Default Cover Image

2013 International Conference on Informatics and Creative Multimedia (ICICM)

Sept. 4 2013 to Sept. 6 2013

Kuala Lumpur, Malaysia

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-x
Message from ICICM'13 ChairsFreely available from IEEE.pp. xi-xi
Message from ICICM'13 Editorial CommitteeFreely available from IEEE.pp. xii-xii
Organizing CommitteeFreely available from IEEE.pp. xiii-xiv
ReviewersFreely available from IEEE.pp. xv-xvi
A Comparison Enterprise Architecture Implementation MethodologiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
User Experience for Digitization and Preservation of Cultural HeritageFull-text access may be available. Sign in or learn about subscription options.pp. 13-16
Exploring the Use of Internet Media for Healthcare and Cancer AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 17-21
A Model to Assess the Usability of Enterprise Architecture FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 33-37
A Review of Critical Success Factors of Enterprise Architecture ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 38-42
YouTube Videos for Learning Principles of AnimationFull-text access may be available. Sign in or learn about subscription options.pp. 43-46
Teaching Creativity in Design Aesthetics: An Introspective Account of a University LecturerFull-text access may be available. Sign in or learn about subscription options.pp. 47-52
A Taxonomy of SQL Injection Detection and Prevention TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
An Empirical Analysis of a Testability ModelFull-text access may be available. Sign in or learn about subscription options.pp. 63-69
Cypris Chat: Emergent Design for Language Education in Second LifeFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Application of Madeline Hunter Model in Mathematics Learning CoursewareFull-text access may be available. Sign in or learn about subscription options.pp. 76-80
An Empirical Study into Model TestabilityFull-text access may be available. Sign in or learn about subscription options.pp. 85-92
Designing Opportunities to Learn through Online Active Learning EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Expression Driven Trigonometric Based Procedural Animation of QuadrupedsFull-text access may be available. Sign in or learn about subscription options.pp. 104-109
Anaglyph view of kinect 3D stream captureFull-text access may be available. Sign in or learn about subscription options.pp. 110-113
Effectiveness of Using English Vocabulary Mobile Applications on ESL's Learning PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 114-118
A Secure Method against Frequency Attack for Pattern Query on Encrypted String DataFull-text access may be available. Sign in or learn about subscription options.pp. 123-127
Cryptographic Hash Function: A High Level ViewFull-text access may be available. Sign in or learn about subscription options.pp. 128-134
Interactive Kinect Using Mobile Phone for EducationFull-text access may be available. Sign in or learn about subscription options.pp. 135-138
Gesture Recognition and Prediction for Smart Photo AlbumFull-text access may be available. Sign in or learn about subscription options.pp. 139-142
Predicting User Actions in Kinect using Simple Markov AssumptionFull-text access may be available. Sign in or learn about subscription options.pp. 143-146
Evaluation of a Novel Bees Algorithm for Improvement of Genetic Algorithms in a Classification ModelFull-text access may be available. Sign in or learn about subscription options.pp. 147-152
Gesture and face recognition for an interactive email systemFull-text access may be available. Sign in or learn about subscription options.pp. 159-164
Sensorial Design for Installation Art through E-LearningFull-text access may be available. Sign in or learn about subscription options.pp. 165-167
Interactive Mobile Game for Learning about Sustainablity EducationFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
Implementing Computer-Aided Language Learning Tool Using Hybrid Agile Method: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 174-180
Knowledge Management Practices and Implementation of E-InsuranceFull-text access may be available. Sign in or learn about subscription options.pp. 186-190
Modelling Place Elements in Virtual Heritage EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 191-195
Using Blended Learning to Enhance Students' Cognitive PresenceFull-text access may be available. Sign in or learn about subscription options.pp. 202-208
Learning and Knowledge Management: Learning as an Integrative Role for Knowledge CreationFull-text access may be available. Sign in or learn about subscription options.pp. 209-214
Multicollisions in Sponge ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 215-219
Web-Based Collaborative Learning: Students' Feedback on the Communication and Interaction ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Mobile Learning Awareness among Students at Higher Learning Institutes: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 226-229
New Algorithm with Bandwidth Reduction for Smaller Size Digital SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 230-235
Facebook Marketing Strategy for Small Business in MalaysiaFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
Security Threats in Online Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 254-258
The Concept of Digital Literacy from the Perspective of the Creative Multimedia IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 259-264
SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 265-268
A Taxonomy of SQL Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 269-273
The Impact of New Digital Media on Graphic Designer in JordanFull-text access may be available. Sign in or learn about subscription options.pp. 274-277
Taguchi-Based Parameter Designing of Genetic Algorithm for Artificial Neural Network TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 278-281
Young Visitors' Preferences for Touch Screen Design in MuseumsFull-text access may be available. Sign in or learn about subscription options.pp. 288-291
Novice Programming Students' Perception of Learning ObjectFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Testing an Adoption Model for E-Government Services Using Structure Equation ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Use of Optical Motion Capture in Sports Science: A Case Study of Golf SwingFull-text access may be available. Sign in or learn about subscription options.pp. 310-313
Exploring Believable Character Animation Based on Principles of Animation and ActingFull-text access may be available. Sign in or learn about subscription options.pp. 321-324
Experiencing Interactive Exhibition SpacesFull-text access may be available. Sign in or learn about subscription options.pp. 330-334
Projection Mapping for Tourism in the City of EsfahanFull-text access may be available. Sign in or learn about subscription options.pp. 335-339
Discrete Wavelet Transform Domain TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 340-345
Author indexFreely available from IEEE.pp. 346-347
[Publisher's information]Freely available from IEEE.pp. 348-348
Showing 75 out of 75