Computer Applications for Database, Education, and Ubiquitous Computing

International Conferences, EL, DTA and UNESST 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings

ISBN: 978-3-642-35602-5 (Print) 978-3-642-35603-2 (Online)

Table of contents (50 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-7

    The Design of Experimental Nodes on Teaching Platform of Cloud Laboratory (TPCL)

  3. No Access

    Book Chapter

    Pages 8-14

    Challenges of Electronic Textbook Authoring: Writing in the Discipline

  4. No Access

    Book Chapter

    Pages 15-22

    An Analysis of Factors Influencing the User Acceptance of OpenCourseWare

  5. No Access

    Book Chapter

    Pages 23-30

    Applying Augmented Reality in Teaching Fundamental Earth Science in Junior High Schools

  6. No Access

    Book Chapter

    Pages 31-37

    Anytime. Everywhere. Mobile Learning in Higher Education: Creating a GIS Course

  7. No Access

    Book Chapter

    Pages 38-43

    Wireless and Configurationless iClassroom System with Remote Database via Bonjour

  8. No Access

    Book Chapter

    Pages 44-49

    KOST: Korean Semantic Tagger ver. 1.0

  9. No Access

    Book Chapter

    Pages 50-57

    An Attempt on Effort-Achievement Analysis of Lecture Data for Effective Teaching

  10. No Access

    Book Chapter

    Pages 58-71

    Mobile Applications Development with Combine on MDA and SOA

  11. No Access

    Book Chapter

    Pages 72-79

    Semantic Web Service Composition Using Formal Verification Techniques

  12. No Access

    Book Chapter

    Pages 80-85

    Characteristics of Citation Scopes: A Preliminary Study to Detect Citing Sentences

  13. No Access

    Book Chapter

    Pages 86-91

    Scorpio: A Simple, Convenient, Microsoft Excel Macro Based Program for Privacy-Preserving Logrank Test

  14. No Access

    Book Chapter

    Pages 92-98

    Generic Process Framework for Safety-Critical Software in a Weapon System

  15. No Access

    Book Chapter

    Pages 99-102

    Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption

  16. No Access

    Book Chapter

    Pages 103-106

    Software Implementation of Source Code Quality Analysis and Evaluation for Weapon Systems Software

  17. No Access

    Book Chapter

    Pages 107-110

    An Approach to Constructing Timing Diagrams from UML/MARTE Behavioral Models for Guidance and Control Unit Software

  18. No Access

    Book Chapter

    Pages 111-115

    Detecting Inconsistent Names of Source Code Using NLP

  19. No Access

    Book Chapter

    Pages 116-119

    Voice Command Recognition for Fighter Pilots Using Grammar Tree

  20. No Access

    Book Chapter

    Pages 120-125

    Web-Based Text-to-Speech Technologies in Foreign Language Learning: Opportunities and Challenges

  21. No Access

    Book Chapter

    Pages 126-133

    Design of Interval Type-2 FCM-Based FNN and Genetic Optimization for Pattern Recognition

previous Page of 3