10,738 results
Search Results
2. A Publishing Framework for Digitally Augmented Paper Documents: Towards Cross-Media Information Integration.
- Author
-
Yueting Zhuang, Shiqiang Yang, Yong Rui, Qinming He, Xiaoqing Lu, and Zhiwu Lu
- Abstract
Paper keeps as a key information medium and this has motivated the development of new technologies for digitally augmented paper (DAP) that enable printed content to be linked with multimedia information. Among those technologies, one simplest approach is to print some visible patterns on paper (e.g., barcodes in the margin) as cross-media links. Due to the latest progress in printing industry, some more sophisticated methods have been developed, that is, some kinds of patterns printed on the background of a page in a high resolution are almost invisible and then we are affected little when reading. For all these pattern-embedding based approaches to integrate printed and multimedia information, we aim to present a unified publishing framework independent of particular patterns and readers(e.g., cameras to capture patterns) used to realize DAP. The presented framework manages semantic information about printed documents, multimedia resources, and patterns as links between them and users are provided with a platform for publishing DAP documents. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
3. Citation-Based Methods for Personalized Search in Digital Libraries.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Weske, Mathias, Hacid, Mohand-Saïd, Godart, Claude, Van, Thanh-Trung, and Beigbeder, Michel
- Abstract
In this paper we present our work about personalized search in digital libraries. Unlike other researches which use content-based methods, we focus on citation-based methods for this purpose. We propose a practical approach to estimate the co-citation relatedness between scientific papers using the Google search engine. We conducted some experiments to evaluate performance of different citation-based methods. The experimental results show that our approach is promising and applicable for personalized search in digital libraries. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
4. Practical Security Analysis of Dirty Paper Trellis Watermarking.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Furon, Teddy, Cayre, François, Doërr, Gwenaël, and Bas, Patrick
- Abstract
This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN). [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
5. "Merolyn the Phone": A Study of Bluetooth Naming Practices (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Abowd, Gregory D., Seneviratne, Aruna, Strang, Thomas, and Kindberg, Tim
- Abstract
This paper reports the results of an in-depth study of Bluetooth naming practices which took place in the UK in August 2006. There is a significant culture of giving Bluetooth names to mobile phones in the UK, and this paper's main contribution is to provide an account of those Bluetooth naming practices, putting them in their social, physical and intentional context. The paper also uncovers how users have appropriated the ways in which Bluetooth, with its relatively short range of about 10-100m, operates between their mobile phones as a partially embodied medium, making it a distinctive paradigm of socially and physically embedded communication. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
6. Effectiveness of Content Preparation in Information Technology Operations: Synopsis of a Working Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Savoy, A., and Salvendy, G.
- Abstract
Content preparation is essential for web design [25]. The objective of this paper is to establish a theoretical foundation for the development of methods to evaluate the effectiveness of content preparation in information technology operations. Past studies identify information as the dominant concern of users, and delivery mechanism as a secondary concern [20]. The best presentation of the wrong information results in a design with major usability problems and does not aid the user in accomplishing his task. This paper shifts the focus of existing usability evaluation methods. It attempts to fill the void in usability literaoture by addressing the information aspect of usability evaluation. Combining the strengths of content preparation and usability evaluation yields major implications for a broad range of IT uses. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
7. Document Management and Information Organizing Method Using RFID Tags.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Kojima, Hiroyuki, Iwata, Ken, and Nishimura, Naoki
- Abstract
Due to the progress of Internet technology and the increase of distributed information on networks, the present knowledge management has been based more and more on the performance of various experienced users. In addition to the increase of electronic documents, the use of paper documents has not been reduced because of their convenience. This paper describes a method of tracking paper document locations and contents using radio frequency identification (RFID) technology. This research also focused on the expression of a task process and the seamless structuring of related electronic and paper documents as a result of task knowledge formalization using information organizing. A system is proposed here that implements information organization for both Web documents and paper documents with the task model description and RFID technology. Examples of a prototype system are also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
8. Discovering User Profiles from Semantically Indexed Scientific Papers.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Berendt, Bettina, Hotho, Andreas, Mladenic, Dunja, Semeraro, Giovanni, Basile, Pierpaolo, de Gemmis, Marco, and Lops, Pasquale
- Abstract
Typically, personalized information recommendation services automatically infer the user profile, a structured model of the user interests, from documents that were already deemed relevant by the user. We present an approach based on Word Sense Disambiguation (WSD) for the extraction of user profiles from documents. This approach relies on a knowledge-based WSD algorithm, called JIGSAW, for the semantic indexing of documents: JIGSAW exploits the WordNet lexical database to select, among all the possible meanings (senses) of a polysemous word, the correct one. Semantically indexed documents are used to train a naïve Bayes learner that infers "semantic", sense-based user profiles as binary text classifiers (user-likes and user-dislikes). Two empirical evaluations are described in the paper. In the first experimental session, JIGSAW has been evaluated according to the parameters of the Senseval-3 initiative, that provides a forum where the WSD systems are assessed against disambiguated datasets. The goal of the second empirical evaluation has been to measure the accuracy of the user profiles in selecting relevant documents to be recommended. Performance of classical keyword-based profiles has been compared to that of sense-based profiles in the task of recommending scientific papers. The results show that sense-based profiles outperform keyword-based ones. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
9. Validity and Cross-Validity in HCI Publications.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Doherty, Gavin, Blandford, Ann, and Thimbleby, Harold
- Abstract
Papers in HCI play different roles, whether to inspire, solve industrial problems or further the science of HCI. There is a potential conflict between the different views, and a danger that different forms of validity are assumed by author and reader — deliberately or accidentally. This paper reviews some of the issues in this complex area and makes practical recommendations. In particular, the paper introduces the term "cross-validity" to help make explicit the issues, problems and means to tackle them. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
10. What Are the Future Possibilities of eDemocracy? A Discussion Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Wimmer, Maria A., Scholl, Jochen, Grönlund, Åke, and Boyd, Ovid Pacific
- Abstract
This paper presents some future possibilities for eDemocracy tools and considers how these new technologies might conflict with our basic assumptions about what democracy should be. I hope this paper will contribute to discussion of under what situations different forms of eDemocracy are appropriate. The possibilities and repercussions of user profiling, voting outside of polling booths, longer decision-making periods, changeable election results and weighted voted are considered. Although none are necessarily advisable, this paper suggests they might be interesting to consider. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
11. The Management and Integration of Biomedical Knowledge: Application in the Health-e-Child Project (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Jimenez-Ruiz, E., Berlanga, R., Sanz, I., McClatchey, R., Danger, R., Manset, D., Paraire, J., and Rios, A.
- Abstract
The Health-e-Child project aims to develop an integrated healthcare platform for European paediatrics. In order to achieve a comprehensive view of children's health, a complex integration of biomedical data, information, and knowledge is necessary. Ontologies will be used to formally define this domain knowledge and will form the basis for the medical knowledge management system. This paper introduces an innovative methodology for the vertical integration of biomedical knowledge. This approach will be largely clinician-centered and will enable the definition of ontology fragments, connections between them (semantic bridges) and enriched ontology fragments (views). The strategy for the specification and capture of fragments, bridges and views is outlined with preliminary examples demonstrated in the collection of biomedical information from hospital databases, biomedical ontologies, and biomedical public databases. Keywords: Vertical Knowledge Integration, Approximate Queries, Ontology Views, Semantic Bridges. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
12. e-Gov Research Quality Improvements Since 2003: More Rigor, but Research (Perhaps) Redefined.
- Author
-
Wimmer, Maria A., Scholl, Hans J., Andersen, Kim Viborg, Grönlund, Åke, and Andersson, Annika
- Abstract
This paper follows up on an earlier study [1] by assessing the nature of 80 papers from EGOV 05 in terms of rigor and relevance criteria. Both studies use the same method and makes comparison between the results. We find that however still focusing overwhelmingly on descriptions and little on theory testing and creation, paper quality appears much better in that references to literature have increased grossly, there are very few dubious claims, philosophical research and theoretical arguments are virtually extinct, and the number of case stories is vastly reduced. However, the number of product descriptions is more than doubled to just over 30 %. The reasons for this are discussed, and as most of these papers are based on EU research funding we propose that an important reason may be the funding mechanism where researchers are employed as helpers in product development rather than critical scrutiny and analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
13. Fencing the Open Fields: Empirical Concerns on Electronic Institutions (Invited Paper).
- Author
-
Boissier, Olivier, Padget, Julian, Dignum, Virginia, Lindemann, Gabriela, Matson, Eric, Ossowski, Sascha, Sichman, Jaime Simão, Vázquez-Salceda, Javier, and Noriega, Pablo
- Abstract
The regulation of multiagent systems may be approached from different stand-points. In this paper I will take the perspective of using a certain type of devices, electronic institutions, to regulate agent interactions. Furthermore, in this paper I am concerned with the tasks of design and construction of actual electronic institutions and I will explore some of the empirical aspects that one may encounter in such activities. More specifically, I will focus on those empirical aspects that are characteristic of electronic institutions rather than those that may be typical of multi-agent systems development in general or other types of software engineering. I use three examples of actual electronic institutions that show different and complementary features in order to motivate a number of distinctions that may be used to treat empirical features in a systematic way. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
14. On the Use of Different Statistical Tests for Alert Correlation - Short Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kruegel, Christopher, Lippmann, Richard, Clark, Andrew, Maggi, Federico, and Zanero, Stefano
- Abstract
In this paper we analyze the use of different types of statistical tests for the correlation of anomaly detection alerts. We show that the Granger Causality Test, one of the few proposals that can be extended to the anomaly detection domain, strongly depends on good choices of a parameter which proves to be both sensitive and difficult to estimate. We propose a different approach based on a set of simpler statistical tests, and we prove that our criteria work well on a simplified correlation task, without requiring complex configuration parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
15. From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Dimitrakos, Theo, Martinelli, Fabio, Ryan, Peter Y. A., Schneider, Steve, and Krukow, Karl
- Abstract
Since the millennium, a quickly increasing number of research papers in the field of "computational trust and reputation" have appeared in the Computer Science literature. However, it remains hard to compare and evaluate the respective merits of proposed systems. We argue that rigorous use of formal probabilistic models enables the clear specification of the assumptions and objectives of systems, which is necessary for comparisons. To exemplify such probabilistic modeling, we present a simple probabilistic trust model in which the system assumptions as well as its objectives are clearly specified. We show how to compute (in this model) the so-called predictive probability: The probability that the next interaction with a specific principal will have a specific outcome. We sketch preliminary ideas and first theorems indicating how the use of probabilistic models could enable us to quantitatively compare proposed systems in various different environments. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
16. Competency Model in a Semantic Context: Meaningful Competencies (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Christiaens, Stijn, Bo, Jan, and Verlinden, Ruben
- Abstract
In this paper, we will propose our ideas for a semantically ready competency model. The model will allow semantic enrichment on different levels, creating truly meaningful competencies. The aim of this model is to provide a flexible approach for (re)use, matching, interpretation, exchange and storage for competencies. Our competency model is based on the DOGMA ontology framework and the proposed IEEE standards RCD and SCRM. We will focus on the model itself and how semantics can be applied to it as these elements form the basis for any kind of processing on them. Keywords: competence, competency, RCD, semantics, DOGMA, e-HRM, HRM, occupation, ontology, Semantic Web. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
17. A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Ceravolo, Paolo, Damiani, Ernesto, and Fugazza, Cristiano
- Abstract
Transfusion Ontology is a simple task-based ontology developed in the emergency health care domain. Taking the assumption that ontologies are instruments for supporting exchange of information among parties, the principles governing the design of this ontology was mainly based on the identification of the interactions of messages to be exchanged among parties. This paper shows how this simple design principle is able to guide a whole ontology construction. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
18. A Fair Anonymous Submission and Review System.
- Author
-
Leitold, Herbert, Markatos, Evangelos, Naessens, Vincent, Demuynck, Liesje, and Decker, Bart
- Abstract
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more privacy-friendly reputation system is desirable while maintaining its trustworthiness. This paper presents a fair anonymous submission and review system. The review process is reputation-based and provides better anonymity properties than existing reputation systems. Moreover, the system allows for accountability measures. Anonymous credentials are used as basic blocks. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
19. Requirements Elicitation and Elaboration in Task-Based Design Needs More Than Task Modelling: A Case Study.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Coninx, Karin, Luyten, Kris, Schneider, Kevin A., Dittmar, Anke, and Gellendin, Andreas
- Abstract
In this paper, a small case study is presented to illustrate our conceptual understanding of a task-based requirements process. We argue that sub-models as known in model-based design (e.g. task models, dialog models) support the reflection about an existing work situation at a conceptual level and allow a formal specification of requirements. However, it is also shown that the integration of complementary analysis approaches facilitates a richer consideration of social as well as technical aspects. An intertwined creation of models differing in their focus and in the degree of abstraction and formality supports a more effective requirements elicitation and elaboration. In addition, the paper discusses some crucial issues in task- and model-based design such as the ‘myth' of generalised task models, the different roles of task and dialog models, or the influence of intentions on models of current situations. We hope to contribute to a further clarification of the problem space. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
20. Dirty-Paper Writing Based on LDPC Codes for Data Hiding.
- Author
-
Gunsel, Bilge, Jain, Anil K., Tekalp, A. Murat, Sankur, Bülent, Dikici, Çagatay, Idrissi, Khalid, and Baskurt, Atilla
- Abstract
We describe a new binning technic for informed data hiding problem. In information theoretical point of view, the blind watermarking problem can be seen as transmitting a secret message M through a noisy channel on top of an interfered host signal S that is available only at the encoder. We propose an embedding scheme based on Low Density Parity Check(LDPC) codes, in order to quantize the host signal in an intelligent manner so that the decoder can extract the hidden message with a high probability. A mixture of erasure and symmetric error channel is realized for the analysis of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
21. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Seneviratne, Aruna, Strang, Thomas, Patel, Shwetak N., and Robertson, Thomas
- Abstract
Activity sensing in the home has a variety of important applications, including healthcare, entertainment, home automation, energy monitoring and post-occupancy research studies. Many existing systems for detecting occupant activity require large numbers of sensors, invasive vision systems, or extensive installation procedures. We present an approach that uses a single plug-in sensor to detect a variety of electrical events throughout the home. This sensor detects the electrical noise on residential power lines created by the abrupt switching of electrical devices and the noise created by certain devices while in operation. We use machine learning techniques to recognize electrically noisy events such as turning on or off a particular light switch, a television set, or an electric stove. We tested our system in one home for several weeks and in five homes for one week each to evaluate the system performance over time and in different types of houses. Results indicate that we can learn and classify various electrical events with accuracies ranging from 85-90%. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
22. Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Yang, Christopher C., Zeng, Daniel, Chau, Michael, Kuiyu Chang, and Qing Yang
- Abstract
The aim of this study is to explore trends in computer crime and cybercrime research from 1974 to 2006. All publications for this analysis were drawn from the ISI Web of Science, the Science Citation Index (SCI), and the Social Science Citation Index (SSCI). The ISI Web of Science is considered a powerful and relatively accurate tool in bibliometric studies. About 292 papers related to computer crime and cybercrime were published during this period. The greatest number of these papers was written in English, and the annual output increased significantly after 2003. In the period under study, most papers originated in the USA. Approximately 57% of the publications were articles, and 72% of these articles had single authors. More bibliometric analyses are described in this study, which shows a high scientific production of articles on computer crime and cybercrime publications. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
23. QoS-Predictions Service: Infrastructural Support for Proactive QoS- and Context-Aware Mobile Services (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Wac, Katarzyna, Halteren, Aart, and Konstantas, Dimitri
- Abstract
Today's mobile data applications aspire to deliver services to a user anywhere - anytime while fulfilling his Quality of Service (QoS) requirements. However, the success of the service delivery heavily relies on the QoS offered by the underlying networks. As the services operate in a heterogeneous networking environment, we argue that the generic information about the networks' offered-QoS may enable an anyhow mobile service delivery based on an intelligent (proactive) selection of ‘any' network available in the user's context (location and time). Towards this direction, we develop a QoS-predictions service provider, which includes functionality for the acquisition of generic offered-QoS information and which, via a multidimensional processing and history-based reasoning, will provide predictions of the expected offered-QoS in a reliable and timely manner. We acquire the generic QoS-information from distributed mobile services' components quantitatively (actively and passively) measuring the applicationlevel QoS, while the reasoning is based on statistical data mining and pattern recognition techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
24. Capturing Abstract Matrices from Paper.
- Author
-
Borwein, Jonathan M., Farmer, William M., Kanahori, Toshihiro, Sexton, Alan, Sorge, Volker, and Suzuki, Masakazu
- Abstract
Capturing and understanding mathematics from print form is an important task in translating written mathematical knowledge into electronic form. While the problem of syntactically recognising mathematical formulas from scanned images has received attention, very little work has been done on semantic validation and correction of recognised formulas. We present a first step towards such an integrated system by combining the Infty system with a semantic analyser for matrix expressions. We applied the combined system in experiments on the semantic analysis of matrix images scanned from textbooks. While the first results are encouraging, they also demonstrate many ambiguities one has to deal with when analysing matrix expressions in different contexts. We give a detailed overview of the problems we encountered that motivate further research into semantic validation of mathematical formula recognition. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
25. On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Sehun Kim, Yung, Moti, Hyung-Woo Lee, Swee-Won Lo, and Phan, Raphael C. -W.
- Abstract
Most, if not all, conferences use an online system to handle paper submissions and reviews. Introduction of these systems has significantly facilitated the administration, submission and review process compared to traditional paper-based ones. However, it is crucial that these systems have strong resistance against Web attacks as they involve confidential data and privacy. Some submissions could be leading edge breakthroughs that authors do not wish to leak out and be subtly plagiarized. Also, security of the employed system will attract more submissions to conferences that use it and gives confidence of the quality that the conferences uphold. In this paper, we analyze the security of the Web-Submission-and-Review (WSaR) software - latest version 0.53 beta at the time of writing; developed by Shai Halevi from IBM Research. WSaR is currently in use by top cryptology and security-related conferences including Eurocrypt 2007 & 2008, Crypto 2007, and Asiacrypt 2007, annually sponsored by the International Association for Cryptologic Research (IACR). We present detailed analysis on WSaR's security features. In particular, we first discuss the desirable security features that are designed into WSaR and what attacks these features defend against. Then, we discuss how some untreated security issues may lead to problems, and we show how to enhance WSaR security features to take these issues into consideration. Our results are the first known careful analysis of WSaR, or any type of online submission system for that matter. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
26. A Usability Test of Exchanging Context in a Conference Room Via Mobile Device Interactions.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Kim, Doyoon, Shin, Seungchul, Cheong, Cheolho, and Han, Tack-Don
- Abstract
In a community such as conferences, numerous service providers and service users exist, and people interact using contexts. With the improvements in context-awareness computing and mobile computing technologies, human-computer interactions for exchanging contexts started increasing. In this paper, we introduce some interaction techniques such as tag interaction and service discovery interaction using a mobile device to provide an efficient user interface to exchange contexts in a conference room. We identified typical situations in which these interactions can be used in a paper, poster session, and for providing individual information among the attendees. We analyzed the two interaction techniques to be suitable to improve the interactions for exchanging contexts in a conference. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
27. Applications of Agent Based Simulation.
- Author
-
Carbonell, Jaime G., Siekmann, Jorg, Antunes, Luis, Takadama, Keiki, Davidsson, Paul, Holmgren, Johan, Kyhlbäck, Hans, Mengistu, Dawit, and Persson, Marie
- Abstract
This paper provides a survey and analysis of applications of Agent Based Simulation (ABS). A framework for describing and assessing the applications is presented and systematically applied. A general conclusion from the study is that even if ABS seems a promising approach to many problems involving simulation of complex systems of interacting entities, it seems as the full potential of the agent concept and previous research and development within ABS often is not utilized. We illustrate this by providing some concrete examples. Another conclusion is that important information of the applications, in particular concerning the implementation of the simulator, was missing in many papers. As an attempt to encourage improvements we provide some guidelines for writing ABS application papers. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
28. Energy-Efficient Fixed-Priority Scheduling for Periodic Real-Time Tasks with Multi-priority Subtasks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Yann-Hang Lee, Heung-Nam Kim, Jong Kim, Yongwan Park, and Yang, Laurence T.
- Abstract
With the rapid development of embedded systems, battery life becomes a critical restriction factor. Dynamic voltage scaling (DVS) has been proven to be an effective method for reducing energy consumption of processors. This paper proposes an energy-saving algorithm under a task model (the MSPR model) where a task consists of multiple subtasks with different fixed priorities. This algorithm includes two parts. The first part is a static algorithm, which exploits the relationship among tasks to set the slowdown factors of subtasks. The second part is an algorithm that dynamically reclaims and reuses the slack time of precedent subtasks during the execution of tasks. To the best of our knowledge, this is the first work for energy-efficient scheduling under the complex periodic real-time task model where a task consists of multiple subtasks with different fixed priorities. Experimental results show this method can reduce energy consumption by 20%-80%, while guaranteeing the real-time requirements of systems. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
29. A Programming Model for the Automatic Construction of USN Applications Based on Nano-Qplus.
- Author
-
Sha, Edwin, Sung-Kook Han, Cheng-Zhong Xu, Moon Hae Kim, Yang, Laurence T., Bin Xiao, Kwangyong Lee, Woojin Lee, Juil Kim, and Kiwon Chong
- Abstract
A programming model for the automatic construction of USN applications based on Nano-Qplus is proposed in this paper. Nano-Qplus is a sensor network platform developed by ETRI. Programs of nodes such as sensors, routers, sinks and actuators in a sensor network are automatically generated through the technique of this paper. Developers can implement USN applications from models of sensor networks. The configuration information of each node is automatically generated from a model. Then, the execution code is automatically generated using the configuration information. Through the technique of this paper, developers can easily implement USN applications even if they do not know the details of low-level information. The development effort of USN applications also will be decreased because execution codes are automatically generated. Furthermore, developers can consistently construct USN applications from USN models using the proposed tool. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
30. Dealing with Adaptive Multi-agent Organizations in the Gaia Methodology.
- Author
-
Müller, Jörg P., Cernuzzi, Luca, and Zambonelli, Franco
- Abstract
Changes and adaptations are always necessary after the deployment of a multiagent system (MAS), as well as of any other type of software systems. Some of these changes may be simply perfective and have local impact only. However, adaptive changes to meet changed situations in the operational environment of the MAS may have global impact on the overall design. In this paper, we analyze the issue of continuous design change/adaptation in a MAS organization, and the specific problem of how to properly model/design a MAS so as to make it ready to adaptation. Following, the paper focuses on the Gaia methodology and analyzes - also with the help of an illustrative example - its suitability in supporting and facilitating adaptive changes in MASs organizations, and its advantages and limitations with this regard over a number of different agent-oriented methodologies. Keywords: Agent Oriented Methodologies, Design for Change, Adaptive Organizations, Methodologies Evaluation. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
31. Recipes for Semantic Web Dog Food — The ESWC and ISWC Metadata Projects.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aberer, Karl, Choi, Key-Sun, Noy, Natasha, Allemang, Dean, and Lee, Kyung-Il
- Abstract
Semantic Web conferences such as ESWC and ISWC offer prime opportunities to test and showcase semantic technologies. Conference metadata about people, papers and talks is diverse in nature and neither too small to be uninteresting or too big to be unmanageable. Many metadata-related challenges that may arise in the Semantic Web at large are also present here. Metadata must be generated from sources which are often unstructured and hard to process, and may originate from many different players, therefore suitable workflows must be established. Moreover, the generated metadata must use appropriate formats and vocabularies, and be served in a way that is consistent with the principles of linked data. This paper reports on the metadata efforts from ESWC and ISWC, identifies specific issues and barriers encountered during the projects, and discusses how these were approached. Recommendations are made as to how these may be addressed in the future, and we discuss how these solutions may generalize to metadata production for the Semantic Web at large. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
32. Some Empirical Results on a Multimedia Work Support System.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Makkonen, Jarmo, and Visa, Ari
- Abstract
This paper describes some results of a project that studied how multimedia can help the worker in an assembly task. The test case was a deep-cut assembly of a grid-anode for a cathodic protection system. A multimedia tool was implemented and compared with the conventional support method for the same task. The tool helps the worker by providing training and background information. During the task the tool acts as a guide and a set of well-defined instructions. The comparison of the methods was done by means of a field experiment. The results show that the use of the implemented tool helps to produce a slight increase to the quality of the work. However, the execution time of the work was not better when using the multimedia tool. According to a user questionnaire done in the test situation, the multimedia tool was more useful and easier to use, and gave the users more confidence than the conventional support method. It can be said that the use of multimedia support helps the worker to produce better quality in the task. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
33. Using Packet Combination in Multi-query Optimization for Data Collection in Sensor Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Zhang, Hongke, Olariu, Stephan, Cao, Jiannong, Johnson, David B., and Sun, Jun-Zhao
- Abstract
In sensor networks, queries need to be jointly designed, in order to minimize the power consumption and maximize the lifetime. Data reduction techniques can be employed to decrease the size of data to be transferred in the network, and therefore save energy of sensor nodes. This paper presents a novel method for optimizing multi-query in sensor networks. Our approach is, by using packet combination techniques, to reduce the data size of multiple simultaneous queries, so that the energy for data transmission can be saved to the best extent. A delay item is specified together with the query by the application. Then an optimal query plan can be obtained by studying the best time of sending local data to sink that can lead to the minimum cost. Algorithm is described in detail. Performance analysis is performed to validate the effectiveness of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
34. Integrated Approach for Self-Balancing Production Line with Multiple Parts.
- Author
-
Olhager, Jan, Persson, Fredrik, Hirotani, Daisuke, Morikawa, Katsumi, and Takahashi, Katsuhiko
- Abstract
In a "Self-Balancing Production Line", each worker is assigned work dynamically, thus they can keep the balanced production under satisfying the specific conditions. For structure of line, in-tree assembly network line has been analyzed in previous paper. In that paper, line are virtually integrated to one and slowest to fastest sequence can be balanced under the integrated line. However, if an item consists of multiple parts and parallel work is possible, a new approach is applicable under the condition, and performance measure increase comparing to integrated line. In this paper, new integrated approach for both previous self-balancing line and buffer is proposed, and we compare the line that had been proposed in the previous paper. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
35. A Distributed Remote Rendering Method Based on Awareness Model.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Ip, Horace H.-S., Au, Oscar C., Leung, Howard, Ming-Ting Sun, and Wei-Ying Ma
- Abstract
This paper proposes a kind of remote rendering method based on awareness model. This method takes the additional cost caused by the movement of the viewpoint into cost calculation and designs a cost prediction algorithm based on the vision field divided by awareness model. The simulation results show that the improved method can not only improve the quality of the remote rendering, but also make full use of the bandwidth of the network, as well as make the remote rendering more fluent when the viewpoint moves fast. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
36. A Grid Resource Discovery Method Based on Adaptive k-Nearest Neighbors Clustering.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Dress, Andreas, Xu, Yinfeng, Zhu, Binhai, Zhang, Yan, and Jia, Yan
- Abstract
Several features of today's grid are based on centralized or hierarchical services. However, as the grid size increasing, some of their functions especially resource discovery should be decentralized to avoid performance bottlenecks and guarantee scalability. A novel grid resource discovery method based on adaptive k-Nearest Neighbors clustering is presented in this paper. A class is formed by a collection of nodes with some similarities in their characteristics, each class is managed by a leader and consists of members that serve as workers. Resource requests are ideally forwarded to an appropriate class leader that would then direct it to one of its workers. This method can handle resource requests by searching a small subset out of a large number of nodes by resource clustering which can improve the resource query efficiency; on the other hand, it also achieves well scalability by managing grid resources with adaptive mechanism. It is shown from a series of experiments that the method presented in this paper achieves more scalability and efficient lookup performance than other existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
37. Relation-Driven Business Process-Oriented Service Discovery.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kevin Chen-Chuan Chang, Wei Wang, Lei Chen, Ellis, Clarence A., and Ching-Hsien Hsu
- Abstract
In order to discover services in business-driven Web service composition conveniently, accurately, and efficiently, this paper proposes a business process-oriented service discovery approach. In order to link business property with services, this paper proposes a business related description model of operations. Based on the business related relation model proposed in this paper, a relation-driven discovering algorithm for business process-oriented service discovery is presented. Compared with other discovering approach, the proposed discovering approach considers the business relation between operations and can solve the problem of discovering services with meaningful business relation. The experimentation shows the better performance of this algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
38. RFID Application Model and Performance for Postal Logistics.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kevin Chen-Chuan Chang, Wei Wang, Lei Chen, Ellis, Clarence A., and Ching-Hsien Hsu
- Abstract
In this paper, we suggest a postal RFID application model that can be used for real time trace and tracking system implementation of parcel processing and pallet management. This paper also shows the tag recognition performance of parcels by speed and mounting tag material such as thin cans, water bottles, and paper using an implemented postal RFID system to find the best solution for RFID adaptation in postal logistics. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
39. Number of Processors with Partitioning Strategy and EDF-Schedulability Test: Upper and Lower Bounds with Comparison.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Stojmenovic, Ivan, Thulasiram, Ruppa K., Yang, Laurence T., Jia, Weijia, and Guo, Minyi
- Abstract
In this paper, we study the problem of scheduling a set of n periodic preemptive independent hard real-time tasks on the minimum number of processors. We assume that the partitioning strategy is used to allocate the tasks to the processors and the EDF method is used to schedule the tasks on each processor. It is known that this scenario is NP-hard; thus, it is unlikely to find a polynomial time algorithm to schedule the tasks on the minimum number of processors. In this work, we derive a lower and an upper bound for the number of processors required to satisfy the constraints of our problem. We also compare a number of heuristic algorithms with each other and with the bounds derived in this paper. Numerical results demonstrate that our lower bound is very tight and it is very close to the optimal solution. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
40. Action in Action Research - Illustrations of What, Who, Why, Where, and When from an E-Government Project.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Wimmer, Maria A., Scholl, Jochen, Grönlund, Åke, Melin, Ulf, and Axelsson, Karin
- Abstract
The core content of action research (AR) is being able to solve organisational problems through intervention and to contribute to scientific knowledge. The main emphasis when discussing AR has been on the "research part". In this paper we focus on "action part" of AR in order to generate rigorous research, to solve local problems and to deal with evident dilemmas in AR. Action elements are addressed by situations in a project on one-stop government e-service development. As a result of the analysis action is illustrated. Action elements: action, actor, motive, space, time are analysed together with roles. The paper also shows a need to understand initiation, problem and situation addressing as an ongoing process in an AR project. A breakdown in the project is also highlighted and situations where problems discovers the action researcher and vice versa. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
41. A Two-Pass Classification Method Based on Hyper-Ellipsoid Neural Networks and SVM's with Applications to Face Recognition.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Derong Liu, Shumin Fei, Zengguang Hou, Huaguang Zhang, and Changyin Sun
- Abstract
In this paper we propose a two-pass classification method and apply it to face recognitions. The method is obtained by integrating together two approaches, the hyper-ellipsoid neural networks (HENN's) and the SVM's with error correcting codes. This method realizes a classification operation in two passes: the first one is to get an intermediate classification result for an input sample by using the HENN's, and the second pass is followed by using the SVM's to re-classify the sample based on both the input data and the intermediate result. Simulations conducted in the paper for applications to face recognition showed that the two-pass method can maintain the advantages of both the HENN's and the SVM's while remedying their disadvantages. Compared with the HENN's and the SVM's, a significant improvement of recognition performance over them has been achieved by the new method. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. Modeling Asymmetric Slot Allocation for Mobile Multimedia Services in Microcell TDD Employing FDD Uplink as Macrocell.
- Author
-
Sha, Edwin, Sung-Kook Han, Cheng-Zhong Xu, Moon Hae Kim, Yang, Laurence T., Bin Xiao, and Dong-Hoi Kim
- Abstract
This paper introduces an analytical approach which is provided to calculate the downlink and uplink capacities of the time division duplex (TDD) system utilizing the underused frequency division duplex (FDD) uplink which shares the same frequency band. Then the ratio of downlink and uplink slots in one frame is adjusted, so as to prevent the radio resource waste due to asymmetric traffic characteristic in mobile multimedia services. The computer simulation shows that the resource waste problem can be considerably solved through the asymmetric slot allocation. Thus, this paper can be useful as a guideline in the course of planning a two-layer hierarchical cell structure (HCS) employing the TDD system as a microcell and FDD system as a macrocell as well as a mean to increase the performance of such a system. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
43. DNA Gene Expression Classification with Ensemble Classifiers Optimized by Speciated Genetic Algorithm.
- Author
-
Pal, Sankar K., Bandyopadhyay, Sanghamitra, Biswas, Sambhunath, Kim, Kyung-Joong, and Cho, Sung-Bae
- Abstract
Accurate cancer classification is very important to cancer diagnosis and treatment. As molecular information is increasing for the cancer classification, a lot of techniques have been proposed and utilized to classify and predict the cancers from gene expression profiles. In this paper, we propose a method based on speciated evolution for the cancer classification. The optimal combination among several feature-classifier pairs from the various features and classifiers is evolutionarily searched using the deterministic crowding genetic algorithm. Experimental results demonstrate that the proposed method is more effective than the standard genetic algorithm and the fitness sharing genetic algorithm as well as the best single classifier to search the optimal ensembles for the cancer classification. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
44. Semantically Rich Recommendations in Social Networks for Sharing, Exchanging and Ranking Semantic Context.
- Author
-
Gil, Yolanda, Motta, Enrico, Benjamins, V. Richard, Musen, Mark A., Ghita, Stefania, Nejdl, Wolfgang, and Paiu, Raluca
- Abstract
Recommender algorithms have been quite successfully employed in a variety of scenarios from filtering applications to recommendations of movies and books at Amazon.com. However, all these algorithms focus on single item recommendations and do not consider any more complex recommendation structures. This paper explores how semantically rich complex recommendation structures, represented as RDF graphs, can be exchanged and shared in a distributed social network. After presenting a motivating scenario we define several annotation ontologies we use in order to describe context information on the user's desktop and show how our ranking algorithm can exploit this information. We discuss how social distributed networks and interest groups are specified using extended FOAF vocabulary, and how members of these interest groups share semantically rich recommendations in such a network. These recommendations transport shared context as well as ranking information, described in annotation ontologies. We propose an algorithm to compute these rankings which exploits available context information and show how rankings are influenced by the context received from other users as well as by the reputation of the members of the social network with whom the context is exchanged. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
45. A Strategy for Automated Meaning Negotiation in Distributed Information Retrieval.
- Author
-
Gil, Yolanda, Motta, Enrico, Benjamins, V. Richard, Musen, Mark A., Ermolayev, Vadim, Keberle, Natalya, Matzke, Wolf-Ekkehard, and Vladimirov, Vladimir
- Abstract
The paper reports on the development of the formal framework to design strategies for multi-issue non-symmetric meaning negotiations among software agents in a distributed information retrieval system. The advancements of the framework are the following. A resulting strategy compares the contexts of two background domain theories not concept by concept, but the whole context to the other context by accounting the relationships among concepts, the properties, the constraints over properties, and the available instances. It contains the mechanisms for measuring contextual similarity through assessing propositional substitutions and to provide argumentation through generating extra contexts. It uses presuppositions for choosing the best similarity hypotheses and to make the mutual concession to the common sense monotonic. It provides the means to evaluate the possible eagerness to concede through semantic commitments and related notions of knowledgeability and degree of reputation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
46. From Texts to Structured Documents: The Case of Health Practice Guidelines.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aberer, Karl, Choi, Key-Sun, Noy, Natasha, Allemang, Dean, and Lee, Kyung-Il
- Abstract
This paper describes a system capable of semi-automatically filling an XML template from free texts in the clinical domain (practice guidelines). The XML template includes semantic information not explicitly encoded in the text (pairs of conditions and actions/recommendations). Therefore, there is a need to compute the exact scope of conditions over text sequences expressing the required actions. We present in this paper the rules developed for this task. We show that the system yields good performance when applied to the analysis of French practice guidelines. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
47. Supporting Implicit Coordination Between Distributed Teams in Disaster Management.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Löffler, Jobst, Klann, Markus, Baber, Chris, Cross, James, and Smith, Paul
- Abstract
In this paper we consider disaster management as the coordination of resources in space and time, and contrast this with the Joint Operational Picture (JOP) used in military planning. The basic premise is that the processes involved in the collection and management of information could interfere with the priorities of dealing with immediate demands on ‘rescuers' and their managers. Thus, we explore ways in which collaboration could be made as implicit as possible. The paper includes small-scale user trials of prototypes to highlight potential benefits and shortcomings. The paper concludes with consideration of how brokering approaches to coordination could be realized using the prototypes described in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
48. Mobile Devices in Emergency Medical Services: User Evaluation of a PDA-Based Interface for Ambulance Run Reporting.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Löffler, Jobst, Klann, Markus, Chittaro, Luca, Zuliani, Francesco, and Carchietti, Elio
- Abstract
The design of easy-to-use mobile systems for collecting and handling emergency medical care data in the field can significantly improve the effectiveness of rescue operations. In particular, this paper focuses on the design and evaluation of a mobile application that replaces ambulance run paper sheets. First, we discuss the limitations of traditional ambulance run paper sheets. Then, we present the PDA-based system we have developed. Finally, we discuss in detail the usability study we have carried out with first responders. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
49. Aspects of Anatomical and Chronological Sequence Diagrams in Software-Supported Emergency Care Patient Report Forms.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Löffler, Jobst, Klann, Markus, Waldher, Franz, Thierry, Jürgen, and Grasser, Simon
- Abstract
Across Europe emergency physicians are still using paper-based emergency report forms to document medical procedure at accident scenes. The forms are quite similar, but they differ in certain parameters or attributes. There are ongoing endeavours to combine the paper-based protocols and then transfer this new protocol standard into a software-based Emergency Patient Care Report Form (EPCRF). However during the transformation from a paper-based to an electronic solution, many problems occur. To keep the users' acceptance of the emergency medical services personnel, it is crucial that electronic EPCRF supports the central process efficiently. Therefore key elements within the emergency report form are the anatomical diagrams and the chronological sequence diagrams. These diagrams allow the emergency physician to track and record patient's parameters in a very fast and understandable and user friendly way. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
50. Model-Based Testing of Optimizing Compilers.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Petrenko, Alexandre, Veanes, Margus, Tretmans, Jan, Grieskamp, Wolfgang, and Zelenov, Sergey
- Abstract
We describe a test development method, named OTK, that is aimed at optimizing compiler testing. The OTK method is based on constructing a model of optimizer's input data. The method allows developing tests targeted to testing a chosen optimizer. A formal data model is constructed on the basis of an abstract informal description of an algorithm of the optimizer under test. In the paper, we consider in detail the process of analyzing an optimization algorithm and building a formal model. We also consider in outline the other part of the method, test selection and test running. The OTK method has been successfully applied in several case studies, including test development for several different optimizing compilers for modern architectures. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.