By Topic

26-28 Oct. 2011

Filter Results

Displaying Results 1 - 25 of 38
  • Pervasive / ubiquitously connected

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (79 KB) | HTML iconHTML

    Summary form only given. To the eyes of the urban beholder, pervasive / ubiquitous computing seems to be achieved. However, not so in the eyes of the rural person. Apart from mobile phones, not much computing seems to go on in rural areas of Africa. This paper, postulating from a definition of Internet, puts the case for the need of African drive and further exploration of both theoretical and pra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The extended supply chain: A virtual collaborative ecosystem to enhance and drive innovation

    Publication Year: 2011, Page(s): 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (30 KB) | HTML iconHTML

    Summary form only given. The boundaries for business are constantly moving beyond the physical premises. Today, customers are seeking innovative and dynamic business solutions that allow for business to be conducted at any place, anytime or on any device. SAP has recognised this need and has started to provide innovative business solutions that can be run on premise, on demand and on device. A key... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Desktop virtualization: Path to pervasive computing in cloud computing era

    Publication Year: 2011, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (46 KB) | HTML iconHTML

    Virtualization is being widely used now as an emerging trend. Among the applications, using virtualization technology on the desktops (e.g. the PC workstations and laptops) is an important branch. Desktop virtualization has the potential to offer a new, cost efficient paradigm shift to ease the demand for resources while maximizing the return on investment. Combining the potential cost savings wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2011, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2011, Page(s):c1 - c2
    Request permission for commercial reuse | PDF file iconPDF (341 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • The evolution of collaborative relationship network between the government and the public based on e-government

    Publication Year: 2011, Page(s):4 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (814 KB) | HTML iconHTML

    Essentially the collaborative management based on e-government affairs is the growing process of collaborative relationship between the government organizations and the social public. Therefore, the evolution of the collaborative relationship between the government and the public is the prerequisite to ensure to realize the collaborative management about e-government affairs. The paper analyses th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thoughts of network ethical education for young students

    Publication Year: 2011, Page(s):10 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    Network provides a new platform for ethical education, but in reality, there are still many shortcomings of network ethical education in the content, the ways and methods. Strengthening the network ethical education should pay more attention to humane care and teach students moral choice as well as value network ethical innovation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A carrier-grade service-oriented file storage architecture for cloud computing

    Publication Year: 2011, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (805 KB) | HTML iconHTML

    Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. So, we can also use the cloud computing to solve the problem of large-scale file storage. Cloud-based file storage system is a high reliability, high consistency and high availability large-scale file storage system. In this paper, we design a service-o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Are online mood labels a true reflection of our experiences?

    Publication Year: 2011, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1430 KB) | HTML iconHTML

    It is well known that the online news can trigger different moods in readers. Many researches have been done on reader mood classification of online news, which use the news that have been labeled by readers. However, it is still unknown whether the mood labels on line are consistent with the readers who seldom label any news on the web. In this paper, we describe a user study which is designed to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using decision tree to predict mental health status based on web behavior

    Publication Year: 2011, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    It is very important to understand web users' psychological characteristics, which can help people adapt this rapid and complicated internet world better. Nowadays, web behavior plays a significant role in people's life and mental health. It is widely accepted in clinical psychology that mental activities and status are expressed in a way of behavior such as preference and choice. Web behavior, as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the emotion based on ontology

    Publication Year: 2011, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    The formation of cognitive system usually accompanies the change of emotions that play a significant role in cognitive process of humankind. Emotion affected by internal elements and external stimulations in various contexts is a complex psychological experience and physiological expression of human being. In this paper, we focus primarily on the evaluation of emotions and propose a cognitive comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disaster losses and modernization: A study on the cases of earthquake and storm disaster

    Publication Year: 2011, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    On the basis of statistical analysis of the earthquake and storm disaster data, we report that quantities which are significantly correlated to economic level of a country might not be the number of deaths and economic losses, or their respective share in the total population and total output, but the ease degree of making changes in economic losses and deaths. If D, F represent economic losses an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study on personal social network in microblogging

    Publication Year: 2011, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Microblogging is a passive broadcast medium in the form of blogging. By publishing message independently and focusing on others' message, people build new interpersonal social network. In Granovetter's framework of strong tie and weak tie, different distances of relationship in reality would influence the efficiency of individual action. The paper analyzes the relationship among microbloggers by f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards understanding how expatriates use the Internet in the Kingdom of Saudi Arabia

    Publication Year: 2011, Page(s):46 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Expatriate research has indicated that expatriates often experience a number of difficulties, which can impact on their successful assimilation in host countries. This failure to adjust can impact on an individual level, for example upheaval of family life, and on organizational level, for example loss of investment in expatriate development upon premature return to host country. Considering this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The analysis of dynamic structure of Internet consumer culture

    Publication Year: 2011, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    With the fast development of Internet and the deep permeation, Internet consumer culture and Internet consumption occur. Chinese Internet consumer culture has undergone fundamental change in less than 20 years, but the academic research of Internet consumer culture has lagged behind with reality. This research contributes itself into the construction the dynamic research structure of Internet cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    Dynamic process of Internet culture evolution based on complex network

    Publication Year: 2011, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (639 KB) | HTML iconHTML

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing user interaction logs to evaluate the usability of Web applications

    Publication Year: 2011, Page(s):61 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1585 KB) | HTML iconHTML

    In this paper we describe a usability study carried out using the WebHint method to analyze the usability of four Web applications. The method is based on remote and automatic capture, and semi-automatic analysis of users interaction. The experiment and its results show how the method can be used for analyzing the behavior of users interacting with online applications, in order to obtain a compreh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile social media for a private higher education institution in South Africa

    Publication Year: 2011, Page(s):68 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (977 KB) | HTML iconHTML

    The use of social media is growing exponentially. All kinds of businesses, seeking competitive advantage, are looking at what social media can offer them. The most obvious benefits seem to concern the communication and connectivity of social media. The question is whether private higher education institutions in South Africa are keeping up with these changes. This study investigates whether a priv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating malicious emails to educate end users on-demand

    Publication Year: 2011, Page(s):74 - 80
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (751 KB) | HTML iconHTML

    Many organizations are very vulnerable to malicious emails. To protect end users from such, this paper discusses how a simulation exercise can be successfully conducted to educate vulnerable users on-demand. By simulating malicious emails and `catch' vulnerable users, the organization may reduce costs and time regarding mitigating the weakest link-the human being. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web behavior and personality: A review

    Publication Year: 2011, Page(s):81 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    Traditionally, questionnaire is used in psychological investigation to collect experiment data. With the prevalence of Internet, web behavior record may provide a new choice for data collection. In this paper, we investigate both web behavior and psychological characteristic, and summarize the worldwide achievement on this direction. We find strong relations between web behavior and the users' per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of focus groups to improve an e-Government website

    Publication Year: 2011, Page(s):88 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (955 KB) | HTML iconHTML

    The growth in Africa's Internet and broadband sector has significantly increased in recent years, specifically in the e-Government sector. The Internet has become an essential tool to disseminate information to citizens; however, poorly designed websites cause frustration. This paper focuses on the Provincial Government of the Western Cape (PGWC) e-Government website which had noticeable usability... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on coping style factor of network-dependent behavior among university students

    Publication Year: 2011, Page(s):95 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    Aim: Study on coping style factor of network-dependence among university students; Methods: analyze the coping style among university students by comparing between the network-dependent group and the control group; Findings: The results showed that: the network-dependent group is inclined to take an immature, passive method of response. Conclusions: The occurrence of network-dependent behavior is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm application in intrusion forensics based on improved information gain

    Publication Year: 2011, Page(s):100 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    As a kind of feature selection algorithm applied widely in intrusion forensics, information gain could solve the problem of high-dimension and magnanimous, but it neglects correlation between features, which could lead to the redundancy of features, and affect the speed and accuracy of intrusion forensics. So an improved information gain algorithm based on feature redundancy was proposed. In the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.