{"title":"A Metamodeling and Transformation Approach for Knowledge Extraction","authors":"I. Lahoud, D. Monticolo, V. Hilaire, S. Gomes","doi":"10.1007/978-3-642-30567-2_6","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_6","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network","authors":"D. E. Boubiche, A. Bilami, Samir Athmani","doi":"10.1007/978-3-642-30567-2_13","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_13","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126644525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource-Aware Distributed Clustering of Drifting Sensor Data Streams","authors":"Marwan Hassani, T. Seidl","doi":"10.1007/978-3-642-30507-8_49","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_49","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Incremental Correction Algorithm for XML Documents and Single Type Tree Grammars","authors":"M. Svoboda, I. Holubová","doi":"10.1007/978-3-642-30507-8_21","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_21","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aggressive and Intelligent Self-Defensive Network - Towards a New Generation of Semi-autonomous Networks","authors":"Ali Elouafiq, Ayoub Khobalatte, Wassim Benhallam","doi":"10.1007/978-3-642-30507-8_30","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_30","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132930420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Analyzing MAC Frame Aggregation Techniques in 802.11n Using Bi-dimensional Markovian Model","authors":"M. Nazeeruddin, Shahabuddin Muhammad","doi":"10.1007/978-3-642-30507-8_35","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_35","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"24 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133175147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines","authors":"El-Sayed M. El-Alfy, G. M. Binmakhashen","doi":"10.1007/978-3-642-30567-2_21","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_21","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127629778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Practical Method for Evaluating the Reliability of Telecommunication Network","authors":"M. Rebaiaia, D. Aït-Kadi, D. Page","doi":"10.1007/978-3-642-30507-8_7","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_7","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"123 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129097620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}