default search action
Thomas Ndié Djotio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j10]Bernabé Batchakui, Thomas Ndié Djotio, Ibrahim Moukouop, Alex Ndouna:
Object-Based Trace Model for Automatic Indicator Computation in the Human Learning Environments. Int. J. Emerg. Technol. Learn. 16(21) (2021) - 2018
- [j9]Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Ndié Djotio:
Survey on RPL enhancements: A focus on topology, security and mobility. Comput. Commun. 120: 10-21 (2018) - [j8]H. Kamdem Fezeu, Thomas Ndié Djotio, Rachid Oulad Haj Thami:
Approaching decentralized non-repudiation. EAI Endorsed Trans. Ubiquitous Environ. 4(13): e2 (2018) - 2017
- [j7]Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Djotio Ndié:
Architecture for an efficient integration of wireless sensor networks to the Internet through Internet of Things gateways. Int. J. Distributed Sens. Networks 13(11) (2017) - 2016
- [j6]Soulamite Judith Nouho Noutat, Thomas Djotio Ndié, Claude Tangha:
Campharma: A Mobile Tool For Interaction Between Pharmacies And Patients in Cameroon. Electron. J. Inf. Syst. Dev. Ctries. 76(1): 1-10 (2016) - 2012
- [j5]Thomas Ndié Djotio, Claude Tangha, Guy Bertrand Fopak:
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents. J. Information Security 3(4): 281-294 (2012) - 2011
- [j4]Bernabe Batchakui, Thomas Ndié Djotio, Claude Tangha:
VeSMEL: A Novel Approach for Distance Management of E-Learning Platforms. Int. J. Emerg. Technol. Learn. 6(S2): 20-24 (2011) - [j3]Thomas Ndié Djotio, Claude Tangha, Tam Sangbong, Armstrong Formenah Kufor:
Mobile Applications Provisioning Using Bluetooth Wireless Technology. J. Softw. Eng. Appl. 4(2): 95-105 (2011) - 2010
- [j2]Thomas Ndié Djotio, Claude Tangha, Fritz Ekwoge Ekwoge:
MDA (Model-Driven Architecture) as a Software Industrialization Pattern: An Approach for a Pragmatic Software Factories. J. Softw. Eng. Appl. 3(6): 561-571 (2010) - 2008
- [j1]Thomas Ndié Djotio, Claude Tangha, Florette Ngangue Tchangoue, Bernabe Batchakui:
MONI: Mobile Agents Ontology based for Network Intrusions Management. Int. J. Adv. Media Commun. 2(3): 288-307 (2008)
Conference and Workshop Papers
- 2020
- [c10]Requi Djomo, Thomas Djotio Ndié:
Towards Preventing Neighborhood Attacks: Proposal of a New Anonymization's Approach for Social Networks Data. BDTA/WiCON 2020: 195-208 - 2017
- [c9]H. Kamdem Fezeu, Thomas Ndié Djotio, Rachid Oulad Haj Thami:
Safe and Irrefutable Decentralized Communication: Bringing Non-Repudiation to Mesh Networks. BDCA 2017: 37:1-37:6 - 2015
- [c8]Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Ndié Djotio:
On design and deployment of fuzzy-based metric for routing in low-power and lossy networks. LCN Workshops 2015: 789-795 - 2013
- [c7]Patrick Olivier Kamgueu, Emmanuel Nataf, Thomas Ndié Djotio, Olivier Festor:
Energy-based Metric for the Routing Protocol in Low-power and Lossy Network. SENSORNETS 2013: 145-148 - 2012
- [c6]Thomas Djotio Ndié:
RuKaCS: A Community Services and Proximity Networks Project Framework for Bridging Digital Divide in Rural Cameroon. AFRICOMM 2012: 34-44 - [c5]Soulamite Judith Nouho Noutat, Thomas Djotio Ndié, Claude Tangha:
Wireless Community Network Services: Opportunities and Challenges for DCs: Case of Rural Cameroon. AFRICOMM 2012: 308-317 - [c4]Christian Engelbert Ngono, Thomas Djotio Ndié:
Implementation of a Function VoWiFi Communication on Android-x86. AFRICOMM 2012: 318-322 - [c3]Nono Louenkam Guy Gaspard, Thomas Djotio Ndié:
An Approach of Making Telephony in a Local Wireless Environment: Application to Bluetooth Technology. AFRICOMM 2012: 323-330 - 2010
- [c2]Thomas Ndié Djotio, Bernabe Batchakui, Claude Tangha:
VeSMDiag: a very short message protocol (VeSMp) based system for remote medical diagnosis. ICEGOV 2010: 369-370 - 2007
- [c1]Thomas Ndié Djotio, Claude Tangha, Georges Edouard Kouamou:
VESMP (Very Short Message Protocol) an SMS-based Protocol for Process Monitoring and System Remote Administration. WINSYS 2007: 25-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint