By Topic

Computing in the Global Information Technology, 2008. ICCGI '08. The Third International Multi-Conference on

Date July 27 2008-Aug. 1 2008

Filter Results

Displaying Results 1 - 25 of 57
  • [Front cover]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2008, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2008, Page(s):xii - xviii
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Knowledge as a Service. An Online Scoring Engine Architecture

    Publication Year: 2008, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    The paper presents a predictive models management system called DeVisa that offers online services such as: scoring, model composition, model comparison, search and statistics. For the purpose of interaction between the consumer applications and the DeVisa system a XML-based language called PMQL is defined. The paper focuses on the scoring service as an online knowledge provider, analyzes the chal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Store - An Innovative Technological Solution for Retail Activities with Mobile Access

    Publication Year: 2008, Page(s):7 - 11
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1022 KB) | HTML iconHTML

    This paper presents an innovative solution in retail activities, named "Intelligent Store - INTELSHOP", based on a technological platform that offers the support for some attractive and efficient services for customers and administrative staff. The technological platform integrates various technologies such as RFID, GPS and GIS, wireless communications, mobile access to information on PDA or Smart... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Designing an Asynchronous and Dynamic Platform for Solving Single Task Requests of Remote Applications

    Publication Year: 2008, Page(s):12 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Using remotely located software or hardware resources for solving various technical problems is presently the main subject of the current emerging technologies such as utility computing, cloud computing, Grid computing and so on. This paper discusses a possible architectural solution and describes a platform built bearing in mind the requirements for solving mathematical-described problems, but po... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web Based Telematics Application for Robotics

    Publication Year: 2008, Page(s):19 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (999 KB) | HTML iconHTML

    The paper presents the work for development of a telematics application for robotics field. First, it was developed a client-server application and then a Web based application. A range of remote experiments with a mobile robot with particular emphasis on motor control, obstacle avoidance, image processing and their application to trajectory control can be done by the users. The users learn the mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Do People Seek Knowledge in Information System Projects: A New Perspective from Social Network Theory

    Publication Year: 2008, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    Why does a project team member prefer some colleagues to others in knowledge seeking? Past literature suggests that the physical accessibility of a knowledge source, the knowledge quality of the source and relational concerns are important to such choice. Our social network analysis of an information systems (IS) project team indicates that job interdependence and rank have a significant impact on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Case-Based Decision Support for Bridge Monitoring

    Publication Year: 2008, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    This paper deals with the support of human experts in making decisions in the field of bridge monitoring. Thereby, the methodology case-based reasoning is described to develop a decision support system for the interpretation of measurement results of bridges. Case-based reasoning is a cyclic problem solving method whereby already known knowledge about bridges is stored in form of cases. The system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of Flexible Business Process Based on Modularity System Theory

    Publication Year: 2008, Page(s):37 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    This paper introduced concept of modularity business process. High modular business processes have properties of encapsulation and plug-and-play, which make business process more flexible and responsible to environment change. We also proposed a mechanism model of business process modularity and hypothesizes based on modular system theory and transaction cost economics. Diversity of customer deman... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Agent-Based Multi-issue Negotiation Model

    Publication Year: 2008, Page(s):45 - 49
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    Most of the current agent systems focus on single issue, such as price, whereas multi-issue negotiation is very essential to electronic commerce. In the multi-issue model, MAUT (Multi-attribute Utility Theory) or its derived theory is mainly used as the evaluation method. However, the application of this theory may cause deviation. To resolve the problem, a two stage negotiation model is presented... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contextual QR Codes

    Publication Year: 2008, Page(s):50 - 55
    Cited by:  Papers (8)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    QR codes (2D barcodes) are used to encode and decode data at a rapid rate. Using camera phones to read two dimensional barcodes for various purposes is currently a popular topic in both research and in practical applications. But until now, the information provided by QR codes was solely static. What you see is exactly what was encoded. This paper proposes the notion of contextual QR codes that me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metadata Extraction from Semi-structured Email Documents

    Publication Year: 2008, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    This paper presents metadata extraction technique from email documents. Emails are characterized in terms of keywords that are extracted from body of the mail using frequency, average similarity and term discrimination value measures. The email metadata is defined as a document type definition (DTD) in extensible markup language (XML) that captures the structure as well as content characterizing k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing a Knowledge-Driven Hierarchical Context Model in a Medical Laboratory Information System

    Publication Year: 2008, Page(s):62 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (943 KB) | HTML iconHTML

    This paper discusses a context model developed for medical laboratory information system of Tartu University Hospital laboratories (in Tartu, Estonia). Due to the size, structure and complex history of the laboratory infrastructure, managing user communications and even achieving a common vocabulary has become a serious task. Most of the concepts used by the laboratory personnel depend on the part... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent Connectivity for Embedded System Design

    Publication Year: 2008, Page(s):68 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    Embedded system design is a topic of interest to multidisciplinary fields including electrical engineering and computer science. In order to correctly focus on the correct aspects of embedded system design, be it hardware for electrical engineering students, or software for computer science students, seamless connectivity between the hardware and software aspects needs to be provided. One approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Contextual Acceptance Model of Mobile Commerce Based on TAM

    Publication Year: 2008, Page(s):75 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Users may use a mobile service in various contexts. It is critical to study how users' perceptions and intentions are affected by context. We discuss the definition and structure of context, then propose a contextual acceptance model of mobile commerce based on TAM. We apply this model to the case of a GPS-based taxi-dispatching system. Preliminary data analysis illustrates that context has signif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Minkowsky Metric for Image Region Partition

    Publication Year: 2008, Page(s):80 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    In this paper we present an improved method for image partition. Image partition plays an important role in video segmentation techniques; it uses different region growth algorithms for separating an image into regions and objects. This enhances the characterization on an image using video descriptors and can be used in image retrieval or image comparison applications. The proposed segmentation me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generator for Multimedia Presentations

    Publication Year: 2008, Page(s):85 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    It can be observed that from the offered facilities for certain products, just a very small percent is used by users for reasons such as the difficulty in understanding the technical guide that accompanies the product. The utilization of specialty terms makes it difficult the understanding of the 'how to use' instructions. In this article, we want to realize a software program that permits the use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm for Robust Relative Influence Values Elicitation (ARRIVE)

    Publication Year: 2008, Page(s):91 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    This paper proposes an approach to solving node weightings in a tree structure. The tree represents expertise used to quantify risks associated with mental-health problems and it is incorporated within a Web-based decision support system called GRiST. The aim of the algorithm is to find the set of relative node weightings in the tree that helps GRiST simulate the clinical risk judgements given by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Range Free Localization Algorithm Based on Restricted-Area for Wireless Sensor Networks

    Publication Year: 2008, Page(s):97 - 101
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    This paper presents a restricted-area-based localization algorithm (RAL) for wireless sensor networks (WSN), in which radio connectivity and principle of perpendicular bisectors are used to provide a lower estimation error than some of restricted-area-based localization algorithms. In the RAL algorithm, anchor nodes can transmit beacon signals at different power levels, which divide the possible t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements vs. Software Design: An Explanation Based on the Distinction between Concepts and Their Representations

    Publication Year: 2008, Page(s):102 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Still, requirements and software design are often confused with one another. We provide a new (partial) explanation for this phenomenon, based on the insight that representations of concepts related to requirements and software design, respectively, may sometimes look very similar. This does not mean, however, that the requirements and design concepts are the same. So, we should distinguish requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.