|
2011 |
Bassam Jamil Mohd, Sa’ed Abed, Bassam Alnaami, and Sahel Alouneh,"Image Steganography Optimization Technique",proceeding of the International Conference on Advances in Signal & Image Processing - ASP 2011, Springer,Amesterdam, Netherlands,2011 |
|
2011 |
M. Al-Addous, C, Class,"esign and Evaluation of an Instructional Solar Energy Technologies Lab",International Journal of Online Engineering,Vol. 7, pp. 6-13,2011 |
|
2011 |
Abou-Tair DeDI, I. Köster, K. Höfke,"Security and privacy requirements in interactive TV",The ACM/Springer Multimedia Systems Journal,Vol. 17, pp. 393-408,2011 |
|
2011 |
S. Al-Agtash,"Workforce Assessment in the Jordanian ICT Industry",International Journal of Social and Organizational Dynamics in IT,Vol. 1(4), pp. 18-36,2011 |
|
2010 |
Dr. Ismail Hababeh,"Intelligent Network Communications for Distributed Database Systems",Proceedings of the Second International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2010),IEEE- DOI 10.1109/DBKDA.2010, April 11-16,Les Menuries, France,2010 |
|
2010 |
Feras Al-Hawari, Taranjit Kukal , Ambrish Varma, Wenliang Dai, and John Lin,"Extending/Leveraging IBIS Constructs to Model High-Speed I/Os and Packages using AMI, Spice, and S-Parameters",Asian IBIS Summit,Shenzhen, China, November,2010 |
|
2010 |
M. Bourimi, DeDI, Abou-Tair, D. Kesdogan, T. Barth, K. Höfke ,"Evaluating Potentials of Internet- and Web-based Socialtv in the Light of Privacy",Social Computing (SocialCom), 2010 IEEE Second International Conference on., aug., 2010. , pp. 1135 -1140.,2010 |
|
2010 |
C. Class, D. Zellhöfer,"Gewissensbits - Wie würden Sie urteilen? Fallbeispiel Online-Banking",Informatik Spektrum,Vol. 33(3),2010 |
|
2010 |
C. Class, D. Zellhöfer,"Gewissensbits - Wie würden Sie urteilen? Fallbeispiel Anonymisierer",Informatik Spektrum,Vol. 33(4),2010 |
|
2010 |
Mohamed Bourimi, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan, Thomas Barth, and Kathrin Hofke,"Evaluating potentials of internet- and web-based socialtv in the light of privacy",In Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010,Minneapolis, Minnesota, USA,2010 |
|
2009 |
Mohamed Bourimi, Falk Kuhnel, Jorg M. Haake, Dhiah el Diehn I. Abou- Tair, and Dogan Kesdogan,"Tailoring collaboration according privacy needs in real-identity collaborative systems. In Groupware: Design, Implementation, and Use",15th International Workshop, CRIWG 2009,Peso da Regua,
Douro, Portugal,2009 |
|
2009 |
C. Class,"Ethical Issues related to the Use of E-Portfolios",In The Potential of E-Portfolios in Higher Education. Studienverlag,2009 |
|
2009 |
C. Class,"ICT Based Education For Cultural Literacy?",In Ubiquitous ICT for Sustainable Education and Cultural Literacy. (84),2009 |
|
2009 |
C. Class, D. Weber-Wulff,"Gewissensbits - Wie würden Sie urteilen? Fallbeispiel Medizinische Datensammlung",Informatik Spektrum,Vol. 32(5),2009 |
|
2009 |
D. Weber-Wulff, C. Class, W. Coy, C. Kurz, D. Zellhöfer ,"Gewissensbisse Ethische Problemfelder der Informatik Biometrie - Datenschutz - geistiges Eigentum",transcript Verlag,2009 |