2012 Ninth International Conference on Information Technology - New Generations最新文献

筛选
英文 中文
An Exploratory Study of the Users' Behavior on Social Network Sites 社交网站用户行为的探索性研究
Shwu-Min Horng
{"title":"An Exploratory Study of the Users' Behavior on Social Network Sites","authors":"Shwu-Min Horng","doi":"10.1109/ITNG.2012.69","DOIUrl":"https://doi.org/10.1109/ITNG.2012.69","url":null,"abstract":"This study makes use of Google Analytics data from four social network sites under web 2.0 setting to analyze their users' behavior. Several statistical techniques are used to analyze the data based on the measures across the four companies with seven cases. Some interesting findings indicate that certain patterns emerge according to the characteristics of the web services. Managerial implications are discussed along with suggestions for future research.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130165065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Simulation of Multiple-Input Single-Output DC-DC Converter 多输入单输出DC-DC变换器的设计与仿真
T. Taufik, T. Wong, Owen Jong, D. Dolan
{"title":"Design and Simulation of Multiple-Input Single-Output DC-DC Converter","authors":"T. Taufik, T. Wong, Owen Jong, D. Dolan","doi":"10.1109/ITNG.2012.109","DOIUrl":"https://doi.org/10.1109/ITNG.2012.109","url":null,"abstract":"This paper presents the design and simulation of Multiple-Input Single-Output (MISO) dc-dc converter. The main purpose of the converter is to allow connection of multiple power sources to a single dc bus system. Design and modeling of the MISO converter will first be discussed. Results of the computer simulation will be presented which demonstrate the ability of the converter to accept multiple dc sources while outputting only one dc voltage.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132153238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Distributed Sensor Objects for Intrusion Detection Systems 用于入侵检测系统的分布式传感器对象
R. Erbacher, Steve E. Hutchinson
{"title":"Distributed Sensor Objects for Intrusion Detection Systems","authors":"R. Erbacher, Steve E. Hutchinson","doi":"10.1109/ITNG.2012.100","DOIUrl":"https://doi.org/10.1109/ITNG.2012.100","url":null,"abstract":"Effective intrusion detection requires the analysis of enormous volumes of data collected from distributed sensor objects. Traditionally, this analysis has been performed on central servers. The alternative has been to limit data collection to network flow data, with the side effect of reducing intrusion detection effectiveness. This research examined an alternative, namely the incorporation of more intelligent sensor objects. We discuss the infrastructure required to support such a metaphor, the potential tradeoffs, and a novel algorithm for such an intelligent distributed sensor object.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Tool for Teaching Risk 风险教学的工具
S. Rajendran, K. Gary, H. Koehnemann
{"title":"A Tool for Teaching Risk","authors":"S. Rajendran, K. Gary, H. Koehnemann","doi":"10.1109/ITNG.2012.172","DOIUrl":"https://doi.org/10.1109/ITNG.2012.172","url":null,"abstract":"Students tend to think optimistically about the software they construct. They believe the software will be defect free, and underestimate apparent risks to the development process. In the Software Enterprise, a 4-course upper division project sequence, student team failures to predict and prevent these risks lead to various problems like schedule delays, frustration, and dissatisfaction from external customer sponsors. The Enterprise uses the IBM Rational Jazz platform, but it does not have a native risk management capability. Instead, project teams were recording risks associated with their projects on paper reports. To facilitate maintaining and managing the risks associated with their projects, we developed a risk management component in the Jazz environment. This component complements Jazz by providing features of the risk management process like risk control and monitoring. The risk management component was used and evaluated by student capstone project teams.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided Approach 在客户关系管理中促进用户界面的接受:多媒体辅助方法
Mutlaq B. Al-Otaibi, D. Rigas
{"title":"Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided Approach","authors":"Mutlaq B. Al-Otaibi, D. Rigas","doi":"10.1109/ITNG.2012.158","DOIUrl":"https://doi.org/10.1109/ITNG.2012.158","url":null,"abstract":"There has been an increasing demand for organizations to foster real-time interaction with customers, through the development of multimedia and Knowledge-enabled Customer Relationship Management (KCRM) systems. KCRM implementations encounter several challenges, such as information overload and lack of trust. Few empirical studies were devoted to assess the role of multimedia to tackle these issues. Therefore, this paper describes an empirical investigation into the implication of incorporating multimedia elements into KCRM interfaces. To achieve this, an experimental KCRM platform was implemented with three different modes of interaction: Visual-only KCRM (V-CRM) with text and graphics, Multimodal KCRM (M-CRM) with speech, earcons and auditory icons and Avatar-enhanced multimodal KCRM (A-CRM). The three platforms were evaluated by a group of forty-eight participants (n=48) of age group varies from 18 to 55 year old, by performing six common tasks and filling a questionnaire devised to measure the aspects of user acceptance. The results therein revealed that A-CRM was more acceptable than both M-CRM and V-CRM, whereas M-CRM was less acceptable than V-CRM.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122186465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Protecting Intellectual Property by Certified Component Quality Descriptions 通过认证组件质量描述保护知识产权
Henning Groenda
{"title":"Protecting Intellectual Property by Certified Component Quality Descriptions","authors":"Henning Groenda","doi":"10.1109/ITNG.2012.49","DOIUrl":"https://doi.org/10.1109/ITNG.2012.49","url":null,"abstract":"A major part of Component-Based Software Engineering (CBSE) focuses on composing systems of independent components and the re-use of components. Descriptions of the quality of components allow assuring the quality of the composed system. Certification addresses trust issues regarding the trustworthiness of the descriptions, e.g. in components of the shelf (COTS) scenarios. Selecting components based on quality descriptions allows protecting intellectual property (IP) of the component supplier during selection but the development process must support certification and compositional evaluations. Different certification levels are available which affect the distribution of certification effort across participating roles depending on the need for IP protection and described quality characteristic. Existing CBSE approaches neglect a clear integration of description-based selection in the development process and provide no guidelines on selecting the appropriate certification level for a component. In this paper, we show how certification of quality descriptions can be integrated into a CBSE development process. Additionally, we provide a guideline supporting the selection of a certification level and point out the implications on the effort distribution on the different participating roles. The application of the guideline is demonstrated in three different scenarios and the most suitable certification level is identified, which allows tailoring a CBSE-aware certification process.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121226850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSN 正强化的社会与协作社会网络模型:正强化在线社会网络:PRSN
H. Fardoun, Daniyal Algazzawi, S. R. López, Jose Antonio Gallud Lazarro
{"title":"Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSN","authors":"H. Fardoun, Daniyal Algazzawi, S. R. López, Jose Antonio Gallud Lazarro","doi":"10.1109/ITNG.2012.75","DOIUrl":"https://doi.org/10.1109/ITNG.2012.75","url":null,"abstract":"In the last years, online social networks (ONSs, online social networks) have grown to become one of the major medias for human beings on the Internet by having a wide distribution and acceptance by users. One of the critical aspects of developing this type of systems is the user interface. For this reason, a model-based approach is used to allow us collect interaction and collaboration aspects of social networks. Moreover, this paper based on ONSs and model-driven development provides a first approximation of social and collaborative model of a new online social network, which we have called PRSN (Positive Reinforcement Online Social Network).","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform 移动平台上单元测试技术的比较评价
Selin Benli, A. Habash, A. Herrmann, Tyler Loftis, Devon M. Simmonds
{"title":"A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform","authors":"Selin Benli, A. Habash, A. Herrmann, Tyler Loftis, Devon M. Simmonds","doi":"10.1109/ITNG.2012.45","DOIUrl":"https://doi.org/10.1109/ITNG.2012.45","url":null,"abstract":"Software testing is generally an expensive, ad hoc and unpredictable process. Therefore, a better understanding of and an improvement of unit testing methods may improve the overall software testing process leading to more efficient test method selection and increased fault detection accuracy. The aim of this study is evaluate Black Box and White Box unit testing methods for the Android operating system. While several investigations have looked at unit testing using Black Box and White Box techniques, our research focuses explicitly on unit testing for Android applications. Test cases were created using JUnit and the program under test was seeded with errors by an outside party. We evaluated the performance of these two test methods on the difficulty of developing test cases for each method and the effectiveness of finding software errors in a controlled environment. Our results showed benefits and challenges for both testing techniques. Inferences and implications are also presented.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios 面向支持协作场景的用户控制服务器的透明匿名
Mohamed Bourimi, M. Heupel, Benedikt Westermann, D. Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte
{"title":"Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios","authors":"Mohamed Bourimi, M. Heupel, Benedikt Westermann, D. Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte","doi":"10.1109/ITNG.2012.23","DOIUrl":"https://doi.org/10.1109/ITNG.2012.23","url":null,"abstract":"The increasing tendency of using user-controlled servers for supporting different scenarios from leisure and professional life raises new security challenges. Especially when those servers are used to support collaborative scenarios (e.g., communication and sharing with others), the requirement for anonymity at the network level should be supported in an efficient way. In this paper we present a specific communication scenario that could lead to link ability even though anonymous networks are used. The requirements gathering is based on realistic requirements from the EU FP7 di.me project requiring to empower lay end-users to collaborate with their contacts. Thereby anonymity at the network level also needs to be considered in order to disguise the physical location of the users and also of their server(s). We present an approach satisfying these anonymity requirements by means of a Tor based software component in order to overcome such privacy problems. First results are presented and the portability of the suggested solution for similar settings as well as future work directions are discussed.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"25 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data 基因表达微阵列数据模糊聚类分析的概率归算方法
Thanh Le, T. Altman, K. Gardiner
{"title":"Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data","authors":"Thanh Le, T. Altman, K. Gardiner","doi":"10.1109/ITNG.2012.159","DOIUrl":"https://doi.org/10.1109/ITNG.2012.159","url":null,"abstract":"Fuzzy clustering has been widely used for analysis of gene expression micro array data. However, most fuzzy clustering algorithms require complete datasets and, because of technical limitations, most micro array datasets have missing values. To address this problem, we present a new algorithm where genes are clustered using the Fuzzy C-Means algorithm, followed by approximating the fuzzy partition by a probabilistic data distribution model which is then used to estimate the missing values in the dataset. Using distribution-based approach, our method is most appropriate for datasets where the data are nonuniform. We show that our method outperforms six popular imputation algorithms on uniform and nonuniform artificial datasets as well as real datasets with unknown data distribution model.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"75 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信