3. NDT 2011: Macau, China
Simon Fong, Pit Pichappan (Eds.): Networked Digital Technologies - Third International Conference, NDT 2011, Macau, China, July 11-13, 2011. Proceedings. Springer 2011 Communications in Computer and Information Science 136 ISBN 978-3-642-22184-2
Information Security
Hao Wang, William Emmanuel Yu: Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. 1-12
Khalil Challita, Hikmat Farhat, Joseph Zalaket: Authentication and Authorization in Web Services. 13-23
Meghdad Mirabi, Hamidah Ibrahim, Ali Mamat, Nur Izura Udzir: Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating. 24-36
Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat: An Access Control Model for Supporting XML Document Updating. 37-46
Daniyal M. Alghazzawi, Trigui Mohamed Salim, Syed Hamid Hasan: A Secure Proxy Blind Signature Scheme Using ECC. 47-52
Xin-She Yang, Suash Deb, Simon Fong: Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications. 53-66
Networks
Alyssa Marie Dykimching, Jan Aaron Angelo Lee, William Emmanuel Yu: A Study on the Reliability of Data Transmission of an over the Top Network Protocol on SMS versus UDP/ GPRS (Fragmented). 67-81
Hassan Barjini, Mohamed Othman, Hamidah Ibrahim: QuickFlood: An Efficient Search Algorithm for Unstructured Peer-to-Peer Networks. 82-92
Ladan Momeni, Arshin Rezazadeh, Davood Abednejad: Improved-XY: A High Performance Wormhole-Switched Routing Algorithm for Irregular 2-D Mesh NoC. 93-104
Saloua Chettibi, Salim Chikhi: Routing in Mobile Ad-hoc Networks as a Reinforcement Learning Task. 128-135
Information Management
Dezhi Wu: Identifying Usability Issues in Personal Calendar Tools. 136-146
Benharzallah Saber, Kazar Okba, Guy Caplat: Adaptive Query Processing for Semantic Interoperable Information Systems. 147-163
Hossein Tohidi, Hamidah Ibrahim, Masrah Azrifan Azmi: Statistical Character-Based Syntax Similarity Measurement for Detecting Biomedical Syntax Variations through Named Entity Recognition. 164-178
Martin Svoboda, Irena Mlýnková: Correction of Invalid XML Documents with Respect to Single Type Tree Grammars. 179-194
Sreedhar Bhukya: A Social Network Model for Academic Collaboration. 203-211
Alwan A. Ali, Hamidah Ibrahim, Tan Chik Yip, Fatimah Sidi, Nur Izura Udzir: Performance Evaluation of Preference Evaluation Techniques. 212-223
Nitin Agarwal, Merlyna Lim, Rolf T. Wigand: Collective Action Theory Meets the Blogosphere: A New Methodology. 224-239
Multimedia

Phani Kidambi, Mary Fendley, Sundaram Narayanan: Performance of Annotation-Based Image Retrieval. 251-268
Kok-Leong Ong, Vincent C. S. Lee: Real-Time Detection of Parked Vehicles from Multiple Image Streams. 280-291
E Learning and E Government

Dianne Lux Wigand: Gov 2.0 and Beyond: Using Social Media for Transparency, Participation and Collaboration. 307-318
Web Services/Semantics
Cihan Aksoy, Vincent Labatut, Chantal Cherifi, Jean François Santucci: MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation. 319-333
Gridaphat Sriharee: Towards Ontology-Based Collaboration Framework Based on Messaging System. 345-356
Xiuqin Ma, Norrozila Sulaiman, Hongwu Qin: A QoS and Consumer Personality Considered Services Discovery. 357-363
Yun Wei Zhao, Chi-Hung Chi, Chen Ding: User Centric Homogeneity-Based Clustering Approach for Intelligence Computation. 364-372
Data Mining
Sheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum: Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data. 383-394

Cloud Computing
Seokho Son, Kwang Mong Sim: A Negotiation Mechanism that Facilitates the Price-Timeslot-QoS Negotiation for Establishing SLAs of Cloud Service Reservation. 432-446



