Enterprise
Management Information Systems
Edited by Yiannis Papadopoulos and Panagiotis Petratos
ISBN: 978-960-9549-60-8, 330 pages
First published in
2012 by ATINER
Price: Paperback:
50€ (It includes Shipping and Handling)
Electronic copy:
30€
Table of Contents
|
||||
1. |
Enterprise
Management Information Systems: An Introduction to the Current Volume Yiannis
Papdopoulos and Panagiotis
Petratos |
1 |
||
PART I: Network Information Systems |
||||
2. |
A
Partitioned Stochastic Search Algorithm: Application to Multi-unit Winner
Determination Problem in Combinatorial Auction Singh R. J., Sen A. K. and Sarkar
U. K. |
9 |
||
3. |
Tracing
the Origins of Distributed Denial of Service Attacks Peart A., Raynsford R., Ross P.
|
27 |
||
4. |
Limiting
the Number of Route Changes in Data Networks Belal A. and
Rawas S. |
37 |
||
5. |
A
Survey of Rich Internet Applications Solutions Sireteanu N.
A. |
51 |
||
6. |
A QoS Real Time Bandwidth Redistribution Transmission
Algorithm in WiMAX Peart A., Adda M. and Goodman A. |
63 |
||
7. |
Comparative
Performance Evaluation of Different TCP
Derivatives over MANET Dafalla Z.I.,
Hammoshi M. |
73 |
||
PART II: Management Strategies of Information |
||||
8. |
e-LEAT:
a Tool for the Evaluation of Online Learning Environments Pole R., Jones K., Hole S. and Fakher
A. |
85 |
||
9. |
Markovian Algorithm for Vanilla Option Valuation Valakevičius
E. |
101 |
||
10. |
Using Spatial
Data in Windows Azure Mateev
M. |
111 |
||
11. |
Brazil of the Future: Strategizing with the Socio-technical
Management Approach Balloni A. J., Resende
P.J.P. and Targowski A. |
123 |
||
12. |
Comparing
Agile and PMBOK® – Time Management Todorov N., Kovatcheva T. |
137 |
||
PART III: Information
Assurance |
||||
13. |
Protection
Piracy on Embedded System Oliveira J.I.F. |
153 |
||
14. |
Distributed
On-line Safety Monitor Based on Assessment Model and Multi-agent System Dheedan A., Papadopoulos Y. and Davis D. |
161 |
||
15. |
Towards Robust Automatic Detection of Vulnerable Road
Users: Monocular Pedestrian Tracking from a Moving Vehicle Van Beeck K., De Smedt F., Beckers
S., Struyf L., Vennekens
J. De Samblanx G., Goedem´e
T. and Tuytelaars T. |
175 |
||
16. |
Optimisation of Fault Tolerance via Automatic Model Transformations Adachi M., Papadopoulos Y., Sharvia S.,Parker
D., Tohdo T. and Walker M. |
189 |
||
17. |
Bounds
on the Average Code Length of a Huffman Code with Two and Three Different
Codeword Lengths Tafran C.and Belal A. |
201 |
||
PART IV: Health
Informatics |
||||
18. |
Water
Information System for Estonia Viies V., Ennet P., Aigro
J., Kinks H., Kullamaa R., Ozolit
O. and Salula A. |
217 |
||
19. |
Crossing
the (Border) Line: Online Pharmacies and Ethical Risk Jones K., Griffiths,
S., Hole, S., Pole R.and Gibbins
C. |
227 |
||
20. |
A
Multi-Level Hierarchical Biometric Fusion Model for Medical Applications
Security Soviany S., Puscoci S. and Jurian
M. |
243 |
||
21. |
MenuGene: A Comprehensive Expert System for Dietary and Lifestyle Counseling
and Tracking Pintér B., Vassányi I., Gaál
B.and Kozmann G. |
257 |
||
22. |
Developing
a Generic Workflow to Guide EMRs Implementation at Health Facilities in
Developing Countries-A Kenyan Case Kang’a, S.G. |
269 |
||
PART V: Human Computer Interaction |
||||
23. |
A
Dynamic Menu Interface Designer Foster E. C. |
277 |
||
24. |
How not
to Benefit from the Capabilities of a Computer Program to Design its user Interface Kokabi M. |
295 |
||
25. |
HCI Considerations
in Designing a Second Life Virtual Therapeutic Community for the Support
& Treatment of People with Borderline Personality Disorder Good A., Gnanayutham P., Sambhanthan A.and Panjganj V. |
305 |
||