Table of Contents
|
Multidisciplinary Research and Practice for Information Systems Gerald Quirchmayr, Josef Basl, IlsunYou, Lida Xu, EdgarWeippl (Eds.)
|
Front Matter |
Conference
|
Ontology-Based Identification of Research Gaps and Immature Research Areas Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek |
1-16 |
A Context-Aware Mashup Integration Guideline for Enterprise 2.0 Gerald Bader, Amin Anjomshoaa, A Tjoa |
17-30 |
Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf |
31-43 |
Validation of XML Documents with SWRL Jesús Almendros-Jiménez |
44-57 |
A Taxonomy of Dirty Time-Oriented Data Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch |
58-72 |
Combining Relational and Semi-structured Databases for an Inquiry Application Marius Ebel, Martin Hulin |
73-84 |
Hunting for Aardvarks: Can Software Security Be Measured? Martin Jaatun |
85-92 |
A Foundation for Requirements Analysis of Privacy Preserving Software Kristian Beckers, Maritta Heisel |
93-107 |
On Complexity Reduction of User Interfaces for Safety-Critical Systems Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle |
108-122 |
Security SLAs – An Idea Whose Time Has Come? Martin Jaatun, Karin Bernsmed, Astrid Undheim |
123-130 |
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept Aneta Poniszewska-Maranda |
131-145 |
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking Eckehard Hermann, Udo Litschauer, Jürgen Fuß |
146-160 |
Trust as an Organismic Trait of E-Commerce Systems Tanja Ažderska, Borka Blažič |
161-175 |
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones Andreas Holzinger, Peter Treitler, Wolfgang Slany |
176-189 |
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios Tsakalidis |
190-202 |
Near Duplicate Document Detection for Large Information Flows Daniele Montanari, Piera Puglisi |
203-217 |
TinyStream Sensors Pedro Furtado |
218-232 |
Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Keiichi Koyanagi |
233-243 |
Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid |
244-258 |
Indexing and Search for Fast Music Identification Guang-Ho Cha |
259-271 |
Ontology-Based Retrieval of Experts – The Issue of Efficiency and Scalability within the eXtraSpec System Elżbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz |
272-286 |
OrderBased Labeling Scheme for Dynamic XML Query Processing Beakal Assefa, Belgin Ergenç |
287-301 |
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages Anna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli |
302-316 |
Usage Control in Inter-organisational Collaborative Environments – A Case Study from an Industry Perspective Åsmund Nyre, Martin Jaatun |
317-331 |
Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle Monica Tirea, Ioan Tandau, Viorel Negru |
332-346 |
Similarity of Transactions for Customer Segmentation Ke Lu, Tetsuya Furukawa |
347-359 |
Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz |
360-374 |
Pay-As-You-Go Data Integration Using Functional Dependencies Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez |
375-389 |
Analyzing Recommender System's Performance Fluctuations across Users Charif Haydar, Azim Roussanaly, Anne Boyer |
390-402 |
Workshop
|
A Secure Distributed Video Surveillance System Based on Portable Devices Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You |
403-415 |
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel Clara Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione |
416-429 |
How to Forge a Digital Alibi on Mac OS X Aniello Castiglione, Giuseppe Cattaneo, Roberto Prisco, Alfredo Santis, Kangbin Yim |
430-444 |
Security-and-Privacy-Related Issues on IT Systems During Disasters Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake |
445-459 |
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary Arteries Mirosław Trzupek, Marek Ogiela |
460-467 |
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm Tomasz Hachaj, Marek Ogiela |
468-478 |
Automatic Image Annotation Using Semantic Text Analysis Dongjin Choi, Pankoo Kim |
479-487 |
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong |
488-500 |
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps Giovanni Acampora, Vincenzo Loia, Autilia Vitiello |
501-515 |
Mobile Malware Threats and Defenses for Homeland Security Seung-Hyun Seo, Kangbin Yim, Ilsun You |
516-524 |
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies Muhammad Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee |
525-533 |
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts Marek Zachara, Dariusz Pałka |
534-546 |
A Formal Support for Collaborative Data Sharing Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand |
547-561 |
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures Fredrik Seehusen, Bjørnar Solhaug |
562-577 |
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai |
578-592 |
Discussion on the Challenges and Opportunities of Cloud Forensics Rainer Poisel, Simon Tjoa |
593-608 |
Towards a Logical Framework for Reasoning about Risk Matteo Cristani, Erisa Karafili, Luca Viganò |
609-623 |
A Collaborative Approach to Botnet Protection Matija Stevanovic, Kasper Revsbech, Jens Pedersen, Robin Sharp, Christian Jensen |
624-638 |
Consensus Building and In-operation Assurance for Service Dependability Yutaka Matsuno, Shuichiro Yamamoto |
639-653 |
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping Munkhbaatar Doyoddorj, Kyung-Hyune Rhee |
654-668 |