scispace - formally typeset
Search or ask a question
BookDOI

Availability, Reliability, and Security in Information Systems and HCI

TL;DR: This paper focuses on the conceptual benefits and risks such an integration of sensor data into social media in the case of a patient room and introduces a way to deal with these problems.
Abstract: In a hospital, information exchange is essential to save lives and to prevent life-endangering mistakes. Information exchange is supported by a hospital information system (HIS). From a theoretical perspective, the deployment of an HIS is promising because it reduces errors and duplication of information. In practice, however, there are some major problems concerning the usage of such a system. One way to deal with these problems is introduced in this paper: the integration of sensor data into social media. The paper concentrates on the conceptual benefits and risks such an integration may generate. It focuses on the case of a patient room.

Summary (1 min read)

Jump to: [Preface] and [VI Preface]

Preface

  • You for all his efforts in this special track, which was this year for the third time.
  • Also, the authors are proud to announce the Special Session Human–Computer Interaction &KnowledgeDiscovery (HCI-KDD), which was organized in the context of CD-ARES 2013.
  • The accepted papers dealt with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption and interaction between cryptographic theory and implementation issues.

VI Preface

  • The papers presented at this conference were selected after extensive reviews by the Program Committee with the essential help of associated reviewers.
  • The authors would like to thank all the Program Committee members and the reviewers, who made great effort contributing their time, knowledge, and expertise and foremost the authors for their contributions.
  • September 2013 Alfredo Cuzzocrea Christian Kittl Dimitris E. Simos Edgar Weippl Lida Xu.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Lecture Notes in Computer Science 8127
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board
David Hutchison
Lancaster University, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Alfred Kobsa
University of California, Irvine, CA, USA
Friedemann Mattern
ETH Zurich, Switzerland
John C. Mitchell
Stanford University, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
Oscar Nierstrasz
University of Bern, Switzerland
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Germany
Madhu Sudan
Microsoft Research, Cambridge, MA, USA
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbruecken, Germany

Alfredo Cuzzocrea Christian Kittl
Dimitris E. Simos EdgarWeippl LidaXu(Eds.)
Availability, Reliability,
and Security
in Information Systems
and HCI
IFIP WG 8.4, 8.9, TC 5 International
Cross-Domain Conference, CD-ARES 2013
Regensburg, Germany, September 2-6, 2013
Proceedings
13

Volume Editors
Alfredo Cuzzocrea
ICAR-CNR
and University of Calabria
Rende Cosenza, Italy
E-mail: cuzzocrea@si.deis.unical.it
Christian Kittl
Evolaris Next Level
Graz, Austria
E-mail: christian.kittl@evolaris.net
Dimitris E. Simos
SBA Research
Vienna, Austria
E-mail: dsimos@sba-research.org
Edgar Weippl
Vienna University of Technology
and SBA Research
Vienna, Austria
E-mail: edgar.weippl@tuwien.ac.at
Lida Xu
Old Dominion University
Norfolk, VA, USA
E-mail: lxu@odu.edu
ISSN 0302-9743 e-ISSN 1611-3349
ISBN 978-3-642-40510-5 e-ISBN 978-3-642-40511-2
DOI 10.1007/978-3-642-40511-2
Springer Heidelberg New York Dordrecht London
Library of Congress Control Number: 2013945883
CR Subject Classification (1998): H.4, K.6.5, H.3.1, H.3.3-5, E.3, K.4.4, H.2.3, H.2.8,
H.5.3, D.2, J.1
LNCS Sublibrary: SL 3 Information Systems and Application, incl. Internet/Web
and HCI
© IFIP International Federation for Information Processing 2013
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection
with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and
executedon a computer system, for exclusiveuse bythe purchaserof thework. Duplication of thispublication
or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location,
in its current version, and permission for use must always be obtained from Springer. Permissions for use
may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution
under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
While the advice and information in this book are believed to be true and accurate at the date of publication,
neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or
omissions that may be made. The publisher makes no warranty, express or implied, with respect to the
material contained herein.
Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)

Preface
The Cross-Domain Conference and Workshop CD-ARES is focused on the holis-
tic and scientific view of applications in the domain of information systems.
The idea of organizing cross-domain scientific events originated from a con-
cept presented by the IFIP President Leon Strous at the IFIP 2010 World Com-
puter Congress in Brisbane, which was seconded by many IFIP delegates in
further discussions. Therefore, CD-ARES concentrates on the many aspects of
information systems in bridging the gap between the research results in computer
science and the many application fields.
This effort leads us to the consideration of the various important issues of
massive information sharing and data integration, which will (in our opinion)
dominate scientific work and discussions in the area of information systems in
the second decade of this century.
The organizers of this event who are engaged within IFIP in the area of En-
terprise Information Systems (WG 8.9), Business Information Systems (WG 8.4),
and Information Technology Applications (TC 5) very much welcome the typical
cross-domain aspect of this event.
The collocation with the SeCIHD 2013 Workshop was another possibility to
discuss the most essential application factors. Special thanks to Professor Ilsun
You for all his efforts in this special track, which was this year for the third time.
Also, we are proud to announce the Special Session Human–Computer Inter-
action & Knowledge Discovery (HCI-KDD), which was organized in the context of
CD-ARES 2013. The ultimate goal of the task force HCI-KDD is to combine the
best of two worlds: human–computer interaction (HCI), with emphasis on human
intelligence, and knowledge discovery from data (KDD), dealing with computa-
tional intelligence. The cross-domain integration and appraisal of different fields
provide an atmosphere in which to foster different perspectives and opinions. Spe-
cial thanks to Dr. Andreas Holzinger, who made it possible to bring together re-
searchers from diverse areas in a highly inter-disciplinary manner, to stimulate
fresh ideas and encourage multi-disciplinary work.
Today, e-business depends heavily on the major cryptographic breakthroughs
of almost 40 years ago. Without asymmetric cryptography, hardly any form of
business transaction would be as easy to secure as it is today. We are thus very
happy to have an excellent section on applied cryptography in this book.
The special track on modern cryptography and security engineering (MoCry-
SEn) attracted 30 submissions, of which the Program Committee selected 16
for publication in the workshop proceedings. The accepted papers dealt with
symmetric-key cryptography, public-key cryptography, algorithmic cryptanaly-
sis, software and hardware implementation of cryptographic algorithms, database
encryption and interaction between cryptographic theory and implementation
issues.

VI Preface
The papers presented at this conference were selected after extensive reviews
by the Program Committee with the essential help of associated reviewers.
We would like to thank all the Program Committee members and the review-
ers, who made great effort contributing their time, knowledge, and expertise and
foremost the authors for their contributions.
September 2013 Alfredo Cuzzocrea
Christian Kittl
Dimitris E. Simos
Edgar Weippl
Lida Xu

Citations
More filters
01 Jan 2002

9,314 citations

Journal ArticleDOI
TL;DR: Polanyi is at pains to expunge what he believes to be the false notion contained in the contemporary view of science which treats it as an object and basically impersonal discipline.
Abstract: The Study of Man. By Michael Polanyi. Price, $1.75. Pp. 102. University of Chicago Press, 5750 Ellis Ave., Chicago 37, 1959. One subtitle to Polanyi's challenging and fascinating book might be The Evolution and Natural History of Error , for Polanyi is at pains to expunge what he believes to be the false notion contained in the contemporary view of science which treats it as an object and basically impersonal discipline. According to Polanyi not only is this a radical and important error, but it is harmful to the objectives of science itself. Another subtitle could be Farewell to Detachment , for in place of cold objectivity he develops the idea that science is necessarily intensely personal. It is a human endeavor and human point of view which cannot be divorced from nor uprooted out of the human matrix from which it arises and in which it works. For a good while

2,248 citations

References
More filters
01 Jan 1989
TL;DR: Regression analyses suggest that perceived ease of use may actually be a causal antecdent to perceived usefulness, as opposed to a parallel, direct determinant of system usage.

40,975 citations

Book
01 Jan 1994
TL;DR: The book is an introduction to the idea of design patterns in software engineering, and a catalog of twenty-three common patterns, which most experienced OOP designers will find out they've known about patterns all along.
Abstract: The book is an introduction to the idea of design patterns in software engineering, and a catalog of twenty-three common patterns. The nice thing is, most experienced OOP designers will find out they've known about patterns all along. It's just that they've never considered them as such, or tried to centralize the idea behind a given pattern so that it will be easily reusable.

22,762 citations

Journal ArticleDOI
TL;DR: This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.
Abstract: More than twelve years have elapsed since the first public release of WEKA. In that time, the software has been rewritten entirely from scratch, evolved substantially and now accompanies a text on data mining [35]. These days, WEKA enjoys widespread acceptance in both academia and business, has an active community, and has been downloaded more than 1.4 million times since being placed on Source-Forge in April 2000. This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.

19,603 citations

Journal ArticleDOI
TL;DR: The relationship between transfer learning and other related machine learning techniques such as domain adaptation, multitask learning and sample selection bias, as well as covariate shift are discussed.
Abstract: A major assumption in many machine learning and data mining algorithms is that the training and future data must be in the same feature space and have the same distribution. However, in many real-world applications, this assumption may not hold. For example, we sometimes have a classification task in one domain of interest, but we only have sufficient training data in another domain of interest, where the latter data may be in a different feature space or follow a different data distribution. In such cases, knowledge transfer, if done successfully, would greatly improve the performance of learning by avoiding much expensive data-labeling efforts. In recent years, transfer learning has emerged as a new learning framework to address this problem. This survey focuses on categorizing and reviewing the current progress on transfer learning for classification, regression, and clustering problems. In this survey, we discuss the relationship between transfer learning and other related machine learning techniques such as domain adaptation, multitask learning and sample selection bias, as well as covariate shift. We also explore some potential future issues in transfer learning research.

18,616 citations

Proceedings ArticleDOI
20 Sep 1999
TL;DR: Experimental results show that robust object recognition can be achieved in cluttered partially occluded images with a computation time of under 2 seconds.
Abstract: An object recognition system has been developed that uses a new class of local image features. The features are invariant to image scaling, translation, and rotation, and partially invariant to illumination changes and affine or 3D projection. These features share similar properties with neurons in inferior temporal cortex that are used for object recognition in primate vision. Features are efficiently detected through a staged filtering approach that identifies stable points in scale space. Image keys are created that allow for local geometric deformations by representing blurred image gradients in multiple orientation planes and at multiple scales. The keys are used as input to a nearest neighbor indexing method that identifies candidate object matches. Final verification of each match is achieved by finding a low residual least squares solution for the unknown model parameters. Experimental results show that robust object recognition can be achieved in cluttered partially occluded images with a computation time of under 2 seconds.

16,989 citations