Marcos Jose Negreiros Gomes and Anilton Salles Garcia
  • pt. 3.
  • Semantic Web and Ontologies.
  • A Metamodeling and Transformation Approach for Knowledge Extraction
  • Inaya Lahoud, Davy Monticolo, Vincent Hilaire and Samuel Gomes
  • An SQA e-Learning System for Agile Software Development
  • Nada Bajnaid, Rachid Benlamri and Boris Cogan
  • Context-Driven and Service Oriented Semantic Mediation in DaaS Composition
  • Idir Amine Amarouche, Karim Benouaret, Djamal Benslimane, Zaia Alimazighi and Michael Mrissa
  • Cloud-Ready Biometric System for Mobile Security Access
  • F. Omri, R. Hamila, S. Foufou and M. Jarraya
  • Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network
  • Abdul Razaque and Khaled Elleithy
  • Digital Image Steganography: An FFT Approach
  • Tamer Rabie
  • Evaluation of Acceleration Algorithm for Biometric Identification
  • Serina Egawa, Ali Ismail Awad and Kensuke Baba
  • High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function
  • El-Sayed M. El-Alfy and Azzat A. Al-Sadi
  • pt. 4.
  • Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines
  • El-Sayed M. El-Alfy and Galal M. BinMakhashen
  • Leveraging Cognitive Principles to Improve Security Visualization
  • Matthew Dunlop, William Urbanski, Randy Marchany and Joseph Tront
  • LPC-Based Narrowband Speech Steganography
  • Driss Guerchi and Emad Eldin Mohamed
  • Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks
  • Alessio Di Mauro, Davide Papini, Roberto Vigo and Nicola Dragoni
  • Security and Access Control.
  • A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network
  • Djallel Eddine Boubiche, Azeddine Bilami and Samir Athmani
  • Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework
  • Ghazi Ben Ayed and Solange Ghernaouti-Hélie
  • Bypassing Workflow Satisfiability Problem Due to Access Control Constraints
  • Hanan El Bakkali
  • Mobile Authentication Using Iris Biometrics
  • M. Gargi, J. Jasmine Sylvia Rani, Madhu Ramiah, N. T. Naresh Babu and A. Annis Fathima, et al.
  • Nonlinear-Based Human Activity Recognition Using the Kernel Technique
  • A. Diaf, R. Benlamri and B. Boufama
  • Object Detection and Tracking in Secured Area with Wireless and Multimedia Sensor Network
  • S. Vasuhi, A. Annis Fathima, S. Anand Shanmugam and V. Vaidehi
  • Performance Comparison of Video Compression and Streaming over Wireless Ad Hoc and Sensor Networks Using MPEG-4 and H.264
  • M. Akhlaq and Tarek R. Sheltami
  • Threshold-Based Cross Layer Design for Video Streaming over Lossy Channels
  • Yakubu S. Baguda, Norsheila Fisal, Rozeha A. Rashid, Sharifah K. Yusof and Sharifah H. Syed
  • pt. 5.
  • Viewpoint Invariant Face Detection
  • Mokhtar Taffar, Serge Miguet and Mohammed Benmohammed
  • Signal Processing and Computer Vision for Networked Systems.
  • A New Algorithm for Watermarking Colour Images Using the Green Channel
  • Kamal A. Ahmed, Hussain Al-Ahmad and Patrick Gaydecki
  • A New Approach to Learning System in Cognitive Radio Based on Elman Networks
  • Naveed Ahmed
  • Improvement of Spotting Words Speech Recognition Agent for Tele-Operating a Manipulator Arm
  • Mohamed Fezari, Ibrahiem El-Emary, Mohamed Serghir Boumaz and Hamza Attoui
  • Exploiting Title-Keywords Relation to Develop Concept Classifier for Scientific Community
  • Sher Afgun Khan, Muhammad Tanvir Afzal and Muhammad Abdul Qadir
  • FLMin: An Approach for Mining Frequent Links in Social Networks
  • Erick Stattner and Martine Collard
  • Recursive Incentives with Guided Recruiting Encouragement
  • Nawfal A. Mehdi
  • Sensor-Cloud Computing: Novel Applications and Research Problems
  • Yu-Hsn Liu, Kok-Leong Ong and Andrzej Goscinski
  • The Use of Mobile Technology for Citizen E-Participation
  • Duaa Sinnari and Hana Al-Nuaim
  • pt. 6.
  • Social Networks.
  • A Formal Framework and a Tool to Process and Simulate Labelled Reconfigurable Nets Models Based on Graph Transformation
  • Nardjes Dehimi, Raida Elmansouri and Allaoua Chaoui
  • Quality Adapting of Role-Based Interactive Applications
  • Soufiane Boulehouache, Remdane Maamri and Zaidi Sahnoun
  • Digital Social Literacy: Literacy Demands for the Virtual-World
  • Toshihiko Yamakami
  • pt. 7.
  • Web Services.
  • A Dynamic Web Service and Business Process Logic Composition and Consistency
  • Samir Elmougy
  • Composing Web Services Using Profiles Similarity
  • Ouahrani Atika and Belkhir Abedelkader
  • UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented Workflows
  • Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Dimensions
unknown
Extent
1 online resource.
File format
multiple file formats
Form of item
  • online
  • electronic
Isbn
9783642305672
Level of compression
uncompressed
Other control number
10.1007/978-3-642-30567-2
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (OCoLC)813838367
  • (OCoLC)ocn813838367

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...