Current Computing Developments in E-Commerce,
Security, HCI, DB,
Edited by Dr.
Panagiotis Petratos
ISBN: 960-6672-07-7, 540 pages, Hardback
First published in 2006 by ATINER
Price: Paperback: 60€ (It includes Shipping and Handling) Hardcover: 100€ (It includes Shipping and Handling)
Electronic copy: 30€
Table
of Contents
1. |
Current Computing Developments in E-Commerce,
Security, HCI, DB, Collaborative and Cooperative Systems: An
Introduction to the Current Volume Panagiotis Petratos |
1 |
PART I: Human Computer Interaction, HCI |
||
2. |
Using Human Computer Interaction Concepts to Design
Interfaces for the Brain Injured Gnanayutham,
P. and George, J. |
15 |
3. |
Developing a Windows Service Software Agent to
Facilitate Automatic Collection of End-User Data Hole, S. and McPhee,
D. |
41 |
4. |
Usability Issues in Multimedia Interface Design George, J. |
61 |
5. |
Playing a Game with Data Structures and Algorithms Huebner, E. and Bem,
D. |
75 |
6. |
End Users and the Information System Life Cycle
Business Purpose-Focused Approach Gackowski,
J.Z. |
87 |
PART II: Collaborative Environments and Cooperative
Systems |
||
7. |
Towards Computer – Supported Cooperative Systems Guo,
J., Akis, V. and Tokunaga S. |
109 |
8. |
Conversation, Awareness and Coordination: A
Framework to Enhance the Development of Social Relationships for On Line
Teams Egea, K. |
123 |
9. |
Awareness of Organizational Climate and the Performance of Project Teams Patel, S. |
143 |
10. |
Efficiencies of Ant Replication in MANETs Adda,
M. and Peart, A. |
151 |
PART III: Information Retrieval, Algorithms and
Quality of Service Issues |
||
11. |
Overcoming the Obstacles of Harvesting and Searching
Digital Repositories from Federated Searching Toolkits Embedding them in VLEs Chumbe,
S., MacLeod, R., Barker, P., Moffat, M. and Rist,
R. |
163 |
12. |
Non-Linear Algorithms for Parametric Markov Programming Verkhovsky,
B. and Polyakov Y. |
179 |
13. |
Evaluation of Quality Attributes for Web Services
Architecture Davison, G. and Petkov
E. |
195 |
14. |
The Issues of Voice over IP on Wireless Networks Adda,
M. and Peart, A. |
209 |
PART IV: Contemporary issues of Database, DB Systems
and Networks |
||
15. |
A Lightweight Architecturer
for Context Aware Applications Using LDAP Al-Yasiri, A., Linge N. and Mufassir A. |
223 |
16. |
Towards a Framework for Dealing With Data Quality in
Data Warehouses Peng,
T. |
241 |
17. |
Introduction to an Abstraction Architecture for
Business Intelligence Reynolds, D. |
257 |
18. |
The Architecture of the Intelligent Al-Kasassbeh, M. and Adda, M |
273 |
PART V: Contemporary issues of Computing Education
and Research |
||
19. |
Learning Software Design Techniques via Redesign Tao, Y. |
287 |
20. |
Using JStamp in
Undergraduate Research Dulimarta, H. |
295 |
21. |
E-Learning: Personalization and Collaboration
Solution Goetz, J. and Racataian,
C. |
303 |
22. |
The Organizational and Motivational Aspects in IT
Training Leung, A. |
321 |
23. |
The Role of Mobility in Modern Learning Environment Sirkemaa,
S. |
335 |
24. |
Practical Approaches to Machine Translation Inman, D. and Addley,
B. |
343 |
PART VI: Classification, Modelling,
ERP and Decision Making |
||
25. |
Exploring Process Group for Reliability,
Availability and Serviceability of Terascale
Computing Systems Okunbor,
D., Engelmann,
C and Scott, S. |
357 |
26. |
ERP
Implementation by Argyropoulou,
M., Ioannou, G., Motwani,
J., Schwarz, T. and Soderquist,
K. |
373 |
27. |
Parametric View of Annotation for Decision Making |
387 |
28. |
Improved Computational Model of Ammonia – Water
Absorption Refrigeration Cycle Al-Shemmeri and T., Wang, Y. |
397 |
29. |
The Classifying Bird Sounds Based on SOMs Zhang, H. |
415 |
PART VII: Security, E-commerce and Web Applications |
||
30. |
On IC-Bag Based Systems Chakrabarty,
K. |
427 |
31. |
Web Application Software Architecture with Security
as a Quality Attribute Ambrose, J.A. and Petkov, E. |
433 |
32. |
Alternate Data Streams in Forensic Investigations of
File System Backups Bem,
D. and Huebner, E. |
443 |
33. |
Spatio
– Temporal Relationships in the Analysis of Threats for Security Monitoring
Systems Onwubiko,
C. and Lenaghan, A. |
455 |
34. |
E – Commerce Technology Comparison: ASP.NET vs Ajax Goetz, J., Michalopoulos,
D. and Pangilinan, J. |
471 |
PART VIII: E-commerce and Investment Decision Making
Applications |
||
35. |
Validity Assessment of an Experimental e-Shopping
Interface and Survey in a Multicultural Context Vachon,
F., Vachon, J. and Rivard,
S. |
489 |
36. |
Revising the Concept of Electronic Commerce Unold,
J. |
499 |
37. |
Identification of Unique Trend in an Integrated
Investment Decision – Support Framework Chen, W. |
507 |