By Topic

2010 Fourth International Conference on Digital Society

10-16 Feb. 2010

Filter Results

Displaying Results 1 - 25 of 75
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2370 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (189 KB)
    Freely Available from IEEE
  • ICDS 2010 Preface

    Publication Year: 2010, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (75 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICDS 2010 Committees

    Publication Year: 2010, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • ICDS 2010 Reviewers

    Publication Year: 2010, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • CYBERLAWS 2010 Preface

    Publication Year: 2010, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • CYBERLAWS 2010 Committees

    Publication Year: 2010, Page(s):xx - xxii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • CYBERLAWS 2010 Reviewers

    Publication Year: 2010, Page(s):xxiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Mobile Government in Action at Local Councils: A Case Study

    Publication Year: 2010, Page(s):1 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    This paper forms part of a series of investigations into the key success factors for mobile government services (mGovernment) in Australia, Jordan and the United Arab Republic. The case study in this paper concerns a large city council in Queensland, Australia and provides valuable insights into the adoption of mobile government services. A table of success factors, that should prove useful to oth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent e-Tools for Wound Image Understanding and Evaluation

    Publication Year: 2010, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB) | HTML iconHTML

    This paper presents a Java framework for analyzing, processing and understanding wound images, to be used in teaching, learning and research activities. We intend to promote e-learning technologies in medical, pharmaceutical and health care domains. Using Java and XML technologies, we build models for various categories of wounds, due to various etiologies. Based on color and texture analysis, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICT for Good: Opportunities, Challenges and the Way Forward

    Publication Year: 2010, Page(s):14 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    ICT seems well understood as a tool and an infrastructure for delivering information and services for the society and for allowing communications through interactions among the service users -mostly, the digital society. Using ICT for ensuring better life requires far more than good infrastructure, ICT know-how and the various techniques and tools in place. If ICT has to address the real problems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Biometric ID Cards and Online Credit Card Transactions

    Publication Year: 2010, Page(s):20 - 24
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Internet shopping, a strong alternative to traditional ¿go, see, touch and buy¿ shopping, has been one of the mostly used facilities of the Internet. Several online shopping systems serve internet users all around the world and enable people to get the products they need with a small effort. Internet shopping can be considered as ¿see and buy¿ retailing. While the ¿see¿ part is implemented b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Future of the Internet: Tussles and Challenges in the Evolution Path as Identified

    Publication Year: 2010, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The paper deals with the current findings of the Think Tank group of experts from all over the world working within the program of the EU FP7 project ¿Evolving Future Internet for European Leadership - EIFFEL¿. The Think- Tank is working on meetings where the discussion about major challenges and tussles of the current Internet is contributing to the debate about the future of the Internet tryin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic Voting Using Identity Based Cryptography

    Publication Year: 2010, Page(s):31 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Today voting processes are the most important element of democracy as the societies way to make decisions. Such processes have been influenced by information technologies until becoming be named electronic voting. This topic has been an active research area, on which, cryptographic primitives are used in order to propose secure protocols. Most of them use a Public Key Infrastructure. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The All-In Publication Policy

    Publication Year: 2010, Page(s):37 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    The productivity of scientists and the quality of their papers differ enormously. Still, all papers written get published eventually and the impact factor of the publication channel is not correlated to the citations that individual papers receive. Hence it does not matter where to publish papers. Based on these two conjectures, I conclude that all papers should be published. The review process sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Acknowledgment Handling of SCTP

    Publication Year: 2010, Page(s):41 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    In general, the Stream Control Transmission Protocol (SCTP) delays the sending of acknowledgments. For specific cases, this results in non-optimal protocol behavior. Therefore, the protocol specification defines several exceptions that allow the receiver of an SCTP packet containing user data to send the corresponding acknowledgment without delaying it. However, all these exceptions only take the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Discovery in Future Open Mobile Environments

    Publication Year: 2010, Page(s):47 - 53
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (887 KB) | HTML iconHTML

    Future mobile environment will see the open situation of mobile device that can be connected to several network systems offering heterogeneous sets of services using different names. In addition, the future mobile service can be anything and anybody including end-users can be service providers. This will result to the demand of having a dynamic and efficient service discovery and service matching.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Paradigm of CAC Dimensioning for VoIP Traffic over Wireless Access Networks

    Publication Year: 2010, Page(s):54 - 59
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    This paper presents a VoIP packet loss model applicable to wireless access transmission media and usable for determination of admissible call number threshold value. The main contribution is a more realistic approach for VoIP packet loss evaluation. The known bufferless fluid-flow method is applied but a new simple exact formula for ACT voice packets loss is developed. The suggested method is eval... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Time between Retried Calls in Voice over Internet Protocol Networks

    Publication Year: 2010, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    The paper presents an in depth study of the time between retried calls by analyzing the distribution properties in the 0-5 minutes, 5-60 minutes and 1-180 hours intervals. For this study a large quantity of real life data was used (5.5 million calls from 2007-05 to 2008-09) coming from a prepaid long distance voice over internet protocol (VoIP) provider. The distribution and identified spikes were... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient DSP Implantation of Wavelet Audio Coding for Digital Communication

    Publication Year: 2010, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    Digital audio offers increased sound quality and greater signal processing flexibility than its analog counterpart. The key enabling technology for digital audio wireless products is audio compression due to channel bandwidth constraints. However, current audio coding schemes can hardly achieve ultra-low delay of encoding and decoding for live productions. This paper presents an efficient DSP impl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Modular UPnP Proxy for Secure Remote Access

    Publication Year: 2010, Page(s):72 - 77
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    In this paper we propose a convenient way to access and invoke UPnP services available in a remote network. UPnP was originally developed for use in a local and private network, however as there is a growing number of affordable mobile devices which can easily connect to the internet from any place in the world it is just the next step to demand secure access to the services running at home. Anoth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling and Channel Assignment of Backhaul Traffic in Infrastructure Wireless Mesh Networks with Near-Minimal Delay and Jitter

    Publication Year: 2010, Page(s):78 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    Algorithms to provision backhaul traffic flows in an infrastructure Wireless Mesh Network (WMN) with near minimal delay and jitter and near-perfect QoS are described. The WMN consists of Base-Stations with multiple radio transceivers for backhauling, and one or more Gateway BSs. It has recently been established in theory that a recursive fair stochastic matrix decomposition algorithm can be used t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.