Strategic Advantage of Computing Information
Systems in
Edited by Majid Sarrafzadeh and Panagiotis Petratos
ISBN: 978-960-6672-93-4,
318 pages
First
published in 2010 by ATINER
Price:
Paperback: 50€ (It
includes Shipping and Handling)
Electronic
copy: 30€
Table
of Contents
Strategic Advantage of Computing Information Systems in Majid Sarrafzadeh
and Panagiotis Petratos |
i |
|
PART I: Business Information
Systems and their Impact on Economy and |
||
1. |
Business Intelligence Solutions - A Survey Waqar Haque |
3 |
2. |
Taking a Byte of the “American Pie”: An Exploration of the Influence of Political,
Economic, Social, and Technological Actors on Democracy Policy Formulation
and Execution David Hartmann |
17 |
3. |
Virtual Reality, 3D Visualization and
Simulation in Decision Support Ikpe Justice Akpan |
31 |
PART II: E-Learning and ICT Education |
||
4. |
Using Petri Nets to Introduce Multithreading
Concepts in C# Jozef Goetz |
45 |
5. |
Opportunities and Challenges Using Fractal
Technology for E-Learning CG Models Alan Garfield |
61 |
6. |
Smart Classroom
Design and its Application in E-learning Gang Chen, Ruimin Shen and Yi
Zhang |
73 |
PART |
||
7. |
Web Search in a David Inman |
85 |
8. |
Listing Cliques in Parallel
Using a Beowulf Cluster Kaveh Moallemi,
Gerald D. Zarnett and Eric R. Harley |
95 |
9. |
Topological
Properties of Web Services Similarity Networks Chantal Cherifi, Vincent Labatut
and Jean François Santucci |
105 |
10. |
A
Semantic Toll and Hybrid Database for Information Resources Jesús Tramullas and Piedad Garrido |
117 |
PART IV: Environment and Information Systems |
||
11. |
Effective
use of Geographical Information Systems to Manage Local Beverley Holland and Steven Gardiner |
131 |
12. |
Environmental Data
Collection in the Field: A Web Based Solution Rhian Pole, Stephen Hole and
Karen Jones |
151 |
PART
V: Computer Modeling |
||
13. |
Novel
Methods for Real-Time 3D Facial Recognition Marcos A. Rodrigues and Alan Robinson |
169 |
14. |
Model-Based
Safety Analysis Using Compositional Analysis and Formal Verification
Techniques Septavera Sharvia
and |
181 |
15. |
Design
and Implementation of Autonomous Classification System Using .NET Windows
Service Agent Technology Mohammed Mhereeg, Duncan McPhee,
Stephen Hole and Nathan Thomas |
201 |
16. |
Modelling
Highly Inflective Language for Target Applications using Natural Language Mirjam Sepesy
Maucec, Janez Brest and Andrej Zgank |
219 |
17. |
Extending
HiP-HOPS with Capabilities of Planning Preventative
Maintenance Shawulu H. Nggada, |
231 |
PART VI: Human Computer Interaction and
Assistive Technologies |
||
18. |
Designing
Rehabilitation Robots for the Brain Injured Paul Gnanayutham and Jennifer George |
245 |
19. |
Human
Computer Interaction and Theories Jennifer George and Paul Gnanayutham |
255 |
PART VII: Management Strategies of Information
Assurance |
||
20. |
A
Security Model for Virtual Web Services Hassina Nacer
Talantikite and Djamil Aissani |
273 |
21. |
Agent-based
Modelling of Reputation for Sellers in an eMarketplace Liangjun You and Riyaz Sikora |
287 |
22. |
The
Malicious Insider: Approaching Organizational Crisis Management, Culture and
Management’s Role on Employees’ Behaviour Ulrike Hugl |
305 |
|
|
|