Information and Communication Technology

International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings

ISBN: 978-3-642-36817-2 (Print) 978-3-642-36818-9 (Online)

Table of contents (63 chapters)

previous Page of 4
  1. Front Matter

    Pages -

  2. Information and Communication Technology- Eurasia Conference (ICT-EurAsia)

    1. E-Society

      1. No Access

        Book Chapter

        Pages 1-10

        Translating the Idea of the eGovernment One-Stop-Shop in Indonesia

      2. No Access

        Book Chapter

        Pages 11-20

        A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the Network

      3. No Access

        Book Chapter

        Pages 21-30

        Early-Detection System for Cross-Language (Translated) Plagiarism

      4. No Access

        Book Chapter

        Pages 31-40

        TransWiki: Supporting Translation Teaching

      5. No Access

        Book Chapter

        Pages 41-49

        Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity Framework

      Software Engineering

      1. No Access

        Book Chapter

        Pages 50-59

        Software Development Methods in the Internet of Things

      2. No Access

        Book Chapter

        Pages 60-70

        SAT–Based Bounded Strong Satisfiability Checking of Reactive System Specifications

      3. No Access

        Book Chapter

        Pages 71-80

        OSMF: A Framework for OSS Process Measurement

      4. No Access

        Book Chapter

        Pages 81-90

        Analyzing Stability of Algorithmic Systems Using Algebraic Constructs

      5. No Access

        Book Chapter

        Pages 91-100

        Algorithms of the Combination of Compiler Optimization Options for Automatic Performance Tuning

      Security and Privacy

      1. No Access

        Book Chapter

        Pages 101-110

        On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries

      2. No Access

        Book Chapter

        Pages 111-120

        Semantic-Aware Obfuscation for Location Privacy at Database Level

      3. No Access

        Book Chapter

        Pages 121-130

        Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure Sketch

      4. No Access

        Book Chapter

        Pages 131-140

        CAPTCHA Suitable for Smartphones

      5. No Access

        Book Chapter

        Pages 141-151

        Code Based KPD Scheme with Full Connectivity: Deterministic Merging

      Cloud and Internet Computing

      1. No Access

        Book Chapter

        Pages 152-161

        Indonesian Digital Natives

      2. No Access

        Book Chapter

        Pages 162-172

        End-to-End Delay Performance for VoIP on LTE System in Access Network

      3. No Access

        Book Chapter

        Pages 173-182

        Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?

      4. No Access

        Book Chapter

        Pages 183-191

        A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud

      5. No Access

        Book Chapter

        Pages 192-201

        Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational Institution

previous Page of 4