Current Computing Developments in E-Commerce, Security, HCI, DB,

Collaborative and Cooperative Systems

Edited by Dr. Panagiotis Petratos

ISBN: 960-6672-07-7, 540 pages, Hardback
First published in 2006 by ATINER

Price: Paperback: 60 (It includes Shipping and Handling) Hardcover: 100 (It includes Shipping and Handling)

Electronic copy: 30

 

Table of Contents

 

 

1.

Current Computing Developments in E-Commerce, Security, HCI, DB,

Collaborative and Cooperative Systems: An Introduction to the Current Volume

Panagiotis Petratos

1

PART I: Human Computer Interaction, HCI

2.

Using Human Computer Interaction Concepts to Design Interfaces for the Brain Injured

Gnanayutham, P. and George, J.

15

3.

Developing a Windows Service Software Agent to Facilitate Automatic Collection of End-User Data

Hole, S. and McPhee, D.

41

4.

Usability Issues in Multimedia Interface Design

George, J.

61

5.

Playing a Game with Data Structures and Algorithms

Huebner, E. and Bem, D.

75

6.

End Users and the Information System Life Cycle Business Purpose-Focused Approach

Gackowski, J.Z.

87

PART II: Collaborative Environments and Cooperative Systems

7.

Towards Computer – Supported Cooperative Systems

Guo, J., Akis, V. and Tokunaga S.

109

8.

Conversation, Awareness and Coordination: A Framework to Enhance the Development of Social Relationships for On Line Teams

Egea, K.

123

9.

Awareness of Organizational Climate  and the Performance of Project Teams

Patel, S.

143

10.

Efficiencies of Ant Replication in MANETs

Adda, M. and Peart, A.

151

PART III: Information Retrieval, Algorithms and Quality of Service Issues

11.

Overcoming the Obstacles of Harvesting and Searching Digital Repositories from Federated Searching Toolkits Embedding them in VLEs

Chumbe, S., MacLeod, R., Barker, P., Moffat, M. and Rist, R.

163

12.

Non-Linear Algorithms for Parametric Markov Programming

Verkhovsky, B. and Polyakov Y.

179

13.

Evaluation of Quality Attributes for Web Services Architecture

Davison, G. and Petkov E.

195

14.

The Issues of Voice over IP on Wireless Networks

Adda, M. and Peart, A.

209

PART IV: Contemporary issues of Database, DB Systems and Networks

15.

A Lightweight Architecturer for Context Aware Applications Using LDAP

Al-Yasiri, A., Linge N. and Mufassir A.

223

16.

Towards a Framework for Dealing With Data Quality in Data Warehouses

Peng, T.

241

17.

Introduction to an Abstraction Architecture for Business Intelligence

Reynolds, D.

257

18.

The Architecture of the Intelligent Mobile Agent in the Atea of Network Fault Management

Al-Kasassbeh, M. and Adda, M

273

PART V: Contemporary issues of Computing Education and Research

19.

Learning Software Design Techniques via Redesign

Tao, Y.

287

20.

Using JStamp in Undergraduate Research

Dulimarta, H.

295

21.

E-Learning: Personalization and Collaboration Solution

Goetz, J. and Racataian, C.

303

22.

The Organizational and Motivational Aspects in IT Training

Leung, A.

321

23.

The Role of Mobility in Modern Learning Environment

Sirkemaa, S.

335

24.

Practical Approaches to Machine Translation

Inman, D. and Addley, B.

343

PART VI: Classification, Modelling, ERP and Decision Making

25.

Exploring Process Group for Reliability, Availability and Serviceability of Terascale Computing Systems

Okunbor, D., Engelmann, C and Scott, S.

357

26.

ERP Implementation by U.S. and Greek Companies : A Cross – Cultural Analysis

Argyropoulou, M., Ioannou, G., Motwani, J., Schwarz, T. and

Soderquist, K.

373

27.

Parametric View of Annotation for Decision Making

Robert, C.A. and David, A.

387

28.

Improved Computational Model of Ammonia – Water Absorption Refrigeration Cycle

Al-Shemmeri and T., Wang, Y.

397

29.

The Classifying Bird Sounds Based on SOMs

Zhang, H.

415

PART VII: Security, E-commerce and Web Applications

30.

On IC-Bag Based Systems

Chakrabarty, K.

427

31.

Web Application Software Architecture with Security as a Quality Attribute

Ambrose, J.A. and Petkov, E.

433

32.

Alternate Data Streams in Forensic Investigations of File System Backups

Bem, D. and Huebner, E. 

443

33.

Spatio – Temporal Relationships in the Analysis of Threats for Security Monitoring Systems

Onwubiko, C. and Lenaghan, A.

455

34.

E – Commerce Technology Comparison: ASP.NET vs Ajax

Goetz, J., Michalopoulos, D. and Pangilinan, J.

471

PART VIII: E-commerce and Investment Decision Making Applications

35.

Validity Assessment of an Experimental e-Shopping Interface and Survey in a Multicultural Context

Vachon, F., Vachon, J. and Rivard, S.

489

36.

Revising the Concept of Electronic Commerce

Unold, J.

499

37.

Identification of Unique Trend in an Integrated Investment Decision – Support Framework

Chen, W. 

507