2. NDT 2010: Prague, Czech Republic
Filip Zavoral, Jakub Yaghob, Pit Pichappan, Eyas El-Qawasmeh (Eds.): Networked Digital Technologies - Second International Conference, NDT 2010, Prague, Czech Republic, July 7-9, 2010. Proceedings, Part I. Springer 2010 Communications in Computer and Information Science 87 ISBN 978-3-642-14291-8
Part 1 / Information and Data Management

Sang-Hong Lee, Joon S. Lim, Dong-Kun Shin: Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions. 7-14
Milan Simunek, Teppo Tammisto: Distributed Data-Mining in the LISp-Miner System Using Techila Grid. 15-20
Jan Platos, Petr Gajdos, Pavel Krömer, Václav Snásel: Non-negative Matrix Factorization on GPU. 21-30
Abbas Saliimi Lokman, Jasni Mohamad Zain: Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language. 31-44
Salima Nebti, Abdellah Boukerram: Handwritten Digits Recognition Based on Swarm Optimization Methods. 45-54
Wan Maseri Binti Wan Mohd, Abdullah Embong, Jasni Mohamad Zain: A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique. 55-69
I-En Liao, Wen-Chiao Hsu, Yu-Lin Chen: An Efficient Indexing and Compressing Scheme for XML Query Processing. 70-84
Bruno Carpentieri: Compression of Layered Documents. 91-97
Christin Seifert, Vedran Sabol, Michael Granitzer: Classifier Hypothesis Generation Using Visual Analysis Methods. 98-111
Lokesh Tiwari, Hamid Shahnasser: Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Manager. 112-119
Hongwu Qin, Jasni Mohamad Zain, Xiuqin Ma, Tao Hai: Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection. 128-134
Mehdi Ghazanfari, Mohammad Fathian, Mostafa Jafari, Saeed Rouhani: Process Mining Approach to Promote Business Intelligence in Iranian Detectives' Police. 135-142
Ali Al-Haj, Ashraf Odeh, Shadi R. Masadeh: Copyright Protection of Relational Database Systems. 143-150
Chiw Yi Lee, Hamidah Ibrahim, Mohamed Othman, Razali Yaakob: Resolving Semantic Interoperability Challenges in XML Schema Matching. 151-162
Arsham Borumand Saeid, Marjan Kuchaki Rafsanjani: Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras. 163-168
Part 2 / Security
Adeeb M. Alhomoud: The Effect of Attentiveness on Information Security. 169-174
Bossi Masamila, Fredrick Mtenzi, Said Jafari, Rose Tinabo: A Secured Mobile Payment Model for Developing Markets. 175-182
Monia Ben Brahim, Maher Ben Jemaa, Mohamed Jmaiel: Security Mapping to Enhance Matching Fine-Grained Security Policies. 183-196
Yoshiyuki Yamashita, Masato Tsuru: Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor. 197-212
M. Tolga Sakalli, Bora Aslan, Ercan Bulus, Andac Sahin Mesut, Fatma Büyüksaraçoglu, Osman Karaahmetoglu: On the Algebraic Expression of the AES S-Box Like S-Boxes. 213-227
Marcin Kucharczyk: Student's Polls for Teaching Quality Evaluation as an Electronic Voting System. 228-233
Piotr Zawadzki: An Improved Estimation of the RSA Quantum Breaking Success Rate. 234-240
Seyed Morteza Babamir, Reyhane Nowrouzi, Hadi Naseri: Mining Bluetooth Attacks in Smart Phones. 241-253
Fahad Al-Harby, Rami Qahwaji, Mumtaz Kamala: Users' Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model. 254-258
Jaroslav Janácek: Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism. 259-272
Chih-Hung Wang, Po-Chin Lee: A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks. 273-287
Ahmed B. Elmadani: Human Authentication Using FingerIris Algorithm Based on Statistical Approach. 288-296
M. Anwar-ul-Haq, Asad Waqar Malik, Shoab A. Khan: Aerial Threat Perception Architecture Using Data Mining. 297-305
Raoof Smko, Abdelsalam Almarimi, K. Negrat: Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography. 306-313
Hai Tao, Jasni Mohamad Zain, Ahmed N. Abd Alla, Hongwu Qin: An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization. 314-320
Abdelwadood Mesleh, Bilal Zahran, Anwar Al-Abadi, Samer Hamed, Nawal Al-Zabin, Heba Bargouthi, Iman Maharmeh: Genetic Cryptanalysis. 321-332
Shahidan M. Abdullah, Azizah A. Manaf: Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques. 333-342
Laïd Kahloul, Allaoua Chaoui, Karim Djouani: Modeling and Analysis of Reconfigurable Systems Using Flexible Nets. 343-357
Jong P. Yoon, Zhixiong Chen: Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing. 358-368
Part 3 / Social Networks
Lenuta Alboaie, Mircea-Florin Vaida: Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities. 369-382
Yuan-Chu Hwang: A Collaborative Social Decision Model for Digital Content Credibility Improvement. 383-390
Francesco Buccafurri, Gianluca Lax: Improving Similarity-Based Methods for Information Propagation on Social Networks. 391-401
Elina Annanperä, Jouni Markkula: Social Media as Means for Company Communication and Service Design. 410-419
Thierry Condamines: A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems. 420-429
Giorgos Kormaris, Marco Spruit: Bridging the Gap between Web 2.0 Technologies and Social Computing Principles. 430-443
Part 4 / Ontology
Axel Tenschert: Using Similarity Values for Ontology Matching in the Grid. 444-450
Andrzej Uszok, Jeffrey M. Bradshaw, Thomas C. Eskridge, James Hanna: Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework. 451-466
Ching-I Cheng, Damon Shing-Min Liu, Li-Ting Chen: Incorporating Semantics into an Intelligent Clothes Search System Using Ontology. 467-472
Younes Djaghloul, Zizette Boufaïda: SPPODL: Semantic Peer Profile Based on Ontology and Description Logic. 473-488
Miroslav Vacura, Vojtech Svátek: Ontology Based Tracking and Propagation of Provenance Metadata. 489-496
Part 5 / Real Time Biometric Solutions for Networked Society
Javier Guerra Casanova, Carmen Sánchez Ávila, Alberto de Santos Sierra, Gonzalo Bailador del Pozo, Vicente Jara Vera: A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer. 497-503
Isao Nakanishi, Chisei Miyamoto: On-Demand Biometric Authentication of Computer Users Using Brain Waves. 504-514
Bian Yang, Davrondzhon Gafurov, Christoph Busch, Patrick Bours: Encrypting Fingerprint Minutiae Templates by Random Quantization. 515-522
Part 6 / Web Applications
Takahiro Hatanaka, Hiroyuki Hisamatsu: Method for Countering Social Bookmarking Pollution Using User Similarities. 523-528
Balazs Simon, Balázs Goldschmidt: A Human Readable Platform Independent Domain Specific Language for WSDL. 529-536
Balazs Simon, Balázs Goldschmidt, Károly Kondorosi: A Human Readable Platform Independent Domain Specific Language for BPEL. 537-544
Tatiana Annoni Pazeto, Renato Moraes Silva, Shusaburo Motoyama: Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler. 545-555
Roslina Mohd Sidek, Noraziah Ahmad, Mohammad Fadel Jamil Klaib, Mohd Helmy Abd Wahab: Expediency Heuristic in University Conference Webpage. 566-576



