| 000 | 06977nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-14292-5 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084541.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100629s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642142925 _9978-3-642-14292-5 |
||
| 024 | 7 |
_a10.1007/978-3-642-14292-5 _2doi |
|
| 050 | 4 | _aTK5105.5-5105.9 | |
| 072 | 7 |
_aUKN _2bicssc |
|
| 072 | 7 |
_aCOM075000 _2bisacsh |
|
| 082 | 0 | 4 |
_a004.6 _223 |
| 100 | 1 |
_aZavoral, Filip. _eeditor. |
|
| 245 | 1 | 0 |
_aNetworked Digital Technologies _h[electronic resource] : _bSecond International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I / _cedited by Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmeh. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aXXIII, 580p. 231 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v87 |
|
| 505 | 0 | _aInformation and Data Management -- A New Approach for Fingerprint Matching Using Logic Synthesis -- Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions -- Distributed Data-Mining in the LISp-Miner System Using Techila Grid -- Non-negative Matrix Factorization on GPU -- Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language -- Handwritten Digits Recognition Based on Swarm Optimization Methods -- A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique -- An Efficient Indexing and Compressing Scheme for XML Query Processing -- Development of a New Compression Scheme -- Compression of Layered Documents -- Classifier Hypothesis Generation Using Visual Analysis Methods -- Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Manager -- A Framework for In-House Prediction Markets -- Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection -- Process Mining Approach to Promote Business Intelligence in Iranian Detectives’ Police -- Copyright Protection of Relational Database Systems -- Resolving Semantic Interoperability Challenges in XML Schema Matching -- Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras -- Security -- The Effect of Attentiveness on Information Security -- A Secured Mobile Payment Model for Developing Markets -- Security Mapping to Enhance Matching Fine-Grained Security Policies -- Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor -- On the Algebraic Expression of the AES S-Box Like S-Boxes -- Student’s Polls for Teaching Quality Evaluation as an Electronic Voting System -- An Improved Estimation of the RSA Quantum Breaking Success Rate -- Mining Bluetooth Attacks in Smart Phones -- Users’ Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model -- Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism -- A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks -- Human Authentication Using FingerIris Algorithm Based on Statistical Approach -- Aerial Threat Perception Architecture Using Data Mining -- Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography -- An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization -- Genetic Cryptanalysis -- Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques -- Modeling and Analysis of Reconfigurable Systems Using Flexible Nets -- Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing -- Social Networks -- Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities -- A Collaborative Social Decision Model for Digital Content Credibility Improvement -- Improving Similarity-Based Methods for Information Propagation on Social Networks -- Approaches to Privacy Protection in Location-Based Services -- Social Media as Means for Company Communication and Service Design -- A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems -- Bridging the Gap between Web 2.0 Technologies and Social Computing Principles -- Ontology -- Using Similarity Values for Ontology Matching in the Grid -- Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework -- Incorporating Semantics into an Intelligent Clothes Search System Using Ontology -- SPPODL: Semantic Peer Profile Based on Ontology and Description Logic -- Ontology Based Tracking and Propagation of Provenance Metadata -- Real Time Biometric Solutions for Networked Society -- A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer -- On-Demand Biometric Authentication of Computer Users Using Brain Waves -- Encrypting Fingerprint Minutiae Templates by Random Quantization -- Web Applications -- Method for Countering Social Bookmarking Pollution Using User Similarities -- A Human Readable Platform Independent Domain Specific Language for WSDL -- A Human Readable Platform Independent Domain Specific Language for BPEL -- Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler -- Assessing the LCC Websites Quality -- Expediency Heuristic in University Conference Webpage. | |
| 520 | _aThis book constitutes the proceedings of the Second International Conference on Networked Digital Technologies, held in Prague, Czech Republic, in July 2010. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aSoftware engineering. | |
| 650 | 0 | _aDatabase management. | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aArtificial intelligence. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
| 650 | 2 | 4 | _aInformation Storage and Retrieval. |
| 650 | 2 | 4 | _aSoftware Engineering. |
| 650 | 2 | 4 | _aDatabase Management. |
| 700 | 1 |
_aYaghob, Jakub. _eeditor. |
|
| 700 | 1 |
_aPichappan, Pit. _eeditor. |
|
| 700 | 1 |
_aEl-Qawasmeh, Eyas. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642142918 |
| 830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v87 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-14292-5 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c112443 _d112443 |
||