default search action
4. NDT 2012: Dubai, UAE
- Rachid Benlamri:
Networked Digital Technologies - 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012. Proceedings, Part I. Communications in Computer and Information Science 293, Springer 2012, ISBN 978-3-642-30506-1
Collaborative Systems for E-Sciences
- Jinan Fiaidhi, Michael D. Rioux, Sabah Mohammed, Tai-Hoon Kim:
Developing Casual Learning Games Using the Apache Pivot IIA Capabilities. 1-10 - Chadi Fouad Riman, Éric Monacelli, Imad Mougharbel, Ali El-Hajj:
Remote Robotic Laboratory Experiment Platform Based on Tele-programming. 11-22 - Masoud Udi Mwinyi, Sahar Ahmad Ismail, Jihad M. Alja'am, Ali Jaoua:
Understanding Simple Stories through Concepts Extraction and Multimedia Elements. 23-32
Context-Aware Processing and Ubiquitous Systems
- Mohamed Salah Benselim, Hassina Seridi-Bouchelaghem:
Extended UML for the Development of Context-Aware Applications. 33-43 - Muhammad Azeem Abbas, Muhammad Abdul Qadir, Munir Ahmad, Tariq Ali:
Semantic Aware Implication and Satisfiability for Conjunctive Queries in Semantic Caching. 44-54
Data and Network Mining
- Hoon Kwon, Ho-Young Kwak, Sang Joon Lee, Sung-Joon Lee:
A Hierarchical Routing Protocols for Self-organizing Networks. 55-62 - Mohamed Larbi Rebaiaia, Daoud Ait-Kadi, Denis Page:
A Practical Method for Evaluating the Reliability of Telecommunication Network. 63-77 - Fatiha Barigou, Naouel Barigou, Baghdad Atmani:
Combining Classifiers for Spam Detection. 78-89 - Hidefumi Sawai:
Exploring a New Small-World Network for Real-World Applications. 90-101 - Salam Barbary, Hikmat Farhat, Khalil Challita:
Fast Algorithm for Deep Packet Inspection. 102-111 - José-Alejandro Niño-Mora, Yezid Donoso:
1+N Orthogonal Encoding with Multiple Failure Tolerance (1+N OEMFT). 112-125 - Zainab A. Khalaf Aleqili:
The BASRAH System: A Method for Spoken Broadcast News Story Clustering. 126-134 - Iwan Syarif, Adam Prügel-Bennett, Gary B. Wills:
Unsupervised Clustering Approach for Network Anomaly Detection. 135-145 - Abul Bashar:
BNITE: Bayesian Networks-Based Intelligent Traffic Engineering for Energy-Aware NGN. 146-160
Grid and Cloud Computing
- Rusydi Umar, Arun Agarwal, C. Raghavendra Rao:
Advance Planning and Reservation in a Grid System. 161-173 - Mohamed Firdhous, Osman Ghazali, Suhaidi Hassan:
A Memoryless Trust Computing Mechanism for Cloud Computing. 174-185 - Issam Al-Azzoni, Derrick Kondo:
Cost-Aware Performance Modeling of Multi-tier Web Applications in the Cloud. 186-196 - Shaftab Ahmed, Azween B. Abdullah, M. Yasin Akhtar Raja:
Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud Architectures. 197-207 - Binh Minh Nguyen, Viet D. Tran, Ladislav Hluchý:
High-Level Abstraction Layers for Development and Deployment of Cloud Services. 208-219 - Rim Moussa:
TPC-H Benchmark Analytics Scenarios and Performances on Hadoop Data Clouds. 220-234
Information and Data Management
- Martin Svoboda, Irena Mlýnková:
An Incremental Correction Algorithm for XML Documents and Single Type Tree Grammars. 235-249 - Amine Karmouche, Yassine Salih Alj:
Distributed RFID Shopping System. 250-258 - Michal Svirec, Irena Mlýnková:
Efficient Detection of XML Integrity Constraints Violation. 259-273 - Driss Guerchi, Siwar Rekik:
Encoding Spectral Parameters Using Cache Codebook. 274-280 - Yang Hang, Simon Fong:
Incrementally Optimized Decision Tree for Mining Imperfect Data Streams. 281-296 - Sofiane Allioua, Zizette Boufaïda:
Knowledge Representation Using LSA and DRT Rules for Semantic Search of Documents. 297-306 - Emad Eldin Mohamed, Driss Guerchi:
Leaker Identification in Multicast Communication. 307-315 - Nadeem Iftikhar:
Ratio-Based Gradual Aggregation of Data. 316-329
Intelligent Agent-Based systems
- M. Nishat Akhtar, Othman Sidek:
An Adaptive Arbitration Algorithm for Fair Bandwidth Allocation, Low Latency and Maximum CPU Utilization. 330-343 - Ali Elouafiq, Ayoub Khobalatte, Wassim Benhallam:
Aggressive and Intelligent Self-Defensive Network - Towards a New Generation of Semi-autonomous Networks. 344-354 - Sang-Ho Shin, Dae-Soo Kim, Kee-Young Yoo:
A 2-Dimensional Cellular Automata Pseudorandom Number Generator with Non-linear Neighborhood Relationship. 355-368 - Carlos Alberto B. C. W. Madsen, Giancarlo Lucca, Guilherme B. Daniel, Diana Francisca Adamatti:
FURG Smart Games: A Proposal for an Environment to Game Development with Software Reuse and Artificial Intelligence. 369-381 - Serkan Kiranyaz, Turker Ince, Moncef Gabbouj:
Scalable Content-Based Classification and Retrieval Framework for Dynamic Commercial Image Databases. 382-398
Internet Modeling and Design
- Daniel Günther, Nathan Kerr, Paul Müller:
A Requirement Aware Method to Reduce Complexity in Selecting and Composing Functional-Block-Based Protocol Graphs. 399-407 - Mohammad Nazeeruddin, Shahabuddin Muhammad:
Modeling and Analyzing MAC Frame Aggregation Techniques in 802.11n Using Bi-dimensional Markovian Model. 408-419 - Eunil Park, Ki Joon Kim, Dallae Jin, Angel Pasqual del Pobil:
Towards a Successful Mobile Map Service: An Empirical Examination of Technology Acceptance Model. 420-428 - Youssef Baddi, Mohamed Dafir Ech-Cherif El Kettani:
VND-CS: A Variable Neighborhood Descent Algorithm for Core Selection Problem in Multicast Routing Protocol. 429-443
Mobile, Ad Hoc and Sensor NetworkManagement
- Mohamed Larbi Rebaiaia, Daoud Ait-Kadi:
An Efficient Algorithm for Enumerating Minimal PathSets in Communication Networks. 444-458 - Zouina Doukha, Samira Moussaoui, Noureddine Haouari, Mohamed E. A. Delhoum:
An Efficient Emergency Message Dissemination Protocol in a Vehicular Ad Hoc Network. 459-469 - Dalila Iabbassen, Samira Moussaoui:
An Energy Saving Data Dissemination Protocol for Wireless Sensor Networks. 470-482 - Leila Melit, Nadjib Badache:
An Ω-Based Leader Election Algorithm for Mobile Ad Hoc Networks. 483-490 - Mohamed Belhassen, Abdelfettah Belghith:
Cartography Gathering Driven by the OLSR Protocol. 491-505 - Mehran Misaghi, Eduardo da Silva, Luiz Carlos Pessoa Albini:
Distributed Self-organized Trust Management for Mobile Ad Hoc Networks. 506-518 - Feng (Barry) Tao, Jon Campbell, Gwyn Griffiths:
Distributed Sensor Relay System for Near Real Time Observation, Control and Data Management on a Scientific Research Ship. 519-535 - Teddy Mantoro, Media A. Ayu, Haroon Shoukat Ali, Wendi Usino, Mohammed M. Kadhum:
Energy Efficiency Mechanisms Using Mobile Node in Wireless Sensor Networks. 536-550 - Muhammad Shoaib, Wang-Cheol Song:
Hovering Information Based VANET Applications. 551-564 - Abdullah Said Alkalbani, Teddy Mantoro, Abu Osman Md. Tap:
Improving the Lifetime of Wireless Sensor Networks Based on Routing Power Factors. 565-576 - Naseer Ali Husieen, Osman Ghazali, Suhaidi Hassan, Mohammed M. Kadhum:
Redirect Link Failure Protocol Based on Dynamic Source Routing for MANET. 577-591 - Marwan Hassani, Thomas Seidl:
Resource-Aware Distributed Clustering of Drifting Sensor Data Streams. 592-607 - Mohammadreza Balouchestani, Kaamran Raahemifar, Sridhar Krishnan:
Robust Wireless Sensor Networks with Compressed Sensing Theory. 608-619 - Abdesselem Beghriche, Azeddine Bilami:
RTIC: Reputation and Trust Evaluation Based on Fuzzy LogIC System for Secure Routing in Mobile Ad Hoc Networks. 620-634 - Mohamed Guerroumi, Nadjib Badache, Samira Moussaoui:
Sink Mobile for Efficient Data Dissemination in Wireless Sensor Networks. 635-645
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.