Full Text Documents

49

Search


Table of Contents
Multidisciplinary Research and Practice for Information Systems
Gerald Quirchmayr, Josef Basl, IlsunYou, Lida Xu, EdgarWeippl (Eds.)
Front Matter

Conference


Ontology-Based Identification of Research Gaps and Immature Research Areas
Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek
1-16
A Context-Aware Mashup Integration Guideline for Enterprise 2.0
Gerald Bader, Amin Anjomshoaa, A Tjoa
17-30
Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends
Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf
31-43
Validation of XML Documents with SWRL
Jesús Almendros-Jiménez
44-57
A Taxonomy of Dirty Time-Oriented Data
Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch
58-72
Combining Relational and Semi-structured Databases for an Inquiry Application
Marius Ebel, Martin Hulin
73-84
Hunting for Aardvarks: Can Software Security Be Measured?
Martin Jaatun
85-92
A Foundation for Requirements Analysis of Privacy Preserving Software
Kristian Beckers, Maritta Heisel
93-107
On Complexity Reduction of User Interfaces for Safety-Critical Systems
Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle
108-122
Security SLAs – An Idea Whose Time Has Come?
Martin Jaatun, Karin Bernsmed, Astrid Undheim
123-130
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept
Aneta Poniszewska-Maranda
131-145
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking
Eckehard Hermann, Udo Litschauer, Jürgen Fuß
146-160
Trust as an Organismic Trait of E-Commerce Systems
Tanja Ažderska, Borka Blažič
161-175
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones
Andreas Holzinger, Peter Treitler, Wolfgang Slany
176-189
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives
Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios Tsakalidis
190-202
Near Duplicate Document Detection for Large Information Flows
Daniele Montanari, Piera Puglisi
203-217
TinyStream Sensors
Pedro Furtado
218-232
Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data
Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Keiichi Koyanagi
233-243
Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling
Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid
244-258
Indexing and Search for Fast Music Identification
Guang-Ho Cha
259-271
Ontology-Based Retrieval of Experts – The Issue of Efficiency and Scalability within the eXtraSpec System
Elżbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz
272-286
OrderBased Labeling Scheme for Dynamic XML Query Processing
Beakal Assefa, Belgin Ergenç
287-301
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages
Anna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli
302-316
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry Perspective
Åsmund Nyre, Martin Jaatun
317-331
Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle
Monica Tirea, Ioan Tandau, Viorel Negru
332-346
Similarity of Transactions for Customer Segmentation
Ke Lu, Tetsuya Furukawa
347-359
Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues
Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz
360-374
Pay-As-You-Go Data Integration Using Functional Dependencies
Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez
375-389
Analyzing Recommender System's Performance Fluctuations across Users
Charif Haydar, Azim Roussanaly, Anne Boyer
390-402

Workshop


A Secure Distributed Video Surveillance System Based on Portable Devices
Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You
403-415
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel
Clara Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione
416-429
How to Forge a Digital Alibi on Mac OS X
Aniello Castiglione, Giuseppe Cattaneo, Roberto Prisco, Alfredo Santis, Kangbin Yim
430-444
Security-and-Privacy-Related Issues on IT Systems During Disasters
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
445-459
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary Arteries
Mirosław Trzupek, Marek Ogiela
460-467
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm
Tomasz Hachaj, Marek Ogiela
468-478
Automatic Image Annotation Using Semantic Text Analysis
Dongjin Choi, Pankoo Kim
479-487
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control
Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong
488-500
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps
Giovanni Acampora, Vincenzo Loia, Autilia Vitiello
501-515
Mobile Malware Threats and Defenses for Homeland Security
Seung-Hyun Seo, Kangbin Yim, Ilsun You
516-524
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies
Muhammad Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee
525-533
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts
Marek Zachara, Dariusz Pałka
534-546
A Formal Support for Collaborative Data Sharing
Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand
547-561
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures
Fredrik Seehusen, Bjørnar Solhaug
562-577
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation
Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai
578-592
Discussion on the Challenges and Opportunities of Cloud Forensics
Rainer Poisel, Simon Tjoa
593-608
Towards a Logical Framework for Reasoning about Risk
Matteo Cristani, Erisa Karafili, Luca Viganò
609-623
A Collaborative Approach to Botnet Protection
Matija Stevanovic, Kasper Revsbech, Jens Pedersen, Robin Sharp, Christian Jensen
624-638
Consensus Building and In-operation Assurance for Service Dependability
Yutaka Matsuno, Shuichiro Yamamoto
639-653
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping
Munkhbaatar Doyoddorj, Kyung-Hyune Rhee
654-668

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/