Enterprise Management Information Systems

Edited by Yiannis Papadopoulos and Panagiotis Petratos

ISBN: 978-960-9549-60-8330 pages

First published in 2012 by ATINER

Price: Paperback: 50€ (It includes Shipping and Handling)

Electronic copy: 30€

Table of Contents

 

1.

Enterprise Management Information Systems: An Introduction to the Current Volume

Yiannis Papdopoulos and Panagiotis Petratos

1

PART I: Network Information Systems

2.

A Partitioned Stochastic Search Algorithm: Application to Multi-unit Winner Determination Problem in Combinatorial Auction

Singh R. J., Sen A. K. and Sarkar U. K.

9

3.

Tracing the Origins of Distributed Denial of Service Attacks

Peart A., Raynsford R., Ross P. 

27

4.

Limiting the Number of Route Changes in Data Networks

Belal A. and Rawas S.

37

5.

A Survey of Rich Internet Applications Solutions

Sireteanu N. A.

51

6.

A QoS Real Time Bandwidth Redistribution Transmission Algorithm in WiMAX

Peart A., Adda M. and Goodman A.

63

7.

Comparative Performance Evaluation of Different TCP Derivatives over MANET

Dafalla Z.I., Hammoshi M.

73

PART II: Management Strategies of Information

8.

e-LEAT: a Tool for the Evaluation of Online Learning Environments

Pole R., Jones K., Hole S. and Fakher A.

85

9.

Markovian Algorithm for Vanilla Option Valuation

Valakevičius E.

101

10.

Using Spatial Data in Windows Azure

Mateev M.

111

11.

Brazil of the Future: Strategizing with the Socio-technical Management Approach

Balloni A. J., Resende P.J.P. and Targowski A.

123

12.

Comparing Agile and PMBOK® – Time Management

Todorov N., Kovatcheva T.

137

PART III: Information Assurance

13.

Protection Piracy on Embedded System

Oliveira J.I.F.

153

14.

Distributed On-line Safety Monitor Based on Assessment Model and Multi-agent System

Dheedan A., Papadopoulos Y. and Davis D.

161

15.

Towards Robust Automatic Detection of Vulnerable Road Users: Monocular Pedestrian Tracking from a Moving Vehicle

Van Beeck K., De Smedt F., Beckers S., Struyf L., Vennekens J. De Samblanx G., Goedem´e T. and Tuytelaars T.

175

16.

Optimisation of Fault Tolerance via Automatic Model Transformations

Adachi M., Papadopoulos Y., Sharvia S.,Parker D., Tohdo T. and Walker M.

189

17.

Bounds on the Average Code Length of a Huffman Code with Two and Three Different Codeword Lengths

Tafran C.and Belal A.

201

PART IV: Health Informatics

18.

Water Information System for Estonia

Viies V., Ennet P., Aigro J., Kinks H., Kullamaa R., Ozolit O. and Salula A.

217

19.

Crossing the (Border) Line: Online Pharmacies and Ethical Risk

Jones K., Griffiths, S., Hole, S., Pole R.and Gibbins C.

227

20.

A Multi-Level Hierarchical Biometric Fusion Model for Medical Applications Security

Soviany S., Puscoci S. and Jurian M.

243

21.

MenuGene: A Comprehensive Expert System for Dietary and Lifestyle Counseling and Tracking

Pintér B., Vassányi I., Gaál B.and  Kozmann G.

257

22.

Developing a Generic Workflow to Guide EMRs Implementation at Health Facilities in Developing Countries-A Kenyan Case

Kang’a, S.G.

269

PART V: Human Computer Interaction

23.

A Dynamic Menu Interface Designer

Foster E. C.

277

24.

How not to Benefit from the Capabilities of a Computer Program to Design its user Interface

Kokabi M.

295

25.

HCI Considerations in Designing a Second Life Virtual Therapeutic Community for the Support & Treatment of People with Borderline Personality Disorder

Good A., Gnanayutham P., Sambhanthan A.and Panjganj V.

305