Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Multidisciplinary Research and Practice for Information Systems
Gerald Quirchmayr, Josef Basl, IlsunYou, Lida Xu, EdgarWeippl (Eds.)
Front Matter

Conference


Ontology-Based Identification of Research Gaps and Immature Research Areas
Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek
1-16
A Context-Aware Mashup Integration Guideline for Enterprise 2.0
Gerald Bader, Amin Anjomshoaa, A Tjoa
17-30
Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends
Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf
31-43
Validation of XML Documents with SWRL
Jesús Almendros-Jiménez
44-57
A Taxonomy of Dirty Time-Oriented Data
Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch
58-72
Combining Relational and Semi-structured Databases for an Inquiry Application
Marius Ebel, Martin Hulin
73-84
Hunting for Aardvarks: Can Software Security Be Measured?
Martin Jaatun
85-92
A Foundation for Requirements Analysis of Privacy Preserving Software
Kristian Beckers, Maritta Heisel
93-107
On Complexity Reduction of User Interfaces for Safety-Critical Systems
Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle
108-122
Security SLAs – An Idea Whose Time Has Come?
Martin Jaatun, Karin Bernsmed, Astrid Undheim
123-130
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept
Aneta Poniszewska-Maranda
131-145
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking
Eckehard Hermann, Udo Litschauer, Jürgen Fuß
146-160
Trust as an Organismic Trait of E-Commerce Systems
Tanja Ažderska, Borka Blažič
161-175
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones
Andreas Holzinger, Peter Treitler, Wolfgang Slany
176-189
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives
Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios Tsakalidis
190-202
Near Duplicate Document Detection for Large Information Flows
Daniele Montanari, Piera Puglisi
203-217
TinyStream Sensors
Pedro Furtado
218-232
Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data
Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Keiichi Koyanagi
233-243
Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling
Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid
244-258
Indexing and Search for Fast Music Identification
Guang-Ho Cha
259-271
Ontology-Based Retrieval of Experts – The Issue of Efficiency and Scalability within the eXtraSpec System
Elżbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz
272-286
OrderBased Labeling Scheme for Dynamic XML Query Processing
Beakal Assefa, Belgin Ergenç
287-301
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages
Anna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli
302-316
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry Perspective
Åsmund Nyre, Martin Jaatun
317-331
Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle
Monica Tirea, Ioan Tandau, Viorel Negru
332-346
Similarity of Transactions for Customer Segmentation
Ke Lu, Tetsuya Furukawa
347-359
Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues
Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz
360-374
Pay-As-You-Go Data Integration Using Functional Dependencies
Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez
375-389
Analyzing Recommender System's Performance Fluctuations across Users
Charif Haydar, Azim Roussanaly, Anne Boyer
390-402

Workshop


A Secure Distributed Video Surveillance System Based on Portable Devices
Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You
403-415
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel
Clara Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione
416-429
How to Forge a Digital Alibi on Mac OS X
Aniello Castiglione, Giuseppe Cattaneo, Roberto Prisco, Alfredo Santis, Kangbin Yim
430-444
Security-and-Privacy-Related Issues on IT Systems During Disasters
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
445-459
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary Arteries
Mirosław Trzupek, Marek Ogiela
460-467
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm
Tomasz Hachaj, Marek Ogiela
468-478
Automatic Image Annotation Using Semantic Text Analysis
Dongjin Choi, Pankoo Kim
479-487
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control
Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong
488-500
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps
Giovanni Acampora, Vincenzo Loia, Autilia Vitiello
501-515
Mobile Malware Threats and Defenses for Homeland Security
Seung-Hyun Seo, Kangbin Yim, Ilsun You
516-524
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies
Muhammad Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee
525-533
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts
Marek Zachara, Dariusz Pałka
534-546
A Formal Support for Collaborative Data Sharing
Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand
547-561
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures
Fredrik Seehusen, Bjørnar Solhaug
562-577
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation
Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai
578-592
Discussion on the Challenges and Opportunities of Cloud Forensics
Rainer Poisel, Simon Tjoa
593-608
Towards a Logical Framework for Reasoning about Risk
Matteo Cristani, Erisa Karafili, Luca Viganò
609-623
A Collaborative Approach to Botnet Protection
Matija Stevanovic, Kasper Revsbech, Jens Pedersen, Robin Sharp, Christian Jensen
624-638
Consensus Building and In-operation Assurance for Service Dependability
Yutaka Matsuno, Shuichiro Yamamoto
639-653
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping
Munkhbaatar Doyoddorj, Kyung-Hyune Rhee
654-668

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/