By Topic

24-27 July 2012

Filter Results

Displaying Results 1 - 25 of 112
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (348 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Welcome message from the SRII President

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Overview

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Executive Management Team

    Publication Year: 2012, Page(s):xvii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (216 KB)
    Freely Available from IEEE
  • SIGS

    Publication Year: 2012, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Chapters

    Publication Year: 2012, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Conference theme

    Publication Year: 2012, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (130 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2012, Page(s):xxvii - xxxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel sessions

    Publication Year: 2012, Page(s):xxxiii - lvi
    Request permission for commercial reuse | PDF file iconPDF (442 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s):lvii - lviii
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Conference agenda

    Publication Year: 2012, Page(s):lvix - lxiii
    Request permission for commercial reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Configurable and Extensible Multi-flows for Providing Analytics as a Service on the Cloud

    Publication Year: 2012, Page(s):1 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Compared to traditional analytics deployment models, cloud-based solutions for business analytics provide numerous advantages such as reduction of a large upfront infrastructural cost and the efforts to setup an in-house analytics team. Such advantages of cloud-based service delivery make it particularly attractive for small and medium businesses. In spite of these advantages, analytics penetratio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Driven Provisioning in Multi-tenant Clouds

    Publication Year: 2012, Page(s):11 - 20
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (611 KB) | HTML iconHTML

    In multi-tenant cloud systems today, provisioning of resources for new tenancy is based on selection from a catalogue published by the cloud provider. The published images are generally a stack of appliances with Infrastructure (IaaS) and Platform (PaaS) layers and optionally Application layers (SaaS). Such a ready-made model enables quicker and streamlined resource provisioning to clients. Howeve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing Service Assurance for Cloud-Based Implementations: Augmenting Assurance via Operations

    Publication Year: 2012, Page(s):21 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Service assurance remains important for applications with cloud-based implementations, but now must be met via standardized cloud services. To meet custom assurance requirements, consumer controlled operations (e.g., around when to provision and what to provision) factor as integral design components to augment basic assurance of standard cloud services which may be individually less reliable. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Marketer Perceptions of Quality on the Success of Mobile Shopping System and Its Impact on Performance

    Publication Year: 2012, Page(s):29 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Although mobile shopping (m-shopping) has the potential to provide opportunities to exploit new revenue streams for businesses and expand shopping availability for consumers, research on m-shopping remains limited and thus offers insufficient evidence to address how effective adoption and diffusion of information systems success is explicitly excluded in the context of m-shopping. Therefore, based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WindTunnel: A Tool for Network Impact Testing of Mobile Applications

    Publication Year: 2012, Page(s):34 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Due to the significant growth in the number of mobile applications that is being developed, there is a need for a mobile application testing platform that is capable of emulating various field conditions. At the same time, it should remain cost effective. One of the key requirements of such a test platform is that the testing environment should be as close to deployment scenario as possible i.e. a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Innovative System for Remote and Automated Testing of Mobile Phone Applications

    Publication Year: 2012, Page(s):44 - 54
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    Application testing is an integral part of the application life cycle. This testing effort is more for the 3rd party applications in the mobile phone market, due to the wide number of handsets available on which the application needs to be tested before being released. At the same time, majority of the applications use the cellular network, necessitating the tester1 (along wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and Reliability in Crowdsourcing Service Delivery

    Publication Year: 2012, Page(s):55 - 60
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (926 KB) | HTML iconHTML

    Due to the anonymity and low pay of workers in crowd sourcing platforms, there may be concerns regarding reliability and privacy-preservation when using such platforms to deliver services. This paper describes a technique for jointly providing privacy and reliability through stochastic perturbation of micro task definitions and fusion rules to combine the work of several workers. A mathematical mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Amount of Information Loss in k-Anonymization for Secondary Use of Collected Personal Information

    Publication Year: 2012, Page(s):61 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    A lot of information has recently been collected and the need to put it to secondary use is expanding. This is because a lot of useful knowledge is contained in it. There are always privacy concerns with the secondary use of personal information. k-anonymization is a tool that enables us to release personal information in a manner that is privacy-protected. In classical k-anonymization, side infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Generic Business Artifacts Based Authorization Framework for Cross-Enterprise Collaboration

    Publication Year: 2012, Page(s):70 - 79
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (695 KB) | HTML iconHTML

    Business artifacts provide an approach to Business Process Management that combines data and process in a holistic way. Previous research introduced artifact-centric Interoperation Hubs (I-Hubs) as a data-centric alternative to conventional service orchestration for enabling the cooperative interaction of multiple organizations with shared business objectives. The current paper extends this vision... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Insight: An Approach and Platform for the Discovery and Analysis of End-to-End Business Processes

    Publication Year: 2012, Page(s):80 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1388 KB) | HTML iconHTML

    Tracking and analyzing the execution of semi-structured processes is essential for understanding process behavior and its evolution, increasing the effectiveness of business operations, and managing operational risk. A semi structured process is a single process from the perspective of the business but is executed across loosely coupled, heterogeneous, distributed systems and may be cross-organiza... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.