ThinkMind // ICDS 2012, The Sixth International Conference on Digital Society
 Type: conference Download: ICDS 2012 cover page Download: ICDS 2012 foreword page Download: ICDS 2012 committee page Download: ICDS 2012 table of contents Download: ICDS 2012 full proceedings Notes: IARIA Conference. Editors: Jaime Lloret Mauri, Polytechnic University of Valencia, Spain Gregorio Martinez, University of Murcia, Spain Lasse Berntzen, Vestfold University College - Tønsberg, Norway Åsa Smedberg, Stockholm University/The Royal Institute of Technology, Sweden Event editions: - there are 13 editions. ISSN: 2308-3956 ISBN: 978-1-61208-176-2 Location: Valencia, Spain Dates: from January 30, 2012 to February 4, 2012 Articles: there are 27 articles Polish E-Government at Local Level: Heavy Road to Citizens’ Empowerment Leszek Porebski keywords: e-government; e-democracy; websites content; local democracy; local government.
Community Detection based on Structural and Attribute Similarities The Anh Dang and Emmanuel Viennet keywords: social network, community detection, clustering
The Evolution of the e-ID card in Belgium: Data Privacy and Multi-Application Usage Alea Fairchild and Bruno de Vuyst keywords: e-ID; privacy; transparency; applications.
Analyzing Social Roles using Enriched Social Network on On-Line Sub-Communities. Mathilde Forestier, Julien Velcin, and Djamel A. Zighed keywords: Social role; Social network; On-line community.
Unique Domain-specific Identification for E-Government Applications Peter Schartner keywords: e-government; system-wide unique identifier; domain-specific identifier; pseudonyms; anonymity; UUIDs; GUIDs.
Sociological Reflections on E-government Maria João Simões keywords: e-government; participation; technology; society
SSEDIC: Building a Thematic Network for European eID Victoriano Giralt, Hugo Kerschot, and Jon Shamah keywords: Electronic Identity; Single European Digital Community; Digital Agenda for Europe.
Designing National Identity: An Organisational Perspective on Requirements for National Identity Management Systems Adrian Rahaman and Martina Angela Sasse keywords: identity; identity mangaement system; organisation; government; policy
Towards the Automatic Management of Vaccination Process in Jordan Edward Jaser and Islam Ahmad keywords: information and communications technology for development; health systems mobile application; vaccination; rural areas.
Three Dimensional Printing: An Introduction for Information Professionals Julie Marcoux and Kenneth-Roy Bonin keywords: 3D printing; three dimensional printing; additive fabrication; digital fabrication; rapid prototyping.
Unsupervised Personality Recognition for Social Network Sites Fabio Celli keywords: Social Network Sites; Personality Recognition; Information Extraction; Natural Language Processing
Cellular Automata: Simulations Using Matlab Stavros Athanassopoulos, Christos Kaklamanis, Gerasimos Kalfoutzos, and Evi Papaioannou keywords: cellular automata; simulation; Matlab
Fast Polynomial Approximation Acceleration on the GPU Lumír Janošek and Martin Němec keywords: GPU; CUDA; Direct Memory Access; Parallel Reduction; Approximation
Generating Context-aware Recommendations using Banking Data in a Mobile Recommender System Daniel Gallego Vico, Gabriel Huecas, and Joaquín Salvachúa Rodríguez keywords: Mobile Recommender; Context-aware; Banking data mining; User modeling; Customer segmentation
Web Personalization; Implications and Challenges Ahmad Kardan and Amirhossein Roshanzamir keywords: web personalization; build-to-order; customer relationship management; recommender system; frequent flyer program.
New Service Development Method for Prosumer Environments Ramon Alcarria, Tomás Robles, Augusto Morales, and Sergio González-Miranda keywords: new service development; co-creation; service composition; service customization; QFD
Digital Investigations for Enterprise Information Architectures Syed Naqvi, Gautier Dallons, and Christophe Ponsard keywords: digital forensics analysis, ICT security architecture, enterprise information architecture
Shadow IT - Management and Control of Unofficial IT Christopher Rentrop and Stephan Zimmermann keywords: Shadow IT; IT Controlling; IT Governance; IT Service Management
A Secure and Distributed Infrastructure for Health Record Access Victoriano Giralt keywords: health record; security; accountability; Federated Identity and Access Management.
Active Mechanisms for Cloud Environments Irina Astrova, Arne Koschel, Stella Gatziu Grivas, Marc Schaaf, Ilja Hellwich, Sven Kasten, Nedim Vaizovic, and Christoph Wiens keywords: Cloud computing; events; active mechanisms
Information Technology Planning For Collaborative Product Development Through Fuzzy QFD Jbid Arsenyan and Gülçin Büyüközkan keywords: Collaborative Product Development; Fuzzy QFD; Technology requirements
Indoor IEEE 802.11g Radio Coverage Study Sandra Sendra, Laura Ferrando, Jaime Lloret, and Alejando Canovas keywords: radio coverage; indoor study, WLAN; IEEE 802.11g.
Security Issues of WiMAX Networks with High Altitude Platforms Ilija Basicevic and Miroslav Popovic keywords: high altitude platforms; IEEE 802.16; intrusion detection system; network security
Alteration Method of Schedule Information on Public Cloud Tatsuya Miyagami, Atsushi Kanai, Noriaki Saito, Shigeaki Tanimoto, and Hiroyuki Sato keywords: cloud computing; Internet security; privacy; Google Calendar; schedule service; date alteration.
Identifying Potentially Useful Email Header Features for Email Spam Filtering Omar Al-Jarrah, Ismail Khater, and Basheer Al-Duwairi keywords: Email spam, Machine Learning
Fault Tolerant Distributed Embedded Architecture and Verification Chandrasekaran Subramaniam, Prasanna Vetrivel, Srinath Badri, and Sriram Badri keywords: Distributed architecture; Fault tolerance; Security module; Model verification; Assertion technique.
Determining Authentication Strength for Smart Card-based Authentication Use Cases Ramaswamy Chandramouli keywords: Identity Verification, Smart Identity Token, Authentication Strength
|