Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings (Communications in Computer and Information Science, Vol 54)

von: Sushil K. Prasad, Harrick M. Vin, Sartaj Sahni, Mahadeo P. Jaiswal, Bundit Thipakorn (Eds.)

Springer-Verlag, 2010

ISBN: 9783642120350 , 431 Seiten

Format: PDF, OL

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 77,04 EUR

Mehr zum Inhalt

Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings (Communications in Computer and Information Science, Vol 54)


 

Title Page

2

Preface

5

Organization

7

Table of Contents

11

Keynote Talks

11

Service Discovery Protocols for VANET Based Emergency Preparedness Class of Applications: A Necessity Public Safety and Security

15

Introduction

15

Importance of Service Discovery for Emergency Preparedness and Response Class of Application in Vehicular Networks

16

Discovery of Safety Services

16

Discovery of Convenience Services

18

Service Discovery Architectures for Vanets

18

Directory-Based Architecture

19

Directory-Less Architecture

19

Hybrid Architecture

20

Conclusion

20

References

20

High-End Analytics and Data Mining for Sustainable Competitive Advantage

22

Introduction

22

Methods

24

Improving Sentiment Analysis Using Linguistic and Machine Learning Approaches

24

Mining Online Customer Reviews for Ranking Products

26

Conclusions

28

References

28

Resource Allocation for Energy Efficient Large-Scale Distributed Systems

30

Introduction

30

Holistic Energy-Aware S&RA Framework

31

Overview of the Framework

31

Key Characteristics

31

Preliminary Findings

32

Energy-Conscious Task Scheduling Using Dynamic Voltage Scaling

32

Experimental Results

32

Conclusion

33

References

33

Information Systems

11

Social Cognitive Theory in IS Research – Literature Review, Criticism, and Research Agenda

34

Introduction

34

Social Cognitive Theory: An Overview

35

Social Cognitive Theory in IS Research

36

Research Method and Data Analysis

38

Results

38

Discussion and Future Research

40

Self-efficacy Theory versus Social Cognitive Theory

40

Inter-influence between Self-efficacy and Outcome Expectations

41

Lack of Emotional Considerations

41

Key Role of Past Experience

41

Triadic Reciprocality

42

Dependent Variables and Unexplored Effects

42

Towards an SCT Meta-framework for Future Guidance

42

Conclusion

43

References

43

Knowledge Intensive Business Processes: A Process-Technology Fit Perspective

46

Introduction

46

Research Method

48

Results

49

Theoretical Background – Task-Technology Fit and KIBPs

52

Contributions and Conclusions

55

References

56

A Web Service Similarity Refinement Framework Using Automata Comparison

58

Introduction

58

Motivating Example

59

Translation of OWL-S Representation into Automata

60

OWL-S and OWL-S Parser

60

Automata for OWL-S Control Constructs

61

Translation of Web Services Using Automata

63

Web Service Similarity Measuring Framework

65

Equivalence of Web Services and Regular Languages

65

Similarity Measuring Framework

66

Related Work

67

Conclusion

68

References

68

A System for Analyzing Advance Bot Behavior

70

Introduction

70

Related Work

71

Behavior Analysis System of Advanced Bot

72

Kernel-Level Behavior Monitoring and Thwarting Virtual Machine Detection

72

Thwarting Static-DLL/Binary Code Injection

74

Experiments and Evaluation

75

Conclusion and Future Work

76

References

77

Two Approaches to Handling Proactivity in Pervasive Systems

78

Introduction

78

Related Work

79

Architectures of Daidalos and Persist Pervasive Systems

80

Approaches to Proactivity

82

Proactivity in Daidalos

82

Proactivity in Persist

84

Conclusion and Future Work

88

References

89

A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy Management

90

Introduction

90

Related Work

92

WLAN Security Policy Management System

94

Proposed Spatio-Temporal RBAC Model for WLAN Policy Management

95

Modeling Location

95

Modeling Time

95

Modeling Basic RBAC Entities in the Proposed System

96

Modeling of Global Policy

97

Analysis with Case Study

99

Conclusion

101

References

101

Proposing Candidate Views for Materialization

103

Introduction

103

Algorithm PVGA

105

Examples

108

Experimental Results

109

Conclusion

111

References

112

A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial Information

113

Introduction

113

Overview of the Fuzzy Geospatial Reasoning Framework

115

Fuzzy Geospatial Data Modeling

116

Fuzzy Classes

117

Fuzzy Association

117

Enterprise GIS Framework for Geospatial Web Services

118

Fuzzy Reasoning

119

Case Study

119

Conclusion

123

References

123

Information Technology

12

Dynamic Web Service Composition Based on Operation Flow Semantics

125

Introduction

125

Literature Survey and Brief Review

126

A Model for Web Service Description, Discovery and Composition

127

The Broker Based Architecture for Compositions

128

Architectural Roles and Operations

128

Extending Service Knowledge Structure

130

Dynamic Composition of Web Services Based on Operation Flow

131

Implementation and Experiments

133

Conclusion

134

References

134

Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage Problems

137

Introduction

137

Background

138

The Adjustable Range Model

139

Distributed Algorithms Using Adjustable Range

140

Adjustable Range Load Balancing Protocol (ALBP)

140

Adjustable Range Deterministic Energy Efficient Protocol (ADEEPS)

141

Simulations

142

Conclusion

145

References

145

Verifiable ($t$, $n$) Threshold Secret Sharing Scheme Using $ECC$ Based Signcryption

147

Introduction

147

Previous Work

149

ProposedWork

150

Harn and Lin [17] Scheme

150

Signcryption Scheme

151

Description of the Proposed Scheme

152

Security Analysis

155

Conclusion

157

References

157

Model-Based Software Reliability Prediction

159

Introduction

159

Related Work

160

An Overview of Our Approach

160

Metrics Used in Our Approach

161

Implementation of UML Metric Calculator

162

Neural Network

163

General Regression Neural Network (GRNN)

163

Principal Component Analysis

163

Empirical Study

164

Goodness of Fit

164

Results

166

Comparison with Related Work

167

Conclusion

167

References

168

Real-Time Power-Aware Routing Protocol for Wireless Sensor Network

170

Introduction

170

Real-Time Power-Aware Routing Protocol for Wireless Sensor Network (RTPA)

172

Neighbor Management

173

Design Overview

173

Path Delay Estimation

174

Routing Decisions

174

Simulation and Performance Evaluation

175

Conclusion

178

References

179

Document Clustering with Semantic Features and Fuzzy Association

181

Introduction

181

Related Works

182

LSA and Fuzzy Association Theory

183

Latent Semantic Analysis

183

Fuzzy Association Theory

184

The Proposed Document Clustering Method

184

Preprocessing

185

Cluster Label Extraction by LSA

185

Document Clustering by Fuzzy Association

186

The Proposed Document Clustering Algorithm

186

Performance Evaluations

187

Conclusions

188

References

188

Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based Handover

190

Introduction

190

Related Works

191

Proposed Cross-Layer HO Mechanisms

192

First Feature: Combination of Control Messages

192

Second Feature: New CoA Generation Method

192

Description of the Proposed Scheme

193

Performance Evaluation

194

Simulation Settings

194

Simulation Results

196

Conclusion

199

References

199

Information Management

12

Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods

201

Introduction

201

Literature Review

202

The Structure of a Grid Resource Market

203

Characteristics of the Market

203

Risk Cases

203

Entities

203

Resources

204

Risk-Aware Resource Brokering Strategies

204

Self-insurance

204

Risk-Performance Preference Specification

205

Evaluation

206

Simulation Design

207

Results

208

Conclusions and Discussions

209

References

210

A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in India

212

Introduction

212

Overview of IS and CMC

213

Brief History of the Development of the Socio-Technical Model

213

Literature Review: A Summary

213

The India Perspective

215

Research Methods

215

Results

216

Satisfaction with the New Media on Social and Economic Dimensions of Task Performance

216

Discussion and Conclusion

221

References

222

Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and Followers

224

Introduction

224

Related Work

225

Definitions

226

Spam Categorization Framework

226

TestData

227

Basic Attribute Set

227

Aggregating Friend and Follower Attributes

228

Trust Propagation

228

Experiments

229

Evaluation Criteria

230

Results

230

Conclusion and Future Work

233

References

234

Encouraging Cooperation in Ad-Hoc Mobile-Phone Mesh Networks for Rural Connectivity

235

Introduction

235

P2P Mobile-Phone Networks

236

MANETS vs. Phone Mesh Networks

237

Multi-hop Cellular Networks vs. Phone Mesh Networks

237

Related Work

238

System Model

239

Incentive Structure

240

Relay Policies

240

User Behavior

241

Simulations

241

Evaluation

242

Conclusions and Future Work

244

References

245

Fuzzontology: Resolving Information Mining Ambiguity in Economic Intelligent Process

246

Introduction

246

The Misconceptions amongst Data, Information and Knowledge

247

Ontological Framework for Knowledge Reconciliation n EI

251

Fuzzontology

252

Conclusion and Future Work

255

References

256

Personalizing Web Recommendations Using Web Usage Mining and Web Semantics with Time Attribute

258

Introduction

258

Related Research

259

Motivation

259

Proposed System

260

Web Log Processing

261

Web Usage Mining

261

Web Semantic Mining

262

Recommendation Engine

262

Experimental Setup

263

Results and Evaluation

264

Conclusion and Future Work

267

References

268

Towards Analyzing Data Security Risks in Computing Environments

269

Introduction

269

Security Issues and Challenges

271

Security Advantages in Cloud Environments

271

Security Disadvantages in Cloud Environments

272

Survey

273

Risk Analysis Approach

274

Need of a Risk Analysis Approach

274

Risk Assessment Using Trust Matrix

275

Risk Analysis

276

Related Work

277

Conclusion

278

References

278

Time-Sequential Emotion Diagnosis Based on the Eye Movement of the User in Support of Web-Based e-Learning

280

Introduction

280

System Configuration

282

Procedure for Obtaining the Criteria for Classifying the Emotions of e-Learning Users

283

Emotion Classification

283

Emotion Procedure for Deriving the Criteria for Eye Movement Signals

283

Measurements to Determine the Diagnostic Criteria

284

Algorithm for Emotion Diagnosis and Its Performance

286

Conclusion

288

References

288

Critical Success Factors in Managing Virtual Teams

289

Introduction

289

A Framework to Analyze Success Factor to Manage Virtual Teams

290

Relational and Structural Dimensions

291

Relational and Technical Dimensions

292

Conclusion and Future Research

293

References

294

Applications

13

3D Reconstruction and Camera Pose from Video Sequence Using Multi-dimensional Descent

296

Introduction

296

Methodology

298

Experimental Results

300

Experiment in a Synthetic Environment

301

Experiment in a Real-World Environment

302

Conclusion

305

References

305

Adapting Content Presentation for Mobile Web Browsing

307

Introduction

307

Related Work

308

A Hybrid Presentation Adaptation Approach

309

Tree-View Adaptation

309

Hierarchical Text Summarization

311

Keyword Highlighting

312

Evaluation

313

Discussion

315

Conclusion and Future Work

316

References

316

Application of Decision Tree Technique to Analyze Construction Project Data

318

Introduction

318

Related Work

319

Decision Tree

319

Methodology

320

Method to Combine Multiple Variables

320

Application of the Method

321

Selecting the Attribute at Root Node

321

Defining Threshold to Stop Growing the Tree

323

Meanings Derived from the Decision Tree Data Analysis

323

Use of Method to Calculate Labor Requirement and Comparison with the Standard Labor Productivity

324

Conclusion

327

References

327

Effects of Initial Search Bound on the Performance of Self-adaptive Evolutionary Computation Methods

328

Introduction

328

Analysis of Self-adaptive EC Methods

330

Test-Functions and Simulation

331

Results and Discussion

332

Conclusions

337

References

337

Short Papers

13

A Computational Study of Margining Portfolios of Options by Two Approaches

339

Introduction

339

Strategy-Based Approach

340

Risk-Based Approach

341

DesignoftheExperiment

342

Results of the Experiment

344

References

346

Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map

347

Introduction

347

Proposed Method

348

Generation of Synthetic Images

348

Rotation and XORing

348

Mixing and XORing

349

Decryption

349

Security and Performance Analysis

349

Statistical Analysis

349

Sensitivity Analysis of the Encryption

350

Conclusion

351

References

352

Linear Multivariable System Reduction Using Particle Swarm Optimization and A Comparative Study Using Relative Integral Square Error

353

Introduction

353

Description of the Algorithm

354

Retention of Dominant Poles of HOS in LOS [11, 16, 20]

354

Determination of the Numerator Coefficients of LOS by Particle Swarm Optimization Technique

355

Practical Power System under Study

357

Application of the Proposed Algorithm to the Power System and Simulation Results

357

Conclusions

359

References

360

An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database Systems

362

Introduction

362

Related Work

363

The Proposed Model

363

Query Parser

364

Rule Matcher

364

Deviation Calculator

365

Learning Phase

366

Alarms

367

Rule Format

367

Constraints

367

Experimental Settings and Results

367

Conclusion

369

References

369

Towards a Knowledge Management Portal for a Local Community

371

Introduction

371

Functions and Components of Portal

372

Ontology

372

Proposed Architecture

373

Multi-agent System for a Portal Local Community

374

Conclusions

376

References

376

Fusion of Speech and Face by Enhanced Modular Neural Network

377

Introduction

377

Recognition System

379

Native Fusion Algorithm

380

Algorithm

381

Modules

381

Artificial Neural Networks

382

Integrator

383

Results

384

Conclusions

384

References

385

Mining Rare Events Data by Sampling and Boosting: A Case Study

387

Introduction

387

Data Structure for Events Prediction

388

Case-Based Sampling

389

Additive LogitBoost

390

The Study Design

390

Results

391

References

393

Model-Based Regression Test Case Prioritization

394

Introduction

394

Background Concepts

395

Graph Model for Object-Oriented Programs

395

Object State

395

Test Case Prioritization

395

Related Work

395

MBTPT: Our Proposed Model-Based Approach

396

Model Slicing

396

Prioritizing Test Cases

397

Empirical Study

397

Comparison with Related Work

398

Conclusion

398

References

399

Software Process Improvement through Experience Management: An Empirical Analysis of Critical Success Factors

400

Introduction

400

Literature Review

401

Hypotheses

401

Research Methodology

402

Results and Discussion

402

Conclusions

404

References

404

Tutorial Papers

14

A Comparative Feature Selection Approach for the Prediction of Healthcare Coverage

406

Introduction

406

Methods

407

Data Preprocessing

407

Feature Selection

408

Classification

410

Results

411

Feature Selection and Classification

411

Validation of Classification Accuracy

413

An Optimal Set of Features for the Prediction of Healthcare Coverage

414

Conclusions

415

References

415

A Grid-Based Scalable Classifier for High Dimensional Datasets

418

Introduction

418

Background

419

Related Work

419

Scalable Classifier

419

Grid-Based Classification

420

Methodology

420

Data Preprocessing

421

Training Phase

421

Testing Phase

423

Handling High Dimensional Data

424

Algorithmic Time Complexity

425

Experiments and Results

425

Datasets

425

Evaluation Study

426

Conclusion

429

References

429

Author Index

430