4. NDT 2012: Dubai, UAE
Rachid Benlamri (Ed.): Networked Digital Technologies - 4th International Conference, NDT 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part II. Springer 2012 Communications in Computer and Information Science 294 ISBN 978-3-642-30566-5
Peer-to-Peer Social Networks

Peiqing Zhang, Bjarne E. Helvik: Modeling Push-Based Live P2P Streaming by Stochastic Activity Networks. 12-23
Eiman Kanjo, Elisabeth Platzer, Christian Kittl: Viral Message Passing Framework for Crowd and Sensor Applications. 24-33
Quality of Service for Networked Systems
Nermina Basic, Vlatko Lipovac, Adriana Lipovac: Practical Analysis of xDR Based Signaling Network Performance and End-to-End QoS. 34-45
Anna Rohunen, Matti Eteläperä, Kari Liukkunen, Kai Wen Chan, Tero Tulppo: Validating Applicability of Smart-M3 Platform for a Multi-vendor Micropayment System in the Context of Small Business. 46-53
Semantic Web and Ontologies
Lynda Djakhdjakha, Mounir Hemam, Zizette Boufaïda: Multi-Viewpoints Ontology Alignment Based on Description Logics. 109-122
Chahinez Bachtarzi, Fouzia Benchikha: Ontology-Based Database Multi-representation Using Viewpoints and Views. 123-135
Hedwio Carvalho e Silva, Rita de Cassia Cordeiro de Castro, Marcos Jose Negreiros Gomes, Anilton Salles Garcia: Well-Founded IT Architecture Ontology: An Approach from a Service Continuity Perspective. 136-150
Inaya Lahoud, Davy Monticolo, Vincent Hilaire, Samuel Gomes: A Metamodeling and Transformation Approach for Knowledge Extraction. 54-68
Nada Bajnaid, Rachid Benlamri, Boris I. Cogan: An SQA e-Learning System for Agile Software Development. 69-83
Idir Amine Amarouche, Karim Benouaret, Djamal Benslimane, Zaia Alimazighi, Michael Mrissa: Context-Driven and Service Oriented Semantic Mediation in DaaS Composition. 84-98
Atif Latif, Patrick Höfler, Klaus Tochtermann: Interlinking Scientific Authors with the LOD Cloud: A Case Study. 99-108
Security and Access Control
Djallel Eddine Boubiche, Azeddine Bilami, Samir Athmani: A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network. 151-164
Ghazi Ben Ayed, Solange Ghernaouti-Helie: Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework. 165-177
Hanan El Bakkali: Bypassing Workflow Satisfiability Problem Due to Access Control Constraints. 178-191
F. Omri, R. Hamila, S. Foufou, M. Jarraya: Cloud-Ready Biometric System for Mobile Security Access. 192-200
Abdul Razaque, Khaled M. Elleithy: Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network. 201-216
Tamer F. Rabie: Digital Image Steganography: An FFT Approach. 217-230
Serina Egawa, Ali Ismail Awad, Kensuke Baba: Evaluation of Acceleration Algorithm for Biometric Identification. 231-242
El-Sayed M. El-Alfy, Azzat A. Al-Sadi: High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function. 243-252
El-Sayed M. El-Alfy, Galal M. BinMakhashen: Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines. 253-261
Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront: Leveraging Cognitive Principles to Improve Security Visualization. 262-276
Alessio Di Mauro, Davide Papini, Roberto Vigo, Nicola Dragoni: Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks. 289-301
Signal Processing and Computer Vision for Networked Systems
Kamal A. Ahmed, Hussain Al-Ahmad, Patrick Gaydecki: A New Algorithm for Watermarking Colour Images Using the Green Channel. 302-311
Naveed Ahmed: A New Approach to Learning System in Cognitive Radio Based on Elman Networks. 312-320
Mohamed Fezari, Ibrahiem El-Emary, Mohamed Serghir Boumaz, Hamza Attoui: Improvement of Spotting Words Speech Recognition Agent for Tele-Operating a Manipulator Arm. 321-331
M. Gargi, J. Jasmine Sylvia Rani, Madhu Ramiah, N. T. Naresh Babu, A. Annis Fathima, Vijay Vaidehi: Mobile Authentication Using Iris Biometrics. 332-341
Abdunnaser Diaf, Rachid Benlamri, Boubakeur Boufama: Nonlinear-Based Human Activity Recognition Using the Kernel Technique. 342-355
S. Vasuhi, A. Annis Fathima, S. Anand Shanmugam, Vijay Vaidehi: Object Detection and Tracking in Secured Area with Wireless and Multimedia Sensor Network. 356-367
Muhammad Akhlaq, Tarek R. Sheltami: Performance Comparison of Video Compression and Streaming over Wireless Ad Hoc and Sensor Networks Using MPEG-4 and H.264. 368-377
Yakubu Suleiman Baguda, Norsheila Fisal, Rozeha A. Rashid, Sharifah Kamilah Syed Yusof, Sharifah Hafiza Syed: Threshold-Based Cross Layer Design for Video Streaming over Lossy Channels. 378-389
Social Networks
Nardjes Dehimi, Raida Elmansouri, Allaoua Chaoui: A Formal Framework and a Tool to Process and Simulate Labelled Reconfigurable Nets Models Based on Graph Transformation. 403-414
Soufiane Boulehouache, Ramdane Maamri, Zaïdi Sahnoun: Quality Adapting of Role-Based Interactive Applications. 415-428
Toshihiko Yamakami: Digital Social Literacy: Literacy Demands for the Virtual-World. 429-437
Sher Afgun Khan, Muhammad Tanvir Afzal, Muhammad Abdul Qadir: Exploiting Title-Keywords Relation to Develop Concept Classifier for Scientific Community. 438-448
Erick Stattner, Martine Collard: FLMin: An Approach for Mining Frequent Links in Social Networks. 449-463
Nawfal A. Mehdi: Recursive Incentives with Guided Recruiting Encouragement. 464-474
Yu-Hsn Liu, Kok-Leong Ong, Andrzej Goscinski: Sensor-Cloud Computing: Novel Applications and Research Problems. 475-486
Web Services
Samir Elmougy: A Dynamic Web Service and Business Process Logic Composition and Consistency. 501-521
Hayat Bendoukha, Yahya Slimani, Abdelkader Benyettou: UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented Workflows. 537-548



