Networked Digital Technologies最新文献

筛选
英文 中文
Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework 在以用户为中心的联邦数字身份系统中构建可互操作的隐私:面向服务的实现框架概述
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30567-2_14
G. Ayed, S. Ghernaouti-Helie
{"title":"Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework","authors":"G. Ayed, S. Ghernaouti-Helie","doi":"10.1007/978-3-642-30567-2_14","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_14","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123614285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust Wireless Sensor Networks with Compressed Sensing Theory 基于压缩感知理论的鲁棒无线传感器网络
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30507-8_50
Mohammadreza Balouchestani, K. Raahemifar, S. Krishnan
{"title":"Robust Wireless Sensor Networks with Compressed Sensing Theory","authors":"Mohammadreza Balouchestani, K. Raahemifar, S. Krishnan","doi":"10.1007/978-3-642-30507-8_50","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_50","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"95 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Recursive Incentives with Guided Recruiting Encouragement 引导招聘激励的递归激励
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30567-2_39
N. A. Mehdi
{"title":"Recursive Incentives with Guided Recruiting Encouragement","authors":"N. A. Mehdi","doi":"10.1007/978-3-642-30567-2_39","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_39","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"14 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120887991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented Workflows 用于将UML活动图映射到BPEL规范以组成面向服务的工作流的UML细化
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30567-2_44
Hayat Bendoukha, Y. Slimani, A. Benyettou
{"title":"UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented Workflows","authors":"Hayat Bendoukha, Y. Slimani, A. Benyettou","doi":"10.1007/978-3-642-30567-2_44","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_44","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"579 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122934985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving the Lifetime of Wireless Sensor Networks Based on Routing Power Factors 基于路由功率因数提高无线传感器网络寿命
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30507-8_47
A. Alkalbani, T. Mantoro, A. Tap
{"title":"Improving the Lifetime of Wireless Sensor Networks Based on Routing Power Factors","authors":"A. Alkalbani, T. Mantoro, A. Tap","doi":"10.1007/978-3-642-30507-8_47","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_47","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127760426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Distributed RFID Shopping System 分布式RFID购物系统
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30507-8_22
A. Karmouche, Yassine Salih Alj
{"title":"Distributed RFID Shopping System","authors":"A. Karmouche, Yassine Salih Alj","doi":"10.1007/978-3-642-30507-8_22","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_22","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Requirement Aware Method to Reduce Complexity in Selecting and Composing Functional-Block-Based Protocol Graphs 基于需求感知的基于功能块的协议图选择和组合复杂性降低方法
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30507-8_34
D. Günther, Nathan Kerr, P. Müller
{"title":"A Requirement Aware Method to Reduce Complexity in Selecting and Composing Functional-Block-Based Protocol Graphs","authors":"D. Günther, Nathan Kerr, P. Müller","doi":"10.1007/978-3-642-30507-8_34","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_34","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Authentication Using Iris Biometrics 使用虹膜生物识别技术的移动身份验证
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30567-2_28
M. Gargi, J. Rani, Madhu Ramiah, N. Babu, A. Fathima, V. Vaidehi
{"title":"Mobile Authentication Using Iris Biometrics","authors":"M. Gargi, J. Rani, Madhu Ramiah, N. Babu, A. Fathima, V. Vaidehi","doi":"10.1007/978-3-642-30567-2_28","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_28","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134031259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function 基于重叠像素差和模函数的大容量图像隐写
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30567-2_20
El-Sayed M. El-Alfy, Azzat A. Al-Sadi
{"title":"High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function","authors":"El-Sayed M. El-Alfy, Azzat A. Al-Sadi","doi":"10.1007/978-3-642-30567-2_20","DOIUrl":"https://doi.org/10.1007/978-3-642-30567-2_20","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133991987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
High-Level Abstraction Layers for Development and Deployment of Cloud Services 用于开发和部署云服务的高级抽象层
Networked Digital Technologies Pub Date : 2012-04-24 DOI: 10.1007/978-3-642-30507-8_19
B. Nguyen, V. Tran, L. Hluchý
{"title":"High-Level Abstraction Layers for Development and Deployment of Cloud Services","authors":"B. Nguyen, V. Tran, L. Hluchý","doi":"10.1007/978-3-642-30507-8_19","DOIUrl":"https://doi.org/10.1007/978-3-642-30507-8_19","url":null,"abstract":"","PeriodicalId":102325,"journal":{"name":"Networked Digital Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133685116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信