By Topic

Digital Society, 2009. ICDS '09. Third International Conference on

Date 1-7 Feb. 2009

Filter Results

Displaying Results 1 - 25 of 68
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • An Optimized eHealth Platfom to Provide Electronic Services over Dynamic Networking Environments

    Publication Year: 2009, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (762 KB) | HTML iconHTML

    The paper describes how an eHealth platform is being optimized with several enabling technologies for content and services provisioning over new, more complex network topologies. The services that are to be offered must account for dynamic networking environments which include ad-hoc networks on the one-hand, and on the other that are to be offered for groups of users, seamlessly connected by usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PaTac: Urban, Ubiquitous, Personalized Services for Citizens and Tourists

    Publication Year: 2009, Page(s):7 - 12
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    This paper presents the general design of an architecture, based on software agents and oriented to the semantic Web, for the development and deployment of urban, ubiquitous services for citizens and tourist. The goal is to create a platform able to provide personalized services based on recommendation algorithms, and users' location, profile and preferences. The motivating scenario behind the des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and User Guidelines for the Design of the Future Networked Systems

    Publication Year: 2009, Page(s):13 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Emergence of new networking technologies and paradigms provides users multitude of ways to communicate with each others and exchange information irrespective of time and place. Diversity of the available environments, however, sets requirements for the design processes so that the new architectures can offer a concise and secure usage experience. This cannot be answered in an off-hand fashion or a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalizing Education in Post-Industrial Society

    Publication Year: 2009, Page(s):20 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    The paper deals with significant technological changes in society when it moves into post-industrial age. Some of these changes have fundamental social consequences. The paper analyses the main social trends such as virtualization of the society in their interaction with newest technology trends and their influence on education. The concept of virtualization allows formulating the main feature of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-election in Digital Society

    Publication Year: 2009, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Electronic society today is one of main challenges of developing and developed countries. It plays a central role in the national development plans and thus many ICT based projects are dedicated to digital society development. In this regard, government organizations must reengineer their processes and structures to meet the e-government and e-society defined standards. All of these together will ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application Research of e-Government Procurement in China Based on Business Component Framework

    Publication Year: 2009, Page(s):30 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    E-Government Procurement is the most important experimental project in the electronic business "11th Five-Year Plan" in China. It is also the most important project in the development of Electronic Government Affair. Based on the analysis of e-Government Procurement in China, the paper considers that introducing BC (business component) theory and business component framework into the construction ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Service e-Transactions for Citizens - Concept and Case Study

    Publication Year: 2009, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    A technical transaction support environment to be used in the field of e-government is introduced. A transaction platform provides electronic services offered by public administration. Citizens can access these services by using smartcards and perform transactions as self-service. A case study focuses on automating enquiries previously handled by the registration office. It shows a sample implemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Political Participation and Democracy in the Information Age: Effects of ICT-Based Communication Forms between the Authorities and the Citizens on Traditional Channels of Participation and Democracy

    Publication Year: 2009, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The main trends concerning the traditional channels of participation are reduced voting turnout, reduced participation in political parties, stable participation in associations and increased citizen contact. The influence of ICT based form of communication on the relations between the authorities and the citizens are heavily influenced by the role of the citizens designed by the authorities. If t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Television and Banking Inclusion in Brazil: Alternatives to Access Technologies

    Publication Year: 2009, Page(s):52 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    One of the main challenges of the Brazilian Government for the next 10 years will be the banking inclusion of the poorest portion of the population, which has a monthly family income of less than $200 Dollars. Only 25% of the economically active population have a bank account and 15% are digitally included. On the other hand more than 90% of Brazilian people have a TV, and only 12% are connected t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Privacy Protection in Biometric Passports

    Publication Year: 2009, Page(s):60 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    In this paper we investigate issues related to biometric passports. First an overview of the current system is given. Then we present weaknesses associated with the hash functions designed for binary data used on bitmaps. After we show the possibility to use watermarking technologies to avoid storing the fingerprint in the passport but retaining the fingerprint check function. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self Protecting Data for De-perimeterised Information Sharing

    Publication Year: 2009, Page(s):65 - 70
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning infrastructure for the development of dynamically formed, collaborative working groups known as Virtual Organizations (VOs). VOs provide strong motivation for investigation into the infrastructure, and in particular the secur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Conceptual Model of e-Government Acceptance in Public Sector

    Publication Year: 2009, Page(s):71 - 76
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    The purpose of this paper is to develop a conceptual model for e-government acceptance in public sector which is one of the least studied aspects of e-government. The proposed model uses theories from technology acceptance and success and the diffusion of ICT-related innovations. It integrates constructs from the technology acceptance model (TAM), the theoretical extension of the TAM (TAM2), the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking e-Government - A Comparative Review of Three International Benchmarking Studies

    Publication Year: 2009, Page(s):77 - 82
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    This paper makes a range of comparisons between e-government developments and performance worldwide. In order to make such comparisons, it is necessary to use a set of indicators. This paper examines the evolution of indicators used by three widely referenced international e-government studies, from the early days of e-government benchmarking until today. Some critical remarks related to the curre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DVB-H Performance Simulations in Dense Urban Area

    Publication Year: 2009, Page(s):83 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1291 KB) | HTML iconHTML

    The correct estimation of the DVB-H (digital video broadcasting, handheld) coverage area is essential part in the pre-planning of the network. In addition to the coverage and respective capacity planning, the in-depth work also requires an estimation of the quality of service levels, which depends mainly on the radio related parameters. This paper presents a simulation method in order to predict t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Near Field Communication Network Services

    Publication Year: 2009, Page(s):89 - 93
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Near Field Communication (NFC) provides means to close-range contactless identification and communication for mobile phones and other devices alike. NFC is a new technology but it is maturing fast as it is being standardized. The first NFC services have mostly been simple applications but with the expansion of NFC technology and its application areas there is an urgent need to move from stand-alon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference and Outage Evaluation of a Network Coding Based Detection and Defense Mechanism for WRN

    Publication Year: 2009, Page(s):94 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB) | HTML iconHTML

    Wireless reconfigurable networks (WRN) are prone to several routing security attacks such as packet dropping, data integrity, selective forwarding, black holes, and wormholes. In this paper, we introduce an interference and outage probability analysis of the distributed security attack detection and defense method (DDM) for WRN proposed. The accuracy capabilities of the method are analyzed under n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Wireless Network in Quadrilateral Region

    Publication Year: 2009, Page(s):100 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    According to circular range of antenna broadcasting, The usual shape of environment is circular, but most of companies and establishments have a quadrilateral region. In some applications like as military or research company, It is important that nobody out of region, can access to their network. In other word, network services must be valid only inside the region. There are some techniques to be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Networking Management for a Protocol Processor

    Publication Year: 2009, Page(s):106 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    This paper implements an efficient networking management for a protocol processor in a network terminal. The protocol processor is to handle high-speed data streams, more than 10 Gb/s, in a network terminal. We propose an algorithm, which contributes to fairness and full utilization of the packet buffer memory. In our experimental results, the proposed algorithm shows good improvement for the pack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.