default search action
CD-ARES 2012: Prague, Czech Republic
- Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar R. Weippl:
Multidisciplinary Research and Practice for Information Systems - IFIP WG 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings. Lecture Notes in Computer Science 7465, Springer 2012, ISBN 978-3-642-32497-0
Conference
- Kristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek:
Ontology-Based Identification of Research Gaps and Immature Research Areas. 1-16 - Gerald Bader, Amin Anjomshoaa, A Min Tjoa:
A Context-Aware Mashup Integration Guideline for Enterprise 2.0. 17-30 - Mostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf:
Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline Blends. 31-43 - Jesús Manuel Almendros-Jiménez:
Validation of XML Documents with SWRL. 44-57 - Theresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch:
A Taxonomy of Dirty Time-Oriented Data. 58-72 - Marius Ebel, Martin Hulin:
Combining Relational and Semi-structured Databases for an Inquiry Application. 73-84 - Martin Gilje Jaatun:
Hunting for Aardvarks: Can Software Security Be Measured? 85-92 - Kristian Beckers, Maritta Heisel:
A Foundation for Requirements Analysis of Privacy Preserving Software. 93-107 - Andreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle:
On Complexity Reduction of User Interfaces for Safety-Critical Systems. 108-122 - Martin Gilje Jaatun, Karin Bernsmed, Astrid Undheim:
Security SLAs - An Idea Whose Time Has Come? 123-130 - Aneta Poniszewska-Maranda:
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept. 131-145 - Eckehard Hermann, Udo Litschauer, Jürgen Fuß:
A Formal Equivalence Classes Based Method for Security Policy Conformance Checking. 146-160 - Tanja Azderska, Borka Jerman Blazic:
Trust as an Organismic Trait of E-Commerce Systems. 161-175 - Andreas Holzinger, Peter Treitler, Wolfgang Slany:
Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on Smartphones. 176-189 - Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios K. Tsakalidis:
Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and Alternatives. 190-202 - Daniele Montanari, Piera Laura Puglisi:
Near Duplicate Document Detection for Large Information Flows. 203-217 - Pedro Furtado:
TinyStream Sensors. 218-232 - Hiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Kei'ichi Koyanagi:
Distributed Sampling Storage for Statistical Analysis of Massive Sensor Data. 233-243 - Rachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid:
Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language Modeling. 244-258 - Guang-Ho Cha:
Indexing and Search for Fast Music Identification. 259-271 - Elzbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz:
Ontology-Based Retrieval of Experts - The Issue of Efficiency and Scalability within the eXtraSpec System. 272-286 - Beakal Gizachew Assefa, Belgin Ergenc:
OrderBased Labeling Scheme for Dynamic XML Query Processing. 287-301 - Anna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli:
A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query Languages. 302-316 - Åsmund Ahlmann Nyre, Martin Gilje Jaatun:
Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry Perspective. 317-331 - Monica Tirea, Ioan Tandau, Viorel Negru:
Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle. 332-346 - Ke Lu, Tetsuya Furukawa:
Similarity of Transactions for Customer Segmentation. 347-359 - Jakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz:
Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover Venues. 360-374 - Naser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez:
Pay-As-You-Go Data Integration Using Functional Dependencies. 375-389 - Charif Haydar, Azim Roussanaly, Anne Boyer:
Analyzing Recommender System's Performance Fluctuations across Users. 390-402
Workshop
- Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You:
A Secure Distributed Video Surveillance System Based on Portable Devices. 403-415 - Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione:
Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel. 416-429 - Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, Kangbin Yim:
How to Forge a Digital Alibi on Mac OS X. 430-444 - Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security-and-Privacy-Related Issues on IT Systems During Disasters. 445-459 - Miroslaw Trzupek, Marek R. Ogiela:
Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary Arteries. 460-467 - Tomasz Hachaj, Marek R. Ogiela:
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm. 468-478 - Dongjin Choi, Pankoo Kim:
Automatic Image Annotation Using Semantic Text Analysis. 479-487 - Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong:
Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control. 488-500 - Giovanni Acampora, Vincenzo Loia, Autilia Vitiello:
Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive Maps. 501-515 - Seung-Hyun Seo, Kangbin Yim, Ilsun You:
Mobile Malware Threats and Defenses for Homeland Security. 516-524 - Muhammad Naveed Iqbal Qureshi, Jin-Tae Kim, Sang-Woong Lee:
Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security Agencies. 525-533 - Marek Zachara, Dariusz Palka:
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts. 534-546 - Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand:
A Formal Support for Collaborative Data Sharing. 547-561 - Fredrik Seehusen, Bjørnar Solhaug:
Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures. 562-577 - Yi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai:
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation. 578-592 - Rainer Poisel, Simon Tjoa:
Discussion on the Challenges and Opportunities of Cloud Forensics. 593-608 - Matteo Cristani, Erisa Karafili, Luca Viganò:
Towards a Logical Framework for Reasoning about Risk. 609-623 - Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen:
A Collaborative Approach to Botnet Protection. 624-638 - Yutaka Matsuno, Shuichiro Yamamoto:
Consensus Building and In-operation Assurance for Service Dependability. 639-653 - Munkhbaatar Doyoddorj, Kyung Hyune Rhee:
Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping. 654-668
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.