default search action
4. ICDS 2010: St. Maarten, Netherlands Antilles
- Lasse Berntzen, Freimut Bodendorf, Elaine Lawrence, Mark Perry, Åsa Smedberg:
The Fourth International Conference on Digital Society, ICDS 2010, 10.16 February 2010, St. Maarten, Netherlands Antilles. IEEE Computer Society 2010, ISBN 978-0-7695-3953-9
eGovernment Services in the Context of Digital Society I
- Shadi Al-Khamayseh, Elaine Lawrence:
Mobile Government in Action at Local Councils: A Case Study. 1-7 - Augustin Prodan, Madalina Rusu, Cornelia Revnic, Remus Câmpean, Paulina Mitrea, Rodica Prodan:
Intelligent e-Tools for Wound Image Understanding and Evaluation. 8-13 - Birhanu Eshete, Andrea Mattioli, Adolfo Villafiorita, Komminist Weldemariam:
ICT for Good: Opportunities, Challenges and the Way Forward. 14-19 - Muhammet Yildiz, Mehmet Gokturk:
Combining Biometric ID Cards and Online Credit Card Transactions. 20-24
eGovernment Services in the Context of Digital Society II
- Borka Jerman-Blazic:
The Future of the Internet: Tussles and Challenges in the Evolution Path as Identified. 25-30 - Gina Gallegos-García, Roberto Gómez Cárdenas, Gonzalo Isaac Duchen-Sánchez:
Electronic Voting Using Identity Based Cryptography. 31-36 - Christoph Bartneck:
The All-In Publication Policy. 37-40
Networking and Telecommunications I
- Irene Rüngeler, Michael Tüxen, Erwin P. Rathgeb:
Improving the Acknowledgment Handling of SCTP. 41-46 - Nor Shahniza Kamal Bashah, Ivar Jørstad, Do Van Thanh:
Service Discovery in Future Open Mobile Environments. 47-53 - Kiril Kassev, Yakim Mihov, Adriana Kalaydzhieva, Boris Tsankov:
A New Paradigm of CAC Dimensioning for VoIP Traffic over Wireless Access Networks. 54-59
Networking and Telecommunications II
- Zoltan Gaspar, Izabella Gocza:
A Study of Time between Retried Calls in Voice over Internet Protocol Networks. 60-65 - Gaoyong Luo:
An Efficient DSP Implantation of Wavelet Audio Coding for Digital Communication. 66-71 - Tobias Wegner:
A Modular UPnP Proxy for Secure Remote Access. 72-77 - T. H. Szymanski:
Scheduling and Channel Assignment of Backhaul Traffic in Infrastructure Wireless Mesh Networks with Near-Minimal Delay and Jitter. 78-85
Internet and Web Services I
- Pedro Huitema, Perry Fizzano:
A Crawler for Local Search. 86-91 - Juha Puustjärvi, Leena Puustjärvi:
Reserving Clinical Resources for Healthcare Processes. 92-97 - Jaroslav Kadlec, Lukas Popelka, Radek Kuchta, Radimir Vrba:
Inernet Tool for Electronic Circuit Analysis. 98-101 - Bastien Sasseville:
The Future of Online Distance Education (ODE) in Public Universities in Quebec, Canada. 102-105
Internet and Web Services II
- Christian Kop:
How to Summarize an OWL Domain Ontology. 106-111 - Ryosuke Yasui, Atsushi Kanai, Takashi Hatashima, Keiichi Hirota:
The Metric Model for Personal Information Disclosure. 112-117 - Balazs Simon, Zoltán László, Balázs Goldschmidt, Károly Kondorosi, Peter Risztics:
Evaluation of WS-* Standards Based Interoperability of SOA Products for the Hungarian e-Government Infrastructure. 118-123
Social Networking
- Freimut Bodendorf, Carolin Kaiser:
Detecting Opinion Leaders and Trends in Online Communities. 124-129 - Soulakshmee D. Nagowah:
Aiding Social Interaction via a Mobile Peer to Peer Network. 130-135 - Rasim M. Alguliyev, Yadigar N. Imamverdiyev, Hamid Zargari, Saeid Bairami:
Relationship between Mobile Switching Center Information and Social Behavior in Week Days and Holidays in a Telecommunication Area. 136-138 - Radek Kuchta, Jaroslav Kadlec, Radimir Vrba:
Public Internet Portal for Primary and High Schools. 139-143
Computation and eCollaboration
- Wajeeha Khalil, Erich Schikuta:
Towards a Virtual Organisation for Computational Intelligence. 144-149 - Ozgur Tufekci, Semih Cetin, Ali Arifoglu:
Proposing a Federated Approach to Global Software Development. 150-157 - Rimantas Gatautis, Elena Vitkauskaite, Takis Damaskopolous:
Information Communication Technologies Role in Extended and Dynamics Clustering. 158-163 - Yijian Wu, Shaolei Zhang, Wenyun Zhao:
Towards Learning Domain Ontology from Legacy Documents. 164-171
eDefense for Security and Protection
- David J. Day, Zhengxu Zhao, Minhua Ma:
Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems. 172-177 - Sirisha Surisetty, Sanjeev Kumar:
Is McAfee SecurityCenter/Firewall Software Providing Complete Security for Your Computer?. 178-181 - Aljosa Jerman-Blazic, Svetlana Saljic:
Confidentiality Labeling Using Structured Data Types. 182-187 - Raja Sekhar Reddy Gade, Hari Krishna Vellalacheruvu, Sanjeev Kumar:
Performance of Windows XP, Windows Vista and Apple's Leopard Computers under a Denial of Service Attack. 188-191 - Shadi A. Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi:
A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and Evaluation. 192-197
Citizen-Centric Disruptive and Enabling Technologies
- Linda A. Jackson, Edward A. Witt, Alexander von Eye, Hiram E. Fitzgerald, Yong Zhao:
Children's Information Technology (IT) Use and Their Physical, Cognitive, Social and Psychological Well-Being. 198-203 - Val Jones, Valérie Gay, Peter Leijdekkers:
Body Sensor Networks for Mobile Health Monitoring: Experience in Europe and Australia. 204-209 - Dawit Bekele, Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
Context Information Refinement for Pervasive Medical Systems. 210-215 - Olfa Nasraoui, Leyla Zhuhadar:
Improving Recall and Precision of a Personalized Semantic Search Engine for E-learning. 216-221
eCommerce and eBusiness
- Luc Cassivi, Pierre-Majorique Léger, Michael Wybo, Pierre Hadaya:
The Level of International Business and Its Association with Different Internet E-Commerce Practices. 222-225 - Ching-Cha Hsieh, Chia-Hui Lo:
Doubts about Digitization: An Explorative Case Study. 226-231 - Md Delwar Hussain Mahdi, Karim Mohammed Rezaul, Muhammad Azizur Rahman:
Credit Fraud Detection in the Banking Sector in UK: A Focus on E-Business. 232-237 - Aqeel Ahmed, Karim Mohammed Rezaul, Muhammad Azizur Rahman:
E-Banking and Its Impact on Banks' Performance and Consumers' Behaviour. 238-242
Digital Analysis and Processing I
- Guillem Lefait, M. Tahar Kechadi:
Customer Segmentation Architecture Based on Clustering Techniques. 243-248 - Antti Lahtela, Marko Jäntti, Jukka Kaukola:
Implementing an ITIL-Based IT Service Management Measurement System. 249-254 - Rahil Hosseini, Jamshid Dehmeshki, Sarah Barman, Mahdi Mazinani, Anne-Marie Jouannic, Salah Dine Qanadli:
A Fuzzy Logic System for Classification of the Lung Nodule in Digital Images in Computer Aided Detection. 255-259 - Mohsen Firoozbakht, Jamshid Dehmeshki, M. Martini, Yousef Ebrahimdoost, Hamdan Amin, Mandana Ebadian Dehkordi, A. Youannic, Salah Dine Qanadli:
Compression of Digital Medical Images Based on Multiple Regions of Interest. 260-263 - Guillem Lefait, M. Tahar Kechadi:
Analysis of Deputy and Party Similarities through Hierarchical Clustering. 264-268
Digital Analysis and Processing II
- Yousef Ebrahimdoost, Jamshid Dehmeshki, T. S. Ellis, Mohsen Firoozbakht, A. Youannic, Salah Dine Qanadli:
Medical Image Segmentation Using Active Contours and a Level Set Model: Application to Pulmonary Embolism (PE) Segmentation. 269-273 - Mahdi Mazinani, Jamshid Dehmeshki, Rahil Hosseini, Tim Ellis, Salah Dine Qanadli:
Automatic Segmentation of Soft Plaque by Modeling the Partial Volume Problem in the Coronary Artery. 274-278 - Radoslav Fasuga, Petr Kaspar, Martin Surkovský:
Utilization of an Image Specific Areas in Searching. 279-284 - Teresa Dobson, Piotr Michura, Stan Ruecker:
Visualizing Plot in 3D. 285-289 - Adina Ion, Jamshid Dehmeshki, Hamdan Amin, A. Jouannic, Salah Dine Qanadli:
Automated Detection of Peripheral Arteries in CTA Datasets. 290-293
CYBERLAWS
ACCESSIBILITY: Digital Divide, e-Democracy and e-Government
- Mark Perry, Thomas Margoni:
FLOSS for the Canadian Public Sector: Open Democracy. 294-300 - Mark Perry, Thomas Margoni:
Interpreting Network Discrimination in the CRTC and FCC. 301-306 - France Bélanger, Lemuria D. Carter:
The Digital Divide and Internet Voting Acceptance. 307-310 - Lasse Berntzen, Evika Karamagioli:
Regulatory Measures to Support eDemocracy. 311-316
PRIVACY: e-Anonymity and e-Identity
- Lilian Edwards:
Content Filtering and the New Censorship. 317-322 - Joseph A. Cannataci:
Squaring the Circle of Smart Surveillance and Privacy. 323-328
PROTECTION: e-Fraud Prevention, e-Law, e-Punishment, e-International relations
- Jonathan M. Blackledge, Eugene Coyle:
e-Fraud Prevention Based on the Self-Authentication of e-Documents. 329-338 - Claus-Peter Rückemann:
Legal Issues Regarding Distributed and High Performance Computing in Geosciences and Exploration. 339-344 - Clare Chambers, Umut Turksen:
E-Banking and e-Fraud: A Comparison Investigation in Jamaica and the UK. 345-352 - Adolfo Villafiorita, Komminist Weldemariam, Angelo Susi, Alberto Siena:
Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework. 353-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.