Search and Find
Service
More of the content
Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings (Communications in Computer and Information Science, Vol 54)
Title Page
2
Preface
5
Organization
7
Table of Contents
11
Keynote Talks
11
Service Discovery Protocols for VANET Based Emergency Preparedness Class of Applications: A Necessity Public Safety and Security
15
Introduction
15
Importance of Service Discovery for Emergency Preparedness and Response Class of Application in Vehicular Networks
16
Discovery of Safety Services
16
Discovery of Convenience Services
18
Service Discovery Architectures for Vanets
18
Directory-Based Architecture
19
Directory-Less Architecture
19
Hybrid Architecture
20
Conclusion
20
References
20
High-End Analytics and Data Mining for Sustainable Competitive Advantage
22
Introduction
22
Methods
24
Improving Sentiment Analysis Using Linguistic and Machine Learning Approaches
24
Mining Online Customer Reviews for Ranking Products
26
Conclusions
28
References
28
Resource Allocation for Energy Efficient Large-Scale Distributed Systems
30
Introduction
30
Holistic Energy-Aware S&RA Framework
31
Overview of the Framework
31
Key Characteristics
31
Preliminary Findings
32
Energy-Conscious Task Scheduling Using Dynamic Voltage Scaling
32
Experimental Results
32
Conclusion
33
References
33
Information Systems
11
Social Cognitive Theory in IS Research – Literature Review, Criticism, and Research Agenda
34
Introduction
34
Social Cognitive Theory: An Overview
35
Social Cognitive Theory in IS Research
36
Research Method and Data Analysis
38
Results
38
Discussion and Future Research
40
Self-efficacy Theory versus Social Cognitive Theory
40
Inter-influence between Self-efficacy and Outcome Expectations
41
Lack of Emotional Considerations
41
Key Role of Past Experience
41
Triadic Reciprocality
42
Dependent Variables and Unexplored Effects
42
Towards an SCT Meta-framework for Future Guidance
42
Conclusion
43
References
43
Knowledge Intensive Business Processes: A Process-Technology Fit Perspective
46
Introduction
46
Research Method
48
Results
49
Theoretical Background – Task-Technology Fit and KIBPs
52
Contributions and Conclusions
55
References
56
A Web Service Similarity Refinement Framework Using Automata Comparison
58
Introduction
58
Motivating Example
59
Translation of OWL-S Representation into Automata
60
OWL-S and OWL-S Parser
60
Automata for OWL-S Control Constructs
61
Translation of Web Services Using Automata
63
Web Service Similarity Measuring Framework
65
Equivalence of Web Services and Regular Languages
65
Similarity Measuring Framework
66
Related Work
67
Conclusion
68
References
68
A System for Analyzing Advance Bot Behavior
70
Introduction
70
Related Work
71
Behavior Analysis System of Advanced Bot
72
Kernel-Level Behavior Monitoring and Thwarting Virtual Machine Detection
72
Thwarting Static-DLL/Binary Code Injection
74
Experiments and Evaluation
75
Conclusion and Future Work
76
References
77
Two Approaches to Handling Proactivity in Pervasive Systems
78
Introduction
78
Related Work
79
Architectures of Daidalos and Persist Pervasive Systems
80
Approaches to Proactivity
82
Proactivity in Daidalos
82
Proactivity in Persist
84
Conclusion and Future Work
88
References
89
A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management
90
Introduction
90
Related Work
92
WLAN Security Policy Management System
94
Proposed Spatio-Temporal RBAC Model for WLAN Policy Management
95
Modeling Location
95
Modeling Time
95
Modeling Basic RBAC Entities in the Proposed System
96
Modeling of Global Policy
97
Analysis with Case Study
99
Conclusion
101
References
101
Proposing Candidate Views for Materialization
103
Introduction
103
Algorithm PVGA
105
Examples
108
Experimental Results
109
Conclusion
111
References
112
A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial Information
113
Introduction
113
Overview of the Fuzzy Geospatial Reasoning Framework
115
Fuzzy Geospatial Data Modeling
116
Fuzzy Classes
117
Fuzzy Association
117
Enterprise GIS Framework for Geospatial Web Services
118
Fuzzy Reasoning
119
Case Study
119
Conclusion
123
References
123
Information Technology
12
Dynamic Web Service Composition Based on Operation Flow Semantics
125
Introduction
125
Literature Survey and Brief Review
126
A Model for Web Service Description, Discovery and Composition
127
The Broker Based Architecture for Compositions
128
Architectural Roles and Operations
128
Extending Service Knowledge Structure
130
Dynamic Composition of Web Services Based on Operation Flow
131
Implementation and Experiments
133
Conclusion
134
References
134
Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage Problems
137
Introduction
137
Background
138
The Adjustable Range Model
139
Distributed Algorithms Using Adjustable Range
140
Adjustable Range Load Balancing Protocol (ALBP)
140
Adjustable Range Deterministic Energy Efficient Protocol (ADEEPS)
141
Simulations
142
Conclusion
145
References
145
Verifiable ($t$, $n$) Threshold Secret Sharing Scheme Using $ECC$ Based Signcryption
147
Introduction
147
Previous Work
149
ProposedWork
150
Harn and Lin [17] Scheme
150
Signcryption Scheme
151
Description of the Proposed Scheme
152
Security Analysis
155
Conclusion
157
References
157
Model-Based Software Reliability Prediction
159
Introduction
159
Related Work
160
An Overview of Our Approach
160
Metrics Used in Our Approach
161
Implementation of UML Metric Calculator
162
Neural Network
163
General Regression Neural Network (GRNN)
163
Principal Component Analysis
163
Empirical Study
164
Goodness of Fit
164
Results
166
Comparison with Related Work
167
Conclusion
167
References
168
Real-Time Power-Aware Routing Protocol for Wireless Sensor Network
170
Introduction
170
Real-Time Power-Aware Routing Protocol for Wireless Sensor Network (RTPA)
172
Neighbor Management
173
Design Overview
173
Path Delay Estimation
174
Routing Decisions
174
Simulation and Performance Evaluation
175
Conclusion
178
References
179
Document Clustering with Semantic Features and Fuzzy Association
181
Introduction
181
Related Works
182
LSA and Fuzzy Association Theory
183
Latent Semantic Analysis
183
Fuzzy Association Theory
184
The Proposed Document Clustering Method
184
Preprocessing
185
Cluster Label Extraction by LSA
185
Document Clustering by Fuzzy Association
186
The Proposed Document Clustering Algorithm
186
Performance Evaluations
187
Conclusions
188
References
188
Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based Handover
190
Introduction
190
Related Works
191
Proposed Cross-Layer HO Mechanisms
192
First Feature: Combination of Control Messages
192
Second Feature: New CoA Generation Method
192
Description of the Proposed Scheme
193
Performance Evaluation
194
Simulation Settings
194
Simulation Results
196
Conclusion
199
References
199
Information Management
12
Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods
201
Introduction
201
Literature Review
202
The Structure of a Grid Resource Market
203
Characteristics of the Market
203
Risk Cases
203
Entities
203
Resources
204
Risk-Aware Resource Brokering Strategies
204
Self-insurance
204
Risk-Performance Preference Specification
205
Evaluation
206
Simulation Design
207
Results
208
Conclusions and Discussions
209
References
210
A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in India
212
Introduction
212
Overview of IS and CMC
213
Brief History of the Development of the Socio-Technical Model
213
Literature Review: A Summary
213
The India Perspective
215
Research Methods
215
Results
216
Satisfaction with the New Media on Social and Economic Dimensions of Task Performance
216
Discussion and Conclusion
221
References
222
Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers
224
Introduction
224
Related Work
225
Definitions
226
Spam Categorization Framework
226
TestData
227
Basic Attribute Set
227
Aggregating Friend and Follower Attributes
228
Trust Propagation
228
Experiments
229
Evaluation Criteria
230
Results
230
Conclusion and Future Work
233
References
234
Encouraging Cooperation in Ad-Hoc Mobile-Phone Mesh Networks for Rural Connectivity
235
Introduction
235
P2P Mobile-Phone Networks
236
MANETS vs. Phone Mesh Networks
237
Multi-hop Cellular Networks vs. Phone Mesh Networks
237
Related Work
238
System Model
239
Incentive Structure
240
Relay Policies
240
User Behavior
241
Simulations
241
Evaluation
242
Conclusions and Future Work
244
References
245
Fuzzontology: Resolving Information Mining Ambiguity in Economic Intelligent Process
246
Introduction
246
The Misconceptions amongst Data, Information and Knowledge
247
Ontological Framework for Knowledge Reconciliation n EI
251
Fuzzontology
252
Conclusion and Future Work
255
References
256
Personalizing Web Recommendations Using Web Usage Mining and Web Semantics with Time Attribute
258
Introduction
258
Related Research
259
Motivation
259
Proposed System
260
Web Log Processing
261
Web Usage Mining
261
Web Semantic Mining
262
Recommendation Engine
262
Experimental Setup
263
Results and Evaluation
264
Conclusion and Future Work
267
References
268
Towards Analyzing Data Security Risks in Computing Environments
269
Introduction
269
Security Issues and Challenges
271
Security Advantages in Cloud Environments
271
Security Disadvantages in Cloud Environments
272
Survey
273
Risk Analysis Approach
274
Need of a Risk Analysis Approach
274
Risk Assessment Using Trust Matrix
275
Risk Analysis
276
Related Work
277
Conclusion
278
References
278
Time-Sequential Emotion Diagnosis Based on the Eye Movement of the User in Support of Web-Based e-Learning
280
Introduction
280
System Configuration
282
Procedure for Obtaining the Criteria for Classifying the Emotions of e-Learning Users
283
Emotion Classification
283
Emotion Procedure for Deriving the Criteria for Eye Movement Signals
283
Measurements to Determine the Diagnostic Criteria
284
Algorithm for Emotion Diagnosis and Its Performance
286
Conclusion
288
References
288
Critical Success Factors in Managing Virtual Teams
289
Introduction
289
A Framework to Analyze Success Factor to Manage Virtual Teams
290
Relational and Structural Dimensions
291
Relational and Technical Dimensions
292
Conclusion and Future Research
293
References
294
Applications
13
3D Reconstruction and Camera Pose from Video Sequence Using Multi-dimensional Descent
296
Introduction
296
Methodology
298
Experimental Results
300
Experiment in a Synthetic Environment
301
Experiment in a Real-World Environment
302
Conclusion
305
References
305
Adapting Content Presentation for Mobile Web Browsing
307
Introduction
307
Related Work
308
A Hybrid Presentation Adaptation Approach
309
Tree-View Adaptation
309
Hierarchical Text Summarization
311
Keyword Highlighting
312
Evaluation
313
Discussion
315
Conclusion and Future Work
316
References
316
Application of Decision Tree Technique to Analyze Construction Project Data
318
Introduction
318
Related Work
319
Decision Tree
319
Methodology
320
Method to Combine Multiple Variables
320
Application of the Method
321
Selecting the Attribute at Root Node
321
Defining Threshold to Stop Growing the Tree
323
Meanings Derived from the Decision Tree Data Analysis
323
Use of Method to Calculate Labor Requirement and Comparison with the Standard Labor Productivity
324
Conclusion
327
References
327
Effects of Initial Search Bound on the Performance of Self-adaptive Evolutionary Computation Methods
328
Introduction
328
Analysis of Self-adaptive EC Methods
330
Test-Functions and Simulation
331
Results and Discussion
332
Conclusions
337
References
337
Short Papers
13
A Computational Study of Margining Portfolios of Options by Two Approaches
339
Introduction
339
Strategy-Based Approach
340
Risk-Based Approach
341
DesignoftheExperiment
342
Results of the Experiment
344
References
346
Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map
347
Introduction
347
Proposed Method
348
Generation of Synthetic Images
348
Rotation and XORing
348
Mixing and XORing
349
Decryption
349
Security and Performance Analysis
349
Statistical Analysis
349
Sensitivity Analysis of the Encryption
350
Conclusion
351
References
352
Linear Multivariable System Reduction Using Particle Swarm Optimization and A Comparative Study Using Relative Integral Square Error
353
Introduction
353
Description of the Algorithm
354
Retention of Dominant Poles of HOS in LOS [11, 16, 20]
354
Determination of the Numerator Coefficients of LOS by Particle Swarm Optimization Technique
355
Practical Power System under Study
357
Application of the Proposed Algorithm to the Power System and Simulation Results
357
Conclusions
359
References
360
An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems
362
Introduction
362
Related Work
363
The Proposed Model
363
Query Parser
364
Rule Matcher
364
Deviation Calculator
365
Learning Phase
366
Alarms
367
Rule Format
367
Constraints
367
Experimental Settings and Results
367
Conclusion
369
References
369
Towards a Knowledge Management Portal for a Local Community
371
Introduction
371
Functions and Components of Portal
372
Ontology
372
Proposed Architecture
373
Multi-agent System for a Portal Local Community
374
Conclusions
376
References
376
Fusion of Speech and Face by Enhanced Modular Neural Network
377
Introduction
377
Recognition System
379
Native Fusion Algorithm
380
Algorithm
381
Modules
381
Artificial Neural Networks
382
Integrator
383
Results
384
Conclusions
384
References
385
Mining Rare Events Data by Sampling and Boosting: A Case Study
387
Introduction
387
Data Structure for Events Prediction
388
Case-Based Sampling
389
Additive LogitBoost
390
The Study Design
390
Results
391
References
393
Model-Based Regression Test Case Prioritization
394
Introduction
394
Background Concepts
395
Graph Model for Object-Oriented Programs
395
Object State
395
Test Case Prioritization
395
Related Work
395
MBTPT: Our Proposed Model-Based Approach
396
Model Slicing
396
Prioritizing Test Cases
397
Empirical Study
397
Comparison with Related Work
398
Conclusion
398
References
399
Software Process Improvement through Experience Management: An Empirical Analysis of Critical Success Factors
400
Introduction
400
Literature Review
401
Hypotheses
401
Research Methodology
402
Results and Discussion
402
Conclusions
404
References
404
Tutorial Papers
14
A Comparative Feature Selection Approach for the Prediction of Healthcare Coverage
406
Introduction
406
Methods
407
Data Preprocessing
407
Feature Selection
408
Classification
410
Results
411
Feature Selection and Classification
411
Validation of Classification Accuracy
413
An Optimal Set of Features for the Prediction of Healthcare Coverage
414
Conclusions
415
References
415
A Grid-Based Scalable Classifier for High Dimensional Datasets
418
Introduction
418
Background
419
Related Work
419
Scalable Classifier
419
Grid-Based Classification
420
Methodology
420
Data Preprocessing
421
Training Phase
421
Testing Phase
423
Handling High Dimensional Data
424
Algorithmic Time Complexity
425
Experiments and Results
425
Datasets
425
Evaluation Study
426
Conclusion
429
References
429
Author Index
430
All prices incl. VAT