By Topic

International Conference on Information Society (i-Society 2011)

27-29 June 2011

Filter Results

Displaying Results 1 - 25 of 116
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 2
    IEEE is not the copyright holder of this material | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):3 - 9
    IEEE is not the copyright holder of this material | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Session 1: E-society

    Publication Year: 2011, Page(s): 10
    IEEE is not the copyright holder of this material | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Platform of electronic marketing for development of ICTs applications

    Publication Year: 2011, Page(s):11 - 15
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1029 KB) | HTML iconHTML

    This paper presents the design of a platform of electronic marketing called “MiMercado”, aimed at the community of Ciudad Bolivar locality in Bogota Colombia. The platform allows the offering of products and services to local residents and aims to improve competitiveness and economic development of local enterprises; especially small and medium enterprises, allowing in the process th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The geography and organisation of the global knowledge economy - The example of ICT in India and its interactions with Sweden

    Publication Year: 2011, Page(s):16 - 21
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    This position paper presents the outline for a study of the changes in geography and organisation of the global knowledge economy and how the development of outsourcing and localisation of firms from the “global south” in the “global north” within ICT industry is supported by ICT tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effect of trust and attitude in the initial adoption of online shopping: An empirical study

    Publication Year: 2011, Page(s):22 - 26
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    While on-line shopping is considered as a special type of e-service, the adoption rate of this service in Taiwan has been paid attention recently. The initial adoption of on-line shopping is the important driving force to further influence the use and continued use of this service. The model of Trust and technology acceptance model (TAM) in Gefen et al. has been well studied in on-line shopping an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hidden assumption of face recognition evaluation under different quality conditions

    Publication Year: 2011, Page(s):27 - 32
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1535 KB) | HTML iconHTML

    Automatic face recognition remains a challenging task due to factors such as variations in recording condition, pose, and age. Many schemes have emerged to enhance the performance of face recognition to deal with poor quality facial images. It has been shown that reporting average accuracy, to cover a wide range of image quality, does not reflect the system's for any specific quality levels. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 2: Intelligent data management

    Publication Year: 2011, Page(s): 33
    IEEE is not the copyright holder of this material | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Visual clustering in web search: An effective approach

    Publication Year: 2011, Page(s):34 - 38
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Presenting search results as a list of hits can be ineffective in assisting users to find relevant documents and discover varied topics among search results. Visualization can assist users to find relevant documents and make the search interface more effective. This paper presents a Data Mountain Search Results Presentation Interface (DMSRPI). The interface is intended to improve the effectiveness... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed services and metadata flow in the Polish Federation of Digital Libraries

    Publication Year: 2011, Page(s):39 - 46
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (691 KB) | HTML iconHTML

    The development of digital libraries in Poland was initiated about ten years ago with the start of the dLibra project. This project was aiming for the creation of a software package to facilitate building flexible digital libraries for scientific and cultural institutions. The success of the package and the idea behind it caused rapid increase of the number of digital libraries, reaching 60 on-lin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward affective recommendation: A contextual association approach for eliciting user preference

    Publication Year: 2011, Page(s):47 - 54
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (937 KB) | HTML iconHTML

    The explosive growth of recommender systems has resulted in realization of individualized service as commercial patterns and research prototypes. However, the traditional recommendation approaches are overemphasized the similarity between user preference and items feature. They are completely ignored affectivity that was a crucial factor. Our study focuses on exploring a new affective recommendati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 3: E - learning

    Publication Year: 2011, Page(s): 55
    IEEE is not the copyright holder of this material | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Designing socio-cultural Learning Games: Challenges and lessons learned

    Publication Year: 2011, Page(s):56 - 61
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1215 KB) | HTML iconHTML

    A considerable number of Learning Games have been published over the last years. Since there are no clear guidelines for developers, they may not always meet the learner's expectations. Games are a powerful mediator for learning, but flaws in planning and design can have a negative effect on their potential. This paper describes the design of two Serious Games in a socio-cultural context. Special ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A declarative and operationalized language for learning systems Analysis: UTL

    Publication Year: 2011, Page(s):62 - 66
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (802 KB) | HTML iconHTML

    Nowadays, numerous teachers are using Technology Enhanced Learning systems in various domains. The tracks analysis concerning students' actions logged by Technology Enhanced Learning systems can help teachers to improve their pedagogical scenarios making them more relevant to students. Very often analysis solutions are developed ad hoc and without considering the teachers observational needs. In o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiagent system to support place/space based mobile learning in city

    Publication Year: 2011, Page(s):66 - 71
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1130 KB) | HTML iconHTML

    Different approaches have been developed to provide technical support for mobile learning. Most these approaches consider only the physical properties of learning environment. In this work, we not only focus on the physical/spatial dimension of the learning environment of the city, but also pay attention to the notion of Place which is a meaningful outcome of peoples understanding of Space. This p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a framework for the affective and emotional faces of usability

    Publication Year: 2011, Page(s):72 - 79
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Usability and accessibility have been guiding interaction designers in their endeavor for better user interfaces. Recently, emotions and human values are gaining space, demanding new directions for the design of systems. As an emerging subject, the need for models that associate emotions and affective quality with human-computer interaction design is still to be addressed. This paper presents a li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 4: Secure technologies

    Publication Year: 2011, Page(s): 80
    IEEE is not the copyright holder of this material | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Attack knapsack public key encryption scheme

    Publication Year: 2011, Page(s):81 - 85
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    This paper focuses on the knapsack scheme suggested by Hwang, which is relied on a new method entitled permutation combination method. The findings show that this permutation method is not efficient to the security of the scheme since, we can break this scheme employ the algorithm provided by Shamir scheme. Finally, we provide an enhanced version of Hwang scheme to avoid this attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A backbone assisted hybrid key management scheme for WSN

    Publication Year: 2011, Page(s):86 - 91
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    Wireless Sensor Networks (WSNs) are receiving increased focus due to their applicability to crucial applications like military, healthcare, habitat monitoring etc. However, wireless communication poses additional threats to the critical information being sent over the wireless media. Therefore there is a dire need to have a secure way of communication for a WSN. Public Key Cryptography (PKC) holds... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A personal data store for an Internet of Subjects

    Publication Year: 2011, Page(s):92 - 97
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    Person centric architectures put the user at the centre of personal data access control. This is a change from current service orientated applications where often the service provider is control of the person's data. Within a personal data store (PDS) users can link to and edit metadata / policies of remote data and host local data that they own. The PDS concept is part of a wider network of trust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective key management scheme for mobile heterogeneous sensor networks

    Publication Year: 2011, Page(s):98 - 103
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1102 KB) | HTML iconHTML

    The use of Wireless Sensor Networks (WSNs) has got great importance in many applications ranging from home and industrial applications to more sensitive military applications. In mobility context, such applications introduce new technological challenges for security. The resource constrained devices should be protected from various security attacks and provided with secure data communication. To t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 5: E-health

    Publication Year: 2011, Page(s): 104
    IEEE is not the copyright holder of this material | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • A secure field programmable gate array based System-on-Chip for Telemedicine application

    Publication Year: 2011, Page(s):105 - 109
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1128 KB) | HTML iconHTML

    In Telemedicine, confidential information is transferred through an unsecure channel from one party to another. In this paper, a field programmable gate array (FPGA) based approach to protect the data in the Telemedicine system, the mySECURE II is developed. There are two security schemes on a crypto System-on-Chip (SoC) proposed in this paper namely hybrid encryption scheme and Rivest-Shamir-Adle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Twitter and e-health: A case study of visualizing cancer networks on Twitter

    Publication Year: 2011, Page(s):110 - 113
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (795 KB) | HTML iconHTML

    This paper seeks to understand health-related social networks on social media websites. The paper explores fundamental questions about social networks formed in the prominent social media website Twitter and demonstrates innovative new methods to conduct applied research in the health sciences using social media networks. The paper aims to address fundamental questions about health-related social ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.