Login / Signup
NDT (2)
2010
2012
2010
2012
Keyphrases
Publications
2012
Nawfal A. Mehdi
Recursive Incentives with Guided Recruiting Encouragement.
NDT (2)
(2012)
Djallel Eddine Boubiche
,
Azeddine Bilami
,
Samir Athmani
A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network.
NDT (2)
(2012)
Alessio Di Mauro
,
Davide Papini
,
Roberto Vigo
,
Nicola Dragoni
Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks.
NDT (2)
(2012)
Tamer Rabie
Digital Image Steganography: An FFT Approach.
NDT (2)
(2012)
Serina Egawa
,
Ali Ismail Awad
,
Kensuke Baba
Evaluation of Acceleration Algorithm for Biometric Identification.
NDT (2)
(2012)
Gilles Nachouki
,
Mohamed Quafafou
Efficient Research in Community Semantic Overlay Networks.
NDT (2)
(2012)
Abdul Razaque
,
Khaled M. Elleithy
Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network.
NDT (2)
(2012)
Hayat Bendoukha
,
Yahya Slimani
,
Abdelkader Benyettou
UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented Workflows.
NDT (2)
(2012)
El-Sayed M. El-Alfy
,
Galal M. BinMakhashen
Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines.
NDT (2)
(2012)
Idir Amine Amarouche
,
Karim Benouaret
,
Djamal Benslimane
,
Zaia Alimazighi
,
Michael Mrissa
Context-Driven and Service Oriented Semantic Mediation in DaaS Composition.
NDT (2)
(2012)
Driss Guerchi
,
Emad Eldin Mohamed
LPC-Based Narrowband Speech Steganography.
NDT (2)
(2012)
Eiman Kanjo
,
Elisabeth Platzer
,
Christian Kittl
Viral Message Passing Framework for Crowd and Sensor Applications.
NDT (2)
(2012)
Ghazi Ben Ayed
,
Solange Ghernaouti-Helie
Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework.
NDT (2)
(2012)
Mokhtar Taffar
,
Serge Miguet
,
Mohamed Benmohammed
Viewpoint Invariant Face Detection.
NDT (2)
(2012)
Erick Stattner
,
Martine Collard
FLMin: An Approach for Mining Frequent Links in Social Networks.
NDT (2)
(2012)
Yu-Hsn Liu
,
Kok-Leong Ong
,
Andrzej Goscinski
Sensor-Cloud Computing: Novel Applications and Research Problems.
NDT (2)
(2012)
Hedwio Carvalho e Silva
,
Rita de Cassia Cordeiro de Castro
,
Marcos Jose Negreiros Gomes
,
Anilton Salles Garcia
Well-Founded IT Architecture Ontology: An Approach from a Service Continuity Perspective.
NDT (2)
(2012)
Naveed Ahmed
A New Approach to Learning System in Cognitive Radio Based on Elman Networks.
NDT (2)
(2012)
Nada Bajnaid
,
Rachid Benlamri
,
Boris I. Cogan
An SQA e-Learning System for Agile Software Development.
NDT (2)
(2012)
Lynda Djakhdjakha
,
Mounir Hemam
,
Zizette Boufaïda
Multi-Viewpoints Ontology Alignment Based on Description Logics.
NDT (2)
(2012)
Matthew Dunlop
,
William Urbanski
,
Randy C. Marchany
,
Joseph G. Tront
Leveraging Cognitive Principles to Improve Security Visualization.
NDT (2)
(2012)
Duaa Sinnari
,
Hana Abdullah Al-Nuaim
The Use of Mobile Technology for Citizen E-Participation.
NDT (2)
(2012)
Sher Afgun Khan
,
Muhammad Tanvir Afzal
,
Muhammad Abdul Qadir
Exploiting Title-Keywords Relation to Develop Concept Classifier for Scientific Community.
NDT (2)
(2012)
Ouahrani Atika
,
Abdelkader Belkhir
Composing Web Services Using Profiles Similarity.
NDT (2)
(2012)
Nermina Basic
,
Vlatko Lipovac
,
Adriana Lipovac
Practical Analysis of xDR Based Signaling Network Performance and End-to-End QoS.
NDT (2)
(2012)
S. Vasuhi
,
A. Annis Fathima
,
S. Anand Shanmugam
,
Vijay Vaidehi
Object Detection and Tracking in Secured Area with Wireless and Multimedia Sensor Network.
NDT (2)
(2012)
El-Sayed M. El-Alfy
,
Azzat A. Al-Sadi
High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function.
NDT (2)
(2012)
Chahinez Bachtarzi
,
Fouzia Benchikha
Ontology-Based Database Multi-representation Using Viewpoints and Views.
NDT (2)
(2012)
Anna Rohunen
,
Matti Eteläperä
,
Kari Liukkunen
,
Kai Wen Chan
,
Tero Tulppo
Validating Applicability of Smart-M3 Platform for a Multi-vendor Micropayment System in the Context of Small Business.
NDT (2)
(2012)
Samir Elmougy
A Dynamic Web Service and Business Process Logic Composition and Consistency.
NDT (2)
(2012)
Yakubu Suleiman Baguda
,
Norsheila Fisal
,
Rozeha A. Rashid
,
Sharifah Kamilah Syed Yusof
,
Sharifah Hafiza Syed
Threshold-Based Cross Layer Design for Video Streaming over Lossy Channels.
NDT (2)
(2012)
Soufiane Boulehouache
,
Ramdane Maamri
,
Zaïdi Sahnoun
Quality Adapting of Role-Based Interactive Applications.
NDT (2)
(2012)
Toshihiko Yamakami
Digital Social Literacy: Literacy Demands for the Virtual-World.
NDT (2)
(2012)
Muhammad Akhlaq
,
Tarek R. Sheltami
Performance Comparison of Video Compression and Streaming over Wireless Ad Hoc and Sensor Networks Using MPEG-4 and H.264.
NDT (2)
(2012)
Kamal A. Ahmed
,
Hussain Al-Ahmad
,
Patrick Gaydecki
A New Algorithm for Watermarking Colour Images Using the Green Channel.
NDT (2)
(2012)
Atif Latif
,
Patrick Höfler
,
Klaus Tochtermann
Interlinking Scientific Authors with the LOD Cloud: A Case Study.
NDT (2)
(2012)
M. Gargi
,
J. Jasmine Sylvia Rani
,
Madhu Ramiah
,
N. T. Naresh Babu
,
A. Annis Fathima
,
Vijay Vaidehi
Mobile Authentication Using Iris Biometrics.
NDT (2)
(2012)
Hanan El Bakkali
Bypassing Workflow Satisfiability Problem Due to Access Control Constraints.
NDT (2)
(2012)
Faten Omri
,
Ridha Hamila
,
Sebti Foufou
,
Mohamed Jarraya
Cloud-Ready Biometric System for Mobile Security Access.
NDT (2)
(2012)
Nardjes Dehimi
,
Raida Elmansouri
,
Allaoua Chaoui
A Formal Framework and a Tool to Process and Simulate Labelled Reconfigurable Nets Models Based on Graph Transformation.
NDT (2)
(2012)
Abdunnaser Diaf
,
Rachid Benlamri
,
Boubakeur Boufama
Nonlinear-Based Human Activity Recognition Using the Kernel Technique.
NDT (2)
(2012)
Inaya Lahoud
,
Davy Monticolo
,
Vincent Hilaire
,
Samuel Gomes
A Metamodeling and Transformation Approach for Knowledge Extraction.
NDT (2)
(2012)
Peiqing Zhang
,
Bjarne E. Helvik
Modeling Push-Based Live P2P Streaming by Stochastic Activity Networks.
NDT (2)
(2012)
Mohamed Fezari
,
Ibrahiem El-Emary
,
Mohamed Serghir Boumaz
,
Hamza Attoui
Improvement of Spotting Words Speech Recognition Agent for Tele-Operating a Manipulator Arm.
NDT (2)
(2012)
volume 294, 2012
Networked Digital Technologies - 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II
NDT (2)
294 (2012)
2010
M. Aramudhan
,
K. Mohan
New Secure Communication Protocols for Mobile E-Health System.
NDT (2)
(2010)
Yoshiro Imai
,
Yukio Hori
,
Kazuyoshi Kawauchi
,
Mayumi Kondo
,
Toshikazu Sone
,
Yoshitaka Seno
,
Nobue Kawada
,
Shinobu Tada
,
Miho Yokoyama
,
Rieko Miki
A Trial Evaluation of Distributed Campus Network Environment Based on Comparison of Theoretical and Real Performance of Packet Flow Amount Using Video Transmission System.
NDT (2)
(2010)
Laïd Kahloul
,
Karim Djouani
,
Walid Tfaili
,
Allaoua Chaoui
,
Yacine Amirat
Modeling and Verification of RBAC Security Policies Using Colored Petri Nets and CPN-Tool.
NDT (2)
(2010)
Arun Kumar Tripathi
,
Ajay Agarwal
An Approach towards Time Synchronization Based Secure Protocol for Wireless Sensor Network.
NDT (2)
(2010)
volume 88, 2010
Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part II
NDT (2)
88 (2010)