By Topic

Internet and Web Applications and Services (ICIW), 2010 Fifth International Conference on

Date 9-15 May 2010

Filter Results

Displaying Results 1 - 25 of 101
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2360 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s):xvi - xxii
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xxiii - xxviii
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Assigning Web News to Clusters

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    The Web is overcrowded with news articles, an overwhelming information source both with its amount and diversity. Assigning news articles to similar groups, on the other hand, provides a very powerful data mining and manipulation technique for topic discovery from text documents. In this paper, we are investigating the application of a great spectrum of clustering algorithms, as well as similarity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WSOTF: An Automatic Testing Tool for Web Services Composition

    Publication Year: 2010, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    This paper presents an automatic conformance testing tool with timing constraints from a formal specification (TEFSM: Timed Extended Finite State Machine) of web services composition (WSOTF: Web Service composition, Online Testing Framework), that is implemented by an online testing algorithm. This algorithm combines simultaneously idea of test execution and debug to generate and simultaneously ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Solution Model and Tool for Supporting the Negotiation of Security Decisions in E-Business Collaborations

    Publication Year: 2010, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Sharing, comparing and negotiating security-related actions and requirements across businesses has always been a complicated matter. Issues arise due to semantic gaps, disparity in security documentation and formats, and incomplete security-related information during negotiations, to say the least. As collaborations amongst e-businesses in particular increase, there is a growing, implicit need to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research on Formal Specification and Review of Workflows

    Publication Year: 2010, Page(s):19 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    The workflow technique based on BPEL is widely used in the management of enterprise business process. But it is hard to detect logic errors and conduct the validation of the business process, because BPEL does not have formal semantics. This paper introduces SOFL to describe business process. Generally speaking, SOFL provides a formal but comprehensible language for both requirements and design sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Unauthorized Modification of HTTP Communication with Steganography

    Publication Year: 2010, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    HTTP does not secure its requests and responses. Using Man-in-the-Middle attack, it is possible to alter the HTTP communication, while it still would look authentic. This can be a problem, if you download data such as PGP key, TOR client, access banking services on-line, or when there is an interest to filter what you can read on the Internet. It should be noted that under particular circumstances... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Highly Decoupled Front-End Framework for High Trafficked Web Applications

    Publication Year: 2010, Page(s):32 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2131 KB)

    Web applications are becoming more feature rich and ever more ubiquitous, while trying to address the needs of millions of users. Server-side scalability and performance are a serious matter as farms are unceasingly expanding for high growth sites. User Interface designers are looking for novel approaches to stimulate user engagement which results in more advanced and feature-rich clients. Remaini... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-modal CBIR Algorithm Based on Latent Semantic Indexing

    Publication Year: 2010, Page(s):37 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    The paper presents a new multiple feature fusion (MFF) based on latent semantic indexing (LSI) method to achieve an improved image retrieval performance. The proposed method extracts different physical features, which come from not the whole image but its main objects, and constructs a multi-modal semantic space, each dimension of which represents a different feature component of the image. Furthe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TRIC: An Infrastructure for Trust and Reputation Across Virtual Communities

    Publication Year: 2010, Page(s):43 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1228 KB) | HTML iconHTML

    Virtual communities are gradually becoming an inherent part of modern life. Trust and reputation systems, which are considered key enablers of virtual communities, These systems support the accumulation of member reputation information and leverage this information to increase the likelihood of successful member interactions and to better protect the community from fraudulent members. Reputation i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Scheduling for Staged Applications: The Case of Multiple Processing Units

    Publication Year: 2010, Page(s):51 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    Staged design has been introduced as a programming paradigm to implement high performance Internet services that avoids the pitfalls related to conventional concurrency models. However, this design presents challenges concerning resource allocation to the individual stages, which have different demands that change during execution. On the other hand, processing resources have been shown to form th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Campaigns in Social Networks

    Publication Year: 2010, Page(s):61 - 66
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (662 KB) | HTML iconHTML

    Services have become increasingly important in today's Web-based applications. Users can access services in an anytime, anywhere manner using a wide variety of mobile devices. Mobile services are a key driver in today's telecommunication market, even though the potential of mobile services has not been fully exploited in existing telecommunication systems. A main driver in these markets are contex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nontraditional Approach to XML Web Services Interactions

    Publication Year: 2010, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    In this paper, are presented some possibilities for application of an algebraic method which handles XML hierarchical data structures and makes faster the XML search mechanism. The article briefly presents the concepts of Web Services, Service-Oriented Architecture and other modern software paradigms for organization of the processes over internet. The accelerating techniques for XML navigation th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Casual Multi-user Web Collaboration by Lowering Communication Barriers

    Publication Year: 2010, Page(s):73 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (695 KB) | HTML iconHTML

    Our goal is to support casual communication between users on the Web by lowering the various barriers - community, psychological, and awareness - that impede smooth communication on the Web. Our prototype system enables communication over the entire Web space (beyond Web community services), real-time semi-active communication, and mutual visualization of users. In an informal evaluation, the seve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BlogMiner: Web Blog Mining Application for Classification of Movie Reviews

    Publication Year: 2010, Page(s):77 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (901 KB) | HTML iconHTML

    With the increasing use of Web 2.0 platforms such as Web Blogs, discussion forums, Wikis, and various other types of social media, people began to share their experiences and opinions about products or services on the World Wide Web. Web Blogs have thus become an important source of information. In turn, great interest in blog mining has arisen, specifically due to its potential applications, such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Interaction Models in Cross-Organizational Processes

    Publication Year: 2010, Page(s):85 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    Rigidly pre-planned business processes are applied in the field of production planning and product development to coordinate the collaboration of single enterprises. Each step in these workflows is precisely scheduled, accounting for external constraints such as availability of material, delivery dates, and efficiency of humans and machines. However, finally all these steps are performed, or at le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized Recommendation System for the Social Network Services Based on Psychographics

    Publication Year: 2010, Page(s):91 - 95
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1350 KB) | HTML iconHTML

    Although various Social Network Services available on the Web, there are additional requirements for sharing systematic knowledge and experiences that are formed in u-Computing environment in relation to the physical location information to support problem solutions more effectively. As the numbers of information available increases, there are more inadequate and junk information which consume eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reputation-Based Systems within Computer Networks

    Publication Year: 2010, Page(s):96 - 101
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    The topic on using reputation has received considerable research attention in the field of networking and communications. In this survey paper, we discuss the various ways the systems can benefit from using reputation information. We provide the examples of existing reputation-based systems discussing their functional implementations. Based on our observations, we list minimum requirements for ben... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Significance of Instant Messaging at Work

    Publication Year: 2010, Page(s):102 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    Instant messaging has become increasingly prevalent in social life. However, whether to use IM at work remains controversial, due to its unquantified benefits for organizations. In this study we employ the suggestive metaphor of social network theory to examine IM's impact on organizational performance. Specifically, we propose that IM has the potential to enhance organizational agility by enablin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.