By Topic

Internet and Web Applications and Services, 2008. ICIW '08. Third International Conference on

Date 8-13 June 2008

Filter Results

Displaying Results 1 - 25 of 125
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (256 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2008, Page(s):xvii - xxv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Flow Diagram Based Formulation for Protecting Patent and Trade Secret in Information Systems

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    In this paper, we propose a flow diagram based formulation of the conditions on protecting patent and trade secret in information systems by interpreting legal concepts in engineering manner as a reference to researchers and practitioners. First, we propose the condition on patenting the novel combination of prior disclosed computer programs. Second, we propose the condition on proper specificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracing Mobile Attackers in Wireless Ad-Hoc Network

    Publication Year: 2008, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environment, IP traceback methods are deployed to determine the origin of attacking packets. With the increase in bandwidth of wireless networks, attackers may choose this medium from which to launch attacks. However, tracing the attac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File-Sharing versus Gift-Giving: A Theoretical Approach

    Publication Year: 2008, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Many investigations have tried to depict the character of music file-sharing, identifying it with gift-giving, without explaining the connection but what kind of gift-giving procedure it is. It is believed that this identification is rather simplistic and in order to show the identity of both activities a comparison between them is reported, presenting a threefold categorization of differences in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethical-Legal Challenges in User-Centric AmI Services

    Publication Year: 2008, Page(s):19 - 24
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Mobile devices are increasingly evolving into tools to orientate in and interact with the environment, thus introducing a user-centric approach to ambient intelligence. The MINAmI project aims at creating core technologies for these kinds of ambient intelligence services. In this paper we assess five scenarios that demonstrate forthcoming MINAml-based devices. A brief legal and ethical analysis of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain Model for eParticipation

    Publication Year: 2008, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    The introduction of information and communication technologies (ICTs) in the field of public participation led to the emergence of electronic participation (eparticipation). The area of eparticipation is currently a rapidly evolving one. Although, a few eparticipation-related frameworks have been developed they actually aimed to address specific purposes. As a result, there is no work aiming to mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences in Online Teaching and Learning

    Publication Year: 2008, Page(s):31 - 37
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    To support schools in teaching computer science, we have started the Informatik@School project. In this project, which is meanwhile funded by "Oberfrankenstiftung", we communicate computer science content to beginners and matured students. As the number of participating students is very large in comparison to the number of advisors and big distances have to be bridged, we separated students into t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing Bayes Classifier for Improving Learner's Proficiency

    Publication Year: 2008, Page(s):38 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Improving learner's proficiency is a continuous issue in e-Learning systems. This paper presents a solution for advising the learner regarding the resources he should access and study in order to obtain a required proficiency level. The solution uses a Naive Bayes as classification algorithm with input data represented by learner's performed activities. The performed activities are logged and used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Filtering for a Collaborative Learning Environment: A Multiagent Approach

    Publication Year: 2008, Page(s):43 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    A multiagent filtering information system is proposed in this paper. The agents improve the teaching-learning process in a computer-based learning environment by means of information filtering. The system is developed using the PASSI agent development methodology. Furthermore, the paper describes agents specification and implementations for NetClass.. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • U-Training. A Framework to Create Ubiquitous Training Portals for Higher Education Teachers

    Publication Year: 2008, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    This project outlines some teacher training strategies using the information and communication technologies (ICTs) to contribute to sustainable higher educational training programmes and their role in the shift towards ubiquitous training environments. The Corporate E-Learning Centre (CELC), at Anahuac Mexico Sur University, has made some efforts to implement different approaches for training teac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with Virtual Environments in the EHEA

    Publication Year: 2008, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Recent adaptations of educational curricula to the European Higher Education Area (EHEA) enabled many education professionals to adopt new teaching methodologies into their daily practice. Although the transmission of the main theoretic and practical concepts of the subject in question must remain the main focus, the improvement of students' general skills claims for special attention not only in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eduWEAVER: Integrated Design, Development and Deployment of eLearning Scenarios

    Publication Year: 2008, Page(s):60 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    The trend towards more didactics in eLearning and the increased usage of new media makes the design and development of courses increasingly complex. Only parts of the eLearning development process are supported by IT. As an effect, this may lead to a lower quality in eLearning material and courses, which in turn makes the possibility of participating in eLearning courses a rather unattractive opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependence Maps: A Methodology for Subject Planning and Learning Assessment in Virtual Learning Environments

    Publication Year: 2008, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    The use of virtual learning environments is more and more common as a support tool for classroom activities. In this case the objective of these environments is to provide pedagogic tools and methodologies to enhance the teaching-learning process. The main objective of this paper is to present the Dependence Map, a pedagogical tool that allows the teacher to plan a subject of study and its evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Integrated Tools for Model-Based Analysis of Service Compositions

    Publication Year: 2008, Page(s):72 - 77
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    Developing service compositions, using multiple standards and implementation techniques, typically involves specifying service characteristics in different languages and tools. Examples are defining service composition behaviour, in the form of the business process execution language for Web services (WS-BPEL) and a global service choreography policy, in the form of the Web service choreography de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Use of AOP and MDA in Web Service Development

    Publication Year: 2008, Page(s):78 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Model-driven architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other hand, aspect-oriented programming (AOP) is motivated by the need to create decoupled systems, which are easier to maintain. As a result, it can be argued that adopting AOP and MDA side-by-side will provide advantages from b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Episodes and Workflow Integration: A Use Case in LD-CAST

    Publication Year: 2008, Page(s):84 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    The integration of the business and technical views allows domain experts from the business view to take control over the whole process of service delivery (including the generation of the executable workflows) to the end users. The integration approach of business and technical views presented in this paper is supported by semi-automatic generation of ontology from the modeled business episodes. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Different Approaches to Semantic Web Service Composition

    Publication Year: 2008, Page(s):90 - 96
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1310 KB) | HTML iconHTML

    Semantic web service composition is about finding services from a repository that are able to accomplish a specified task if executed. The task is defined in a form of a composition request which contains a set of available input parameters and a set of wanted output parameters. Instead of the parameter values, concepts from an ontology describing their semantics are passed to the composition engi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Service Capabilities Representation Based on Statistical Study on WSDL

    Publication Year: 2008, Page(s):97 - 102
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Web services (WS) are becoming more and more popular nowadays and service-oriented architecture (SOA) have been widely used in the construction of information systems. But most of the SOA applications are not brand new and usually evolved from legacy systems. Our research group is building a service identification framework used for the SOA reengineering of existing large-scale information applica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Generation of Ruler-Based User Interfaces of Web Applications

    Publication Year: 2008, Page(s):103 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6083 KB) | HTML iconHTML

    Development and maintenance of complex web interfaces containing hundreds of input fields typically causes huge development effort. Changing the layout or adding input fields to complex user interfaces are especially tedious tasks are, because these changes affect the alignment of many other interface elements. To reduce this effort, we developed a ruler guide-based approach that combines the effi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.