


default search action
ICeND 2011: Dar-es-Salaam, Tanzania
- Jim James Yonazi, Eliamani Sedoyeka, Ezendu Ariwa, Eyas El-Qawasmeh:

e-Technologies and Networks for Development - First International Conference, ICeND 2011, Dar-es-Salaam, Tanzania, August 3-5, 2011. Proceedings. Communications in Computer and Information Science 171, Springer 2011, ISBN 978-3-642-22728-8
Social Networks
- Przemyslaw Kazienko

, Elzbieta Kukla, Katarzyna Musial, Tomasz Kajdanowicz, Piotr Bródka
, Jaroslaw Gaworecki:
A Generic Model for a Multidimensional Temporal Social Network. 1-14
Ad Hoc Networks
- Sudip Misra, Parimala Venkata Krishna

, Akhil Bhiwal, Amardeep Singh Chawla, Bernd E. Wolfinger:
An Adaptive Learning Approach for Fault-Tolerant Routing in Ad Hoc Networks. 15-25 - Amos Nungu, Terrence E. Brown

, Björn Pehrson:
Challenges in Sustaining Municipal Broadband Networks in the Developing World. 26-40
E-learning
- Ezendu Ariwa, Virginia E. Ejiofor, Ibeabuchi Emeka, Chiaha Jude Chukwudi:

Corporate Green Technology and Grid-Driven e-Learning Framework in Developing Economy. 41-51 - Fabio Bertarelli, S. Padoa, Giacomo Guaraldi

, Elisabetta Genovese
, Matteo Corradini, Betty Mayeku, Juma Kilwake:
Low Cost Wireless Technology and Digital Board for Education in Rural Kenya. 52-60
Neural Networks
- Ondrej Krejcar

:
Utilization of C# Neural Networks Library in Industry Applications. 61-72
Mobile Networks
- Daniel Philip Venmani, Yvon Gourhant, Djamal Zeghlache

:
Preliminary Analysis of 4G-LTE Mobile Network Sharing for Improving Resiliency and Operator Differentiation. 73-93
Web Ontology
- Pavel Tyl:

Ontology Matching for Web Services Composition. 94-103
Biometrics Technologies
- A. Naveena Lakshmi, S. Khatun, S. A. AlShehri:

A Preview Study on UWB Imaging System to Detect Early Breast Tumor. 104-115
Networks
- Sudip Misra, Parimala Venkata Krishna

, Vankadara Saritha:
Learning Automata-Based Reservation Scheme for Channel Allocation in Wireless Networks. 116-126
Information and Data Management
- Christian Malus:

Modified IT-Project Management Interventions for an Increased Economic Impact. 127-134
Computational Intelligence
- Sylvia B. Encheva:

Management of Different Format Initial Data. 135-144
Network Security
- Dennis Luke Owuor, Guoyuan Qi

:
Message Signal Encryption Based on Qi Hyper-Chaos System. 145-155
Artificial Intelligence
- Ovidiu Aritoni, Viorel Negru

:
A Multi-Agent Recommendation System for Energy Efficiency Improvement. 156-170
Security
- Virginiah Sekgwathe, Mohammad Talib:

Cyber Crime Detection and Protection: Third World Still to Cope-Up. 171-181
Sensor Network
- Marek Penhaker

, Monika Darebnikova, Martin Cerný
:
Sensor Network for Measurement and Analysis on Medical Devices Quality Control. 182-196
Web Applications
- Tsui-Chuan Hsieh, Chyan Yang:

Multi-Level Latent Class Analysis of Internet Use Pattern in Taiwan. 197-208
Web Services
- Vitezslav Nezval, Francois Bartolo:

A Model for Easy Public Searching of Web Services. 209-222 - Vladimir Kasik, Marek Penhaker

, Vilém Novák, Radim Bridzik, Jakub Krawiec:
User Interactive Biomedical Data Web Services Application. 223-237 - Ondrej Krejcar

, Leona Motalova:
Home Care Web Services Evaluation by Stress Testing. 238-248
Wireless Communications
- Ondrej Krejcar

:
Weight Reduction of Players by Active Playing Using Accelerometers. 249-260
Others
- Christophe Guéret

, Stefan Schlobach
:
SemanticXO: Connecting the XO with the World's Largest Information Network. 261-275 - Ezendu Ariwa, Daminni Grover:

Digital Marketization of e-CRM in Effective Delivery of Financial Engineering in Global Organisations: Trends, Benefits and Critical Meta-Dynamic Issues. 276-284 - Roman Spánek, Daniel Kouril, Martin Kuba

, Michal Procházka:
Reputation Based Trust Management System Supporting Collaboration in a Medical Application. 285-297 - Daniel Koloseni, Faith Shimba

:
Challenges Associated with ICT Asset Disposal in Tanzania. 298-308 - Nurjannaton Hidayah Rais, Muhamad Taufik Abdullah

, Rabiah Abdul Kadir
:
Malay-English Cross-Language Information Retrieval: Compound Words and Proper Names Handling. 309-317 - Mouna Bouarioua, Allaoua Chaoui

, Raida Elmansouri:
From UML Sequence Diagrams to Labeled Generalized Stochastic Petri Net Models Using Graph Transformation. 318-328 - D. Leghroudi, M. Belfkih, Noureddine Moumkine, M. Ramdani:

Differentiation Intra Traffic in the IPTV over IMS Context. 329-336 - Reza Javidan

:
Seabed Image Texture Analysis Using Subsampled Contourlet Transform. 337-348 - Muhammad Asif Khan, Varun Jeoti, Rana Shahid Manzoor:

Secure Interleaving - Physical Layer Security Enhancement of OFDM Based System. 349-361

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














