Atjaunināt sīkdatņu piekrišanu

E-grāmata: Networked Digital Technologies: Third International Conference, NDT 2011, Macau, China, July 11-13, 2011, Proceedings

Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the proceedings of the Third International Conference on Networked Digital Technologies, held in Macau, China, in July 2011. The 41 revised papers presented were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on information security, networks, information management, multimedia, human computer interaction and simulation, e-learning and e-government, Web services/semantics, user centric information system/intelligent computing, and data mining.
Information Security
Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmission
1(12)
Hao Wang
William Emmanuel Yu
Authentication and Authorization in Web Services
13(11)
Khalil Challita
Hikmat Farhat
Joseph Zalaket
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating
24(13)
Meghdad Mirabi
Hamidah Ibrahim
Ali Mamat
Nur Izura Udzir
An Access Control Model for Supporting XML Document Updating
37(10)
Meghdad Mirabi
Hamidah Ibrahim
Leila Fathi
Nur Izura Udzir
Ali Mamat
A Secure Proxy Blind Signature Scheme Using ECC
47(6)
Daniyal M. Alghazzawi
Trigui Mohamed Salim
Syed Hamid Hasan
Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications
53(14)
Xin-She Yang
Suash Deb
Simon Fong
Networks
A Study on the Reliability of Data Transmission of an over the Top Network Protocol on SMS versus UDP/GPRS (Fragmented)
67(15)
Alyssa Marie Dykimching
Jan Aaron Angelo Lee
William Emmanuel Yu
QuickFlood: An Efficient Search Algorithm for Unstructured Peer-to-Peer Networks
82(11)
Hassan Barjini
Mohamed Othman
Hamidah Ibrahim
Improved-XY: A High Performance Wormhole-Switched Routing Algorithm for Irregular 2-D Mesh NoC
93(12)
Ladan Momeni
Arshin Rezazadeh
Davood Abednejad
XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems
105(15)
Ghazi Ben Ayed
Solange Ghernaouti-Helie
An Overview of Performance Comparison of Different TCP Variants in IP and MPLS Networks
120(8)
Madiha Kazmi
Muhammad Younas Javed
Muhammad Khalil Afzal
Routing in Mobile Ad-Hoc Networks as a Reinforcement Learning Task
128(8)
Saloua Chettibi
Salim Chikhi
Information Management
Identifying Usability Issues in Personal Calendar Tools
136(11)
Dezhi Wu
Adaptive Query Processing for Semantic Interoperable Information Systems
147(17)
Benharzallah Saber
Kazar Okba
Guy Caplat
Statistical Character-Based Syntax Similarity Measurement for Detecting Biomedical Syntax Variations through Named Entity Recognition
164(15)
Hossein Tohidi
Hamidah Ibrahim
Masrah Azrifan Azmi
Correction of Invalid XML Documents with Respect to Single Type Tree Grammars
179(16)
Martin Svoboda
Irena Mlynkova
Identification of Scholarly Papers and Authors
195(8)
Kensuke Baba
Masao Mori
Eisuke Ito
A Social Network Model for Academic Collaboration
203(9)
Sreedhar Bhukya
Performance Evaluation of Preference Evaluation Techniques
212(12)
Alwan A. Ali
Ibrahim Hamidah
Tan Chik Yip
Sidi Fatimah
Udzir Nur Izura
Collective Action Theory Meets the Blogosphere: A New Methodology
224(16)
Nitin Agarwal
Merlyna Lim
Rolf T. Wigand
Multimedia
Evaluating K-Best Site Query on Spatial Objects
240(11)
Yuan-Ko Huang
Lien-Fa Lin
Performance of Annotation-Based Image Retrieval
251(18)
Phani Kidambi
Mary Fendley
S. Narayanan
Multimedia Streams Retrieval in Distributed Systems Using Learning Automata
269(11)
Safiye Ghasemi
Amir Masoud Rahmani
Real-Time Detection of Parked Vehicles from Multiple Image Streams
280(12)
Kok-Leong Ong
Vincent C.S. Lee
E Learning and E Government
An Adaptive Framework for Personalized E-Learning
292(15)
Ronnie Cheung
Hassan B. Kazemian
Gov 2.0 and Beyond: Using Social Media for Transparency, Participation and Collaboration
307(12)
F. Dianne Lux Wigand
Web Services/Semantics
MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation
319(15)
Cihan Aksoy
Vincent Labatut
Chantal Cherifi
Jean-Francois Santucci
Meshing Semantic Web and Web2.0 Technologies to Construct Profiles: Case Study of Academia Europea Members
334(11)
Petra Korica-Pehserl
Atif Latif
Towards Ontology-Based Collaboration Framework Based on Messaging System
345(12)
Gridaphat Sriharee
A QoS and Consumer Personality Considered Services Discovery
357(7)
Xiuqin Ma
Norrozila Sulaiman
Hongwu Qin
User Centric Homogeneity-Based Clustering Approach for Intelligence Computation
364(9)
Yun Wei Zhao
Chi-Hung Chi
Chen Ding
Data Mining
Mining Temporal Association Rules with Incremental Standing for Segment Progressive Filter
373(10)
Mohsin Naqvi
Kashif Hussain
Sohail Asghar
Simon Fong
Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data
383(12)
Sheneela Naz
Sohail Asghar
Simon Fong
Amir Qayyum
Multi Level Mining of Warehouse Schema
395(14)
Muhammad Usman
Russel Pears
On Inserting Bulk Data for Linear Hash Files
409(14)
Satoshi Narata
Takao Miura
Cloud Computing
Cloud Data Storage with Group Collaboration Supports
423(9)
Jyh-Shyan Lin
A Negotiation Mechanism That Facilitates the Price-Timeslot-QoS Negotiation for Establishing SLAs of Cloud Service Reservation
432(15)
Seokho Son
Kwang Mong Sim
Author Index 447