000 07947nam a22005775i 4500
001 u374720
003 SIRSI
005 20160812084248.0
007 cr nn 008mamaa
008 100629s2010 gw | s |||| 0|eng d
020 _a9783642142925
_9978-3-642-14292-5
040 _cMX-MeUAM
050 4 _aTK5105.5-5105.9
082 0 4 _a004.6
_223
100 1 _aZavoral, Filip.
_eeditor.
245 1 0 _aNetworked Digital Technologies
_h[recurso electrónico] :
_bSecond International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I /
_cedited by Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmeh.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXXIII, 580p. 231 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v87
505 0 _aInformation and Data Management -- A New Approach for Fingerprint Matching Using Logic Synthesis -- Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions -- Distributed Data-Mining in the LISp-Miner System Using Techila Grid -- Non-negative Matrix Factorization on GPU -- Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language -- Handwritten Digits Recognition Based on Swarm Optimization Methods -- A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique -- An Efficient Indexing and Compressing Scheme for XML Query Processing -- Development of a New Compression Scheme -- Compression of Layered Documents -- Classifier Hypothesis Generation Using Visual Analysis Methods -- Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Manager -- A Framework for In-House Prediction Markets -- Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection -- Process Mining Approach to Promote Business Intelligence in Iranian Detectives’ Police -- Copyright Protection of Relational Database Systems -- Resolving Semantic Interoperability Challenges in XML Schema Matching -- Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras -- Security -- The Effect of Attentiveness on Information Security -- A Secured Mobile Payment Model for Developing Markets -- Security Mapping to Enhance Matching Fine-Grained Security Policies -- Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor -- On the Algebraic Expression of the AES S-Box Like S-Boxes -- Student’s Polls for Teaching Quality Evaluation as an Electronic Voting System -- An Improved Estimation of the RSA Quantum Breaking Success Rate -- Mining Bluetooth Attacks in Smart Phones -- Users’ Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model -- Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism -- A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks -- Human Authentication Using FingerIris Algorithm Based on Statistical Approach -- Aerial Threat Perception Architecture Using Data Mining -- Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography -- An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization -- Genetic Cryptanalysis -- Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques -- Modeling and Analysis of Reconfigurable Systems Using Flexible Nets -- Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing -- Social Networks -- Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities -- A Collaborative Social Decision Model for Digital Content Credibility Improvement -- Improving Similarity-Based Methods for Information Propagation on Social Networks -- Approaches to Privacy Protection in Location-Based Services -- Social Media as Means for Company Communication and Service Design -- A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems -- Bridging the Gap between Web 2.0 Technologies and Social Computing Principles -- Ontology -- Using Similarity Values for Ontology Matching in the Grid -- Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework -- Incorporating Semantics into an Intelligent Clothes Search System Using Ontology -- SPPODL: Semantic Peer Profile Based on Ontology and Description Logic -- Ontology Based Tracking and Propagation of Provenance Metadata -- Real Time Biometric Solutions for Networked Society -- A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer -- On-Demand Biometric Authentication of Computer Users Using Brain Waves -- Encrypting Fingerprint Minutiae Templates by Random Quantization -- Web Applications -- Method for Countering Social Bookmarking Pollution Using User Similarities -- A Human Readable Platform Independent Domain Specific Language for WSDL -- A Human Readable Platform Independent Domain Specific Language for BPEL -- Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler -- Assessing the LCC Websites Quality -- Expediency Heuristic in University Conference Webpage.
520 _aOn behalf of the NDT 2010 conference, the Program Committee and Charles University in Prague, Czech Republic, we welcome you to the proceedings of the Second International Conference on ‘Networked Digital Technologies’ (NDT 2010). The NDT 2010 conference explored new advances in digital and Web technology applications. It brought together researchers from various areas of computer and information sciences who addressed both theoretical and applied aspects of Web technology and Internet applications. We hope that the discussions and exchange of ideas that took place will contribute to advancements in the technology in the near future. The conference received 216 papers, out of which 85 were accepted, resulting in an acceptance rate of 39%. These accepted papers are authored by researchers from 34 countries covering many significant areas of Web applications. Each paper was evaluated by a minimum of two reviewers. Finally, we believe that the proceedings document the best research in the studied areas. We express our thanks to the Charles University in Prague, Springer, the authors and the organizers of the conference.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aDatabase management.
650 0 _aInformation storage and retrieval systems.
650 0 _aInformation systems.
650 0 _aArtificial intelligence.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aArtificial Intelligence (incl. Robotics).
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aSoftware Engineering.
650 2 4 _aDatabase Management.
700 1 _aYaghob, Jakub.
_eeditor.
700 1 _aPichappan, Pit.
_eeditor.
700 1 _aEl-Qawasmeh, Eyas.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642142918
830 0 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v87
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14292-5
596 _a19
942 _cLIBRO_ELEC
999 _c202600
_d202600