default search action
Journal of Digital Information Management, Volume 7
Volume 7, Number 1, February 2009
- Gaurav Bhatnagar, Balasubramanian Raman, Krishnan Swaminathan:
Dual Watermarking Scheme for Copyright Protection and Authentication. J. Digit. Inf. Manag. 7(1): 2-8 (2009) - Giovanna Castellano, Anna Maria Fanelli, Maria Alessandra Torsello:
The NEWER system: how to exploit a Neuro-fuzzy strategy for Web recommendation. J. Digit. Inf. Manag. 7(1): 9-15 (2009) - Azzam Sleit, Wesam Almobaideen, Mohammad Qatawneh:
A Query Answering Surveillance System for Detecting and Tracking Moving Objects using Bounding Rectangles. J. Digit. Inf. Manag. 7(1): 16-21 (2009) - Dion Hoe-Lian Goh, Chei Sian Lee, Alton Yeow-Kuan Chua, Brendan Luyt:
Design and Development of a Query Graph Visualization System. J. Digit. Inf. Manag. 7(1): 22-30 (2009) - Saïd Bettayeb, David A. Hoelzeman:
Upper and Lower bounds on the Pagenumber of the Book Embedding of the k-ary Hypercube. J. Digit. Inf. Manag. 7(1): 31-35 (2009) - Jianquan Liu, Hanxiong Chen, Kazutaka Furuse, Nobuo Ohbo:
Improving User's Web Search Experience by Interactive Re-ranking and Zooming Interfaces. J. Digit. Inf. Manag. 7(1): 36-44 (2009) - Abdullah Abdulaziz Al-Tameem:
Nanotechnology Development and Sub-Technologies Effect. J. Digit. Inf. Manag. 7(1): 45-53 (2009)
Volume 7, Number 2, April 2009
- Richard Chbeir, Youakim Badr:
Editorial Preface. J. Digit. Inf. Manag. 7(2): 59-62 (2009)
- Somchart Fugkeaw, Piyawit Manpanpanich:
Design and Development of the Dynamic DRBAC Model using PMI and XACML-based Authorization. J. Digit. Inf. Manag. 7(2): 63-73 (2009) - Somchart Fugkeaw, Piyawit Manpanpanich:
Data Authentication and the Corresponding Provenance Information Management. J. Digit. Inf. Manag. 7(2): 74-82 (2009) - Ali M. Al-Haj, Tuqa Manasrah:
SVD-Based Image Water marking. J. Digit. Inf. Manag. 7(2): 83-89 (2009) - Alexander Kolesnikov:
Vector maps compression for progressive transmission over the Internet. J. Digit. Inf. Manag. 7(2): 90-95 (2009) - Xin Xu, Martin Tomlinson, Marcel Ambroze, Mohammed Zaki Ahmed:
Biorthogonal Matrix Dirty Paper Coding for Information Hiding in Still Images. J. Digit. Inf. Manag. 7(2): 96-105 (2009) - Francesco Buccafurri, Gianluca Lax:
Signing Digital Documents in Hostile Environments. J. Digit. Inf. Manag. 7(2): 106-113 (2009) - Andreas Juffinger, Thomas Neidhart, Michael Granitzer, Roman Kern, Albert Weichselbraun, Gerhard Wohlgenannt, Arno Scharl:
Distributed Web 2.0 Crawling for Ontology Evolution. J. Digit. Inf. Manag. 7(2): 114-119 (2009) - Tilmann Rabl, Christoph Koch, Günther Hölbling, Harald Kosch:
Design and Implementation of the Fast Send Protocol. J. Digit. Inf. Manag. 7(2): 120-127 (2009)
Volume 7, Number 3, June 2009
- Cheng-Chi Lee, Chu-Chi Yang, Shiow-Yuan Huang:
A New Authentication Scheme for Session Initiation Protocol. J. Digit. Inf. Manag. 7(3): 133-142 (2009) - Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey:
A Framework for Improving Integrity Constraints Checking of Mobile Databases by Caching Relevant Data Items. J. Digit. Inf. Manag. 7(3): 143 (2009) - Xiantong Li, Wei Zhang, Jianzhong Li:
A Novel Graph Containment Query Algorithm on Graph Databases. J. Digit. Inf. Manag. 7(3): 143-151 (2009) - Lichun Kang, Kah Bin Lim, Jin Yao:
Image Recognition of Occluded Objects Based on Improved Curve Moment Invariants. J. Digit. Inf. Manag. 7(3): 152-158 (2009) - Tudor Cioara, Ionut Anghel, Ioan Salomie, Mihaela Dînsoreanu:
A Generic Context Model Enhanced with Self-Configuring Features. J. Digit. Inf. Manag. 7(3): 159-165 (2009) - Christophe Gravier, Jacques Fayolle, Jérémy Lardon, Bernard Bayard:
About the reusable software Remote Laboratories have in common. J. Digit. Inf. Manag. 7(3): 166-172 (2009) - Javier García-Zubía, Pablo Orduña, Unai Hernández, Ignacio Angulo, Jaime Irurzun:
Students' review of acceptance, usability and usefulness of WebLab-Deusto. J. Digit. Inf. Manag. 7(3): 173-177 (2009) - Michael E. Auer, Danilo Garbi Zutin:
Mobile Lab Clients for testing Application Specific Integrated Circuits in Education. J. Digit. Inf. Manag. 7(3): 178-184 (2009) - Mary Magdalene Jane F., Ilayaraja N., R. Nadarajan, Maytham Safar:
Cache Pre-fetching and Replacement strategies for location dependent data in mobile environments. J. Digit. Inf. Manag. 7(3): 185 (2009)
Volume 7, Number 4, August 2009
- Abdul Sattar, Renaud Séguier:
HGOAAM: Facial Analysis by Active Appearance Model Optimized by Hybrid Genetic Algorithm. J. Digit. Inf. Manag. 7(4): 193-201 (2009) - Dell Zhang, Wee Sun Lee:
Query-By-Multiple-Examples using Support Vector Machines. J. Digit. Inf. Manag. 7(4): 202-210 (2009) - Maria Biryukov:
Where do the authors come from? J. Digit. Inf. Manag. 7(4): 211-218 (2009) - José Bringel Filho, Hervé Martin:
Towards Awareness of Privacy and Quality of Context in Context- Based Access Control for Ubiquitous Applications. J. Digit. Inf. Manag. 7(4): 219-226 (2009) - Teppei Shimada, Tatsuo Tsuji, Ken Higuchi:
A Secondary Storage Scheme for Multidimensional Data Preserving Proximity. J. Digit. Inf. Manag. 7(4): 227-234 (2009) - Efthimios Tambouris, Nikolaos Loutas, Vassilios Peristeras, Konstantinos A. Tarabanis:
The Role of Interoperability in eGovernment Applications: An Investigation of Critical Factors. J. Digit. Inf. Manag. 7(4): 235-243 (2009) - Nikitas N. Karanikolas:
CUDL Language Semantics: Conditions. J. Digit. Inf. Manag. 7(4): 244-251 (2009)
Volume 7, Number 5, October 2009
- Cathal Gurrin, Tjalve Aarflot, Sorin Sav, Dag Johansen:
Addressing the Challenge of Managing Large-scale Digital Multimedia Libraries. J. Digit. Inf. Manag. 7(5): 262-270 (2009) - Esraa Omran, Albert Bokma, Shereef Abu Al-Maati, David Nelson:
Implementation of a Chain Ontology Based Approach in the Health Care Sector. J. Digit. Inf. Manag. 7(5): 271-276 (2009) - Abdullah M. Alnajim, Malcolm Munro:
Detecting Phishing Websites: On the Effectiveness of Users' Tips. J. Digit. Inf. Manag. 7(5): 277-282 (2009) - Sofia Stamou, Nikos Mpouloumpasis, Lefteris Kozanidis:
Deriving the Impact of Scientifi c Publications by Mining Citation Opinion Terms. J. Digit. Inf. Manag. 7(5): 283-289 (2009) - Santi Caballé, Àgata Lapedriza, David Masip, Fatos Xhafa, Ajith Abraham:
Enabling Automatic Just-in-time Evaluation of In-class Discussions in On-line Collaborative Learning Practices. J. Digit. Inf. Manag. 7(5): 290-297 (2009) - Wan Abdul Rahim Wan Mohd Isa, Nor Laila Md. Noor, Shafie Mehad:
Web Architectural-Inducing Model (WA-IM) for Information Architecture in Cultural Context: An Empirical Investigation. J. Digit. Inf. Manag. 7(5): 298-305 (2009) - Michael Granitzer, Andreas S. Rath, Mark Kröll, Christin Seifert, Doris Ipsmiller, Didier Devaurs, Nicolas Weber, Stefanie N. Lindstaedt:
Machine Learning based Work Task Classification. J. Digit. Inf. Manag. 7(5): 306-313 (2009) - Fabrice Matulic:
Image-Based Technique To Select Visually Salient Pages In Large Documents. J. Digit. Inf. Manag. 7(5): 314-318 (2009) - Ahmad Noraziah, M. N. Noorhuzaimi, S. Junaida:
Smart Electronic Visitor Information Management System with Biometric Verification. J. Digit. Inf. Manag. 7(5): 319-323 (2009)
Volume 7, Number 6, December 2009
- Pascal Bruegger, Vincenzo Pallotta, Béat Hirsbrunner:
Optimizing Heating System Management Using An Activity-Based Pervasive Application. J. Digit. Inf. Manag. 7(6): 327-335 (2009) - Mohammed Ibrahim Alodib, Behzad Bordbar, Basim Majeed:
On automated generation of Diagnosers in Fault tolerant Service oriented Architectures. J. Digit. Inf. Manag. 7(6): 336-342 (2009) - Yiran Gao, Chris I. Phillips, Liwen He:
GA and PSO-based Resource Scheduling for Orchestrated, Distributed Computing. J. Digit. Inf. Manag. 7(6): 343-351 (2009) - Jacques M. Bahi, Mirna Eskandar, Ahmed Mostefaoui:
Maximizing Mobile Multimedia Adhoc Networks Lifetime Using a Distributed Cooperation mechanism. J. Digit. Inf. Manag. 7(6): 352-357 (2009) - Chi-Nan Lin, Chin-Chen Chang, Mien-Tsung Tsai:
An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique. J. Digit. Inf. Manag. 7(6): 358-364 (2009) - Renata L. M. E. do Rego, Márcio Ribeiro, Emanuella A. de Barros, Renata M. C. R. de Souza:
A Self-organizing Based Approach for Bug Reports Retrieval. J. Digit. Inf. Manag. 7(6): 365-370 (2009) - Dorothy Ndedi Monekosso, Paolo Remagnino:
Discovering Patterns of Behavior in a Smart Home. J. Digit. Inf. Manag. 7(6): 371-376 (2009) - Fouzi Harrag, Eyas Al-Qawasmah:
Performance of Decision Trees on Arabic Text Categorization. J. Digit. Inf. Manag. 7(6): 377-382 (2009) - Khaled Mahdi, Maytham Safar, Ibrahim Sorkhoh, Ali Kassem:
Cycle-Based versus Degree-based Classification of Social Networks. J. Digit. Inf. Manag. 7(6): 383-389 (2009)
- Douglas B. Bock, Bijoy Bordoloi, Susan E. Yager:
High Availability with Oracle 11g Data Guard. J. Digit. Inf. Manag. 7(6): 390-398 (2009)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.