60,098 results
Search Results
52. Finding Hidden Semantics Behind Reference Linkages : An Ontological Approach for Scientific Digital Libraries.
- Author
-
Lizhu Zhou, Beng Chin Ooi, Xiaofeng Meng, Peixiang Zhao, Ming Zhang, Dongqing Yang, and Shiwei Tang
- Abstract
The contents and topologies of inter-document linkages, such as citations and references among scientific literature, have received increasing research interests in recent years. Some technologies have been fully studied and utilized upon this meaningful information to improve the organization, analysis and evaluation of scientific digital libraries. In this paper, we present a CiteSeer-like system to access scientific papers in computer science discipline by reference linking technique. Moreover, implicit semantics behind reference indices are mined and organized to improve accessibility of scientific papers. In order to model scientific literature and their interlinked relationships, we develop a domain-specific ontology to analyze contents and citation anchor context of scientific papers. Compared with abstract of a specific paper written by authors themselves, we introduce an automatic summary generation algorithm to create objective descriptions from other scholars' perspectives based on the ontology. Semantic queries can also be asked to discover interesting patterns in scientific libraries in order to provide a comprehensive and meaningful guidance for users. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
53. Intelligent paper.
- Author
-
Goos, G., Hartmanis, J., Leeuwen, J., Hersch, Roger D., André, Jacques, Brown, Heather, Dymetman, Marc, and Copperman, Max
- Published
- 1998
- Full Text
- View/download PDF
54. The web impact: A white paper.
- Author
-
Goos, G., Hartmanis, J., Leeuwen, J., Margaria, Tiziana, Steffen, Bernhard, Rückert, Roland, Posegga, Joachim, and Lardenois, Alain
- Published
- 1998
- Full Text
- View/download PDF
55. PaperCP: Exploring the Integration of Physical and Digital Affordances for Active Learning.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Baranauskas, Cécilia, Palanque, Philippe, Abascal, Julio, Barbosa, Simone Diniz Junqueira, and Liao, Chunyuan
- Abstract
Active Learning in the classroom domain presents an interesting case for integrating physical and digital affordances. Traditional physical handouts and transparencies are giving way to new digital slides and PCs, but the fully digital systems still lag behind the physical artifacts in many aspects such as readability and tangibility. To better understand the interplay between physical and digital affordances in this domain, we developed PaperCP, a paper-based interface for a Tablet PC-based classroom interaction system (Classroom Presenter), and deployed it in an actual university course. This paper reports on an exploratory experiment studying the use of the system in a real-world scenario. The experiment confirms the feasibility of the paper interface in supporting student-instructor communication for Active Learning. We also discuss the challenges associated with creating a physical interface such as print layout, the use of pen gestures, and logistical issues. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
56. Generating Color Documents from Segmented and Synthetic Elements.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kamel, Mohamed, Campilho, Aurélio, Lins, Rafael Dueire, and da Silva, João Marcelo Monte
- Abstract
This paper presents way of generation color documents from elements extracted from an original document image. This scheme yields synthetic documents of similar visual information to the original one. This method has several advantages as it allows a far more efficient way of storing and transmitting the information. Its rationale is to decompose a color document into paper and ink texture parameters and textual information. The textual information may be either typed or handwritten and is stored as a compressed monochromatic image. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
57. Citation-Based Methods for Personalized Search in Digital Libraries.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Weske, Mathias, Hacid, Mohand-Saïd, Godart, Claude, Van, Thanh-Trung, and Beigbeder, Michel
- Abstract
In this paper we present our work about personalized search in digital libraries. Unlike other researches which use content-based methods, we focus on citation-based methods for this purpose. We propose a practical approach to estimate the co-citation relatedness between scientific papers using the Google search engine. We conducted some experiments to evaluate performance of different citation-based methods. The experimental results show that our approach is promising and applicable for personalized search in digital libraries. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
58. Intelligent Methodologies for Scientific Conference Management.
- Author
-
Esposito, Floriana, Raś, Zbigniew W., Malerba, Donato, Semeraro, Giovanni, Biba, Marenglen, Ferilli, Stefano, Mauro, Nicola, and Basile, Teresa M. A.
- Abstract
This paper presents the advantage that knowledge-intensive activities, such as Scientific Conference Management, can take by the exploitation of expert components in the key tasks. Typically, in this domain the task of scheduling the activities and resources or the assignment of reviewers to papers is performed manually leading therefore to time-consuming procedures with high degree of inconsistency due to many parameters and constraints to be considered. The proposed systems, evaluated on real conference datasets, show good results compared to manual scheduling and assignment, in terms of both accuracy and reduction of runtime. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
59. Concept for Quality Control Management Services in Distributed Design Networks - Conceptual Paper.
- Author
-
Koch, Tomasz, Thoben, Klaus-Dieter, Seifert, Marcus, Sitek, Patrick, Emde, Markus, and Tarditi, Roberto
- Abstract
The actual situation is that partners in virtual organisations rely upon a great variety of tools, which are not integrated, difficult to use and often ineffective. High costs are sustained to train the people and acquire tools of different make as required by the OEMs. The objective of the proposed paper is to present a conceptual model of an integrated engineering environment specifically tailored to the needs of the suppliers operating in a design network. The focal point is to show how monitoring and control of projects in virtual organisations can be supported. Therefore a Quality Control Management (QCM) concept will be presented that is able to provide several services in order to trace and control project processes and performance in an effective, integrated, easy to understand and user-friendly way. The approach presented in the proposed paper is basing on the work carried out by the European funded research project E4 (Extended Enterprise management in enlarged Europe — EC Contract No. IST-FP6-027282). [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
60. Modeling User's Opinion Relevance to Recommending Research Papers.
- Author
-
Ardissono, Liliana, Brna, Paul, Mitrovic, Antonija, Cazella, Sílvio César, and Alvares, Luis Otávio Campos
- Abstract
Finding the right material on the Web could be a worthwhile result. Users waste too much time to discover the useful information. Recommender system can provide some shortcuts to the user, but if the recommendation is based on people's opinion, one question remains — how relevant is a user's opinion? This paper presents a model to define the user's relevance opinion in a recommender system. This metric aims to help the target user to decide in what recommendation he should focus his attention. Beyond the model, we present a real experiment using an e-government database. Keywords: User modeling, Authority, Recommender System. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
61. Retrieving Digital Artifacts from Digital Libraries Semantically.
- Author
-
Huang, De-Shuang, Zhang, Xiao-Ping, Huang, Guang-Bin, Ma, Jun, Yi, YingNan, Tian, Tian, and Li, Yuejun
- Abstract
The techniques for organizing and retrieving the artifacts from digital libraries (DLs) semantically are discussed, which include letting the taxonomies and semantic relations work in tandem to index the artifacts in DLs; integrating the techniques used in natural language processing and taxonomies to help users to start their retrieval processes; and ranking scientific papers on similarity in terms of contents or ranking the relevant papers on multi-factors. These techniques are verified through the design and implementation of a prototype of DLs for scientific paper management. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
62. Overview of Awarded Papers - The 20th Annual Conference of JSAI.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Washio, Takashi, Satoh, Ken, Inokuchi, Akihiro, and Takeda, Hideaki
- Abstract
In this chapter, we proudly introduce eight awarded papers, selected from the papers presented in the 20th annual conference of Japan Society for Artificial Intelligence (JSAI2006). The conference was held at Tower Hall Funabori located in the east part of Tokyo from June 7 until June 9, 2006. 276 papers were presented in about 60 sessions and over 500 people participated in the conference. Sessions vary from the fundamental issues to the state-of-the-art applications. Session for regular papers are as follows; Logic and learning, Reinforcement learning and agent learning, Agent theory, Auction/Game/Economics, Agent learning, Agent planning, Agent simulation and interaction, Genetic algorithm, Image processing, Information extraction and classification, Clustering/self-organization, Classifi- cation learning, Text mining, Graph mining, Mining algorithm, Web mining, Pre- and post-processing for data mining, Practices of data mining, Cognitive modeling, Language processing and dialogue, Robot/sensor network, Web information system, Semantic Web, Knowledge modeling and knowledge sharing, Support of knowledge management, knowledge modeling/ontology,Web service, Human interface and communication support, Education support, Learning support environment, and Musical and auditory information processing. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
63. Practical Security Analysis of Dirty Paper Trellis Watermarking.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Furon, Teddy, Cayre, François, Doërr, Gwenaël, and Bas, Patrick
- Abstract
This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN). [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
64. "Merolyn the Phone": A Study of Bluetooth Naming Practices (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Abowd, Gregory D., Seneviratne, Aruna, Strang, Thomas, and Kindberg, Tim
- Abstract
This paper reports the results of an in-depth study of Bluetooth naming practices which took place in the UK in August 2006. There is a significant culture of giving Bluetooth names to mobile phones in the UK, and this paper's main contribution is to provide an account of those Bluetooth naming practices, putting them in their social, physical and intentional context. The paper also uncovers how users have appropriated the ways in which Bluetooth, with its relatively short range of about 10-100m, operates between their mobile phones as a partially embodied medium, making it a distinctive paradigm of socially and physically embedded communication. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
65. Effectiveness of Content Preparation in Information Technology Operations: Synopsis of a Working Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Savoy, A., and Salvendy, G.
- Abstract
Content preparation is essential for web design [25]. The objective of this paper is to establish a theoretical foundation for the development of methods to evaluate the effectiveness of content preparation in information technology operations. Past studies identify information as the dominant concern of users, and delivery mechanism as a secondary concern [20]. The best presentation of the wrong information results in a design with major usability problems and does not aid the user in accomplishing his task. This paper shifts the focus of existing usability evaluation methods. It attempts to fill the void in usability literaoture by addressing the information aspect of usability evaluation. Combining the strengths of content preparation and usability evaluation yields major implications for a broad range of IT uses. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
66. Document Management and Information Organizing Method Using RFID Tags.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Jacko, Julie A., Kojima, Hiroyuki, Iwata, Ken, and Nishimura, Naoki
- Abstract
Due to the progress of Internet technology and the increase of distributed information on networks, the present knowledge management has been based more and more on the performance of various experienced users. In addition to the increase of electronic documents, the use of paper documents has not been reduced because of their convenience. This paper describes a method of tracking paper document locations and contents using radio frequency identification (RFID) technology. This research also focused on the expression of a task process and the seamless structuring of related electronic and paper documents as a result of task knowledge formalization using information organizing. A system is proposed here that implements information organization for both Web documents and paper documents with the task model description and RFID technology. Examples of a prototype system are also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
67. Discovering User Profiles from Semantically Indexed Scientific Papers.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Berendt, Bettina, Hotho, Andreas, Mladenic, Dunja, Semeraro, Giovanni, Basile, Pierpaolo, de Gemmis, Marco, and Lops, Pasquale
- Abstract
Typically, personalized information recommendation services automatically infer the user profile, a structured model of the user interests, from documents that were already deemed relevant by the user. We present an approach based on Word Sense Disambiguation (WSD) for the extraction of user profiles from documents. This approach relies on a knowledge-based WSD algorithm, called JIGSAW, for the semantic indexing of documents: JIGSAW exploits the WordNet lexical database to select, among all the possible meanings (senses) of a polysemous word, the correct one. Semantically indexed documents are used to train a naïve Bayes learner that infers "semantic", sense-based user profiles as binary text classifiers (user-likes and user-dislikes). Two empirical evaluations are described in the paper. In the first experimental session, JIGSAW has been evaluated according to the parameters of the Senseval-3 initiative, that provides a forum where the WSD systems are assessed against disambiguated datasets. The goal of the second empirical evaluation has been to measure the accuracy of the user profiles in selecting relevant documents to be recommended. Performance of classical keyword-based profiles has been compared to that of sense-based profiles in the task of recommending scientific papers. The results show that sense-based profiles outperform keyword-based ones. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
68. Validity and Cross-Validity in HCI Publications.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Doherty, Gavin, Blandford, Ann, and Thimbleby, Harold
- Abstract
Papers in HCI play different roles, whether to inspire, solve industrial problems or further the science of HCI. There is a potential conflict between the different views, and a danger that different forms of validity are assumed by author and reader — deliberately or accidentally. This paper reviews some of the issues in this complex area and makes practical recommendations. In particular, the paper introduces the term "cross-validity" to help make explicit the issues, problems and means to tackle them. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
69. What Are the Future Possibilities of eDemocracy? A Discussion Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Wimmer, Maria A., Scholl, Jochen, Grönlund, Åke, and Boyd, Ovid Pacific
- Abstract
This paper presents some future possibilities for eDemocracy tools and considers how these new technologies might conflict with our basic assumptions about what democracy should be. I hope this paper will contribute to discussion of under what situations different forms of eDemocracy are appropriate. The possibilities and repercussions of user profiling, voting outside of polling booths, longer decision-making periods, changeable election results and weighted voted are considered. Although none are necessarily advisable, this paper suggests they might be interesting to consider. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
70. Classifying and Ranking: The First Step Towards Mining Inside Vertical Search Engines.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Wagner, Roland, Revell, Norman, Pernul, Günther, Hang Guo, and Jun Zhang
- Abstract
Vertical Search Engines (VSEs), which usually work on specific domains, are designed to answer complex queries of professional users. VSEs usually have large repositories of structured instances. Traditional instance ranking methods do not consider the categories that instances belong to. However, users of different interests usually care only the ranking list in their own communities. In this paper we design a ranking algorithm -ZRank, to rank the classified instances according to their importances in specific categories. To test our idea, we develop a scientific paper search engine-CPaper. By employing instance classifying and ranking algorithms, we discover some helpful facts to users of different interests. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
71. 10 Years of the International Conference on Research in Computational Molecular Biology (RECOMB).
- Author
-
Apostolico, Alberto, Guerra, Concettina, Istrail, Sorin, Pevzner, Pavel, Waterman, Michael, Aerni, Sarah J., and Eskin, Eleazar
- Abstract
The tenth year of the annual International Conference on Research in Computational Biology (RECOMB) provides an opportunity to reflect on its history. RECOMB has been held across the world, including 6 different countries spanning 3 continents (Table 1). Over its 10 year history, RECOMB has published 373 papers and 170 individuals have served on its various committees. While there are many new faces in RECOMB each year, a significant number of researchers have participated over many years forming the core of the RECOMB community. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
72. The Management and Integration of Biomedical Knowledge: Application in the Health-e-Child Project (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Jimenez-Ruiz, E., Berlanga, R., Sanz, I., McClatchey, R., Danger, R., Manset, D., Paraire, J., and Rios, A.
- Abstract
The Health-e-Child project aims to develop an integrated healthcare platform for European paediatrics. In order to achieve a comprehensive view of children's health, a complex integration of biomedical data, information, and knowledge is necessary. Ontologies will be used to formally define this domain knowledge and will form the basis for the medical knowledge management system. This paper introduces an innovative methodology for the vertical integration of biomedical knowledge. This approach will be largely clinician-centered and will enable the definition of ontology fragments, connections between them (semantic bridges) and enriched ontology fragments (views). The strategy for the specification and capture of fragments, bridges and views is outlined with preliminary examples demonstrated in the collection of biomedical information from hospital databases, biomedical ontologies, and biomedical public databases. Keywords: Vertical Knowledge Integration, Approximate Queries, Ontology Views, Semantic Bridges. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
73. Visual Tagging Through Social Collaboration: A Concept Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Baranauskas, Cécilia, Palanque, Philippe, Abascal, Julio, Barbosa, Simone Diniz Junqueira, and Bellucci, Andrea
- Abstract
Collaborative tagging has grown on the Internet as a new paradigm for web information discovering, filtering and retrieval. In the physical world, we use visual tags: labels readable by smartphones with cameras. While visual tags are usually related to a web site address, collaborative tagging, instead, provides updated, recommended information contributed and shared by users. In this paper we investigate the combination of collaborative tagging systems with visual tags. We present a prototype of a semiautomatic system generating visual tags which gather information from collaborative tagging. The user can interact with a list of relevant tags (built by clustering closely related tags) that can be further encoded in a visual tag, according to user's preferences. The user experience is enriched by retrieving multimedia content linked to the selected tags, present on the web. We finally show a case study illustrating our approach. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
74. Measuring Performance in the Retail Industry (Position Paper).
- Author
-
Marketos, Gerasimos, Theodoridis, Yannis, Eder, Johann, and Dustdar, Schahram
- Abstract
Bearing in mind the changeable and complicated needs of business environment, in this paper we examine the necessity of evolution in the traditional decision support techniques. Our aim is to intensify the need for integrated performance measurement and management, as a way to ameliorate the existing tools for decision making, which are currently based on historical data. Because of the nature of challenges and trends in the retail industry, it is considered to be an appropriate application scenario. In addition to that, a framework is proposed and a case study is described as a proof of our claim. Keywords: Performance management, business intelligence, retailing. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
75. Fencing the Open Fields: Empirical Concerns on Electronic Institutions (Invited Paper).
- Author
-
Boissier, Olivier, Padget, Julian, Dignum, Virginia, Lindemann, Gabriela, Matson, Eric, Ossowski, Sascha, Sichman, Jaime Simão, Vázquez-Salceda, Javier, and Noriega, Pablo
- Abstract
The regulation of multiagent systems may be approached from different stand-points. In this paper I will take the perspective of using a certain type of devices, electronic institutions, to regulate agent interactions. Furthermore, in this paper I am concerned with the tasks of design and construction of actual electronic institutions and I will explore some of the empirical aspects that one may encounter in such activities. More specifically, I will focus on those empirical aspects that are characteristic of electronic institutions rather than those that may be typical of multi-agent systems development in general or other types of software engineering. I use three examples of actual electronic institutions that show different and complementary features in order to motivate a number of distinctions that may be used to treat empirical features in a systematic way. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
76. e-Gov Research Quality Improvements Since 2003: More Rigor, but Research (Perhaps) Redefined.
- Author
-
Wimmer, Maria A., Scholl, Hans J., Andersen, Kim Viborg, Grönlund, Åke, and Andersson, Annika
- Abstract
This paper follows up on an earlier study [1] by assessing the nature of 80 papers from EGOV 05 in terms of rigor and relevance criteria. Both studies use the same method and makes comparison between the results. We find that however still focusing overwhelmingly on descriptions and little on theory testing and creation, paper quality appears much better in that references to literature have increased grossly, there are very few dubious claims, philosophical research and theoretical arguments are virtually extinct, and the number of case stories is vastly reduced. However, the number of product descriptions is more than doubled to just over 30 %. The reasons for this are discussed, and as most of these papers are based on EU research funding we propose that an important reason may be the funding mechanism where researchers are employed as helpers in product development rather than critical scrutiny and analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
77. Enliven Photographs: Enriching User Experience.
- Author
-
Venkatesh, Alladi, Gonsalves, Timothy, Monk, Andrew, Buckner, Kathy, Darbari, Akshay, and Agrawal, Pragya
- Abstract
This paper is based on the study aimed at giving a new direction to Photographs, keeping in mind the growing needs of the people and enriching day-to-day experience vis-à-vis paper based photograph. A survey was conducted which revealed few startling but interesting facts as to what more the end-user wants than a mere ‘physical paper-based photograph'. This paper talks about the survey, response by the participants, results derived from them, current work and future direction. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
78. On the Use of Different Statistical Tests for Alert Correlation - Short Paper.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kruegel, Christopher, Lippmann, Richard, Clark, Andrew, Maggi, Federico, and Zanero, Stefano
- Abstract
In this paper we analyze the use of different types of statistical tests for the correlation of anomaly detection alerts. We show that the Granger Causality Test, one of the few proposals that can be extended to the anomaly detection domain, strongly depends on good choices of a parameter which proves to be both sensitive and difficult to estimate. We propose a different approach based on a set of simpler statistical tests, and we prove that our criteria work well on a simplified correlation task, without requiring complex configuration parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
79. From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Dimitrakos, Theo, Martinelli, Fabio, Ryan, Peter Y. A., Schneider, Steve, and Krukow, Karl
- Abstract
Since the millennium, a quickly increasing number of research papers in the field of "computational trust and reputation" have appeared in the Computer Science literature. However, it remains hard to compare and evaluate the respective merits of proposed systems. We argue that rigorous use of formal probabilistic models enables the clear specification of the assumptions and objectives of systems, which is necessary for comparisons. To exemplify such probabilistic modeling, we present a simple probabilistic trust model in which the system assumptions as well as its objectives are clearly specified. We show how to compute (in this model) the so-called predictive probability: The probability that the next interaction with a specific principal will have a specific outcome. We sketch preliminary ideas and first theorems indicating how the use of probabilistic models could enable us to quantitatively compare proposed systems in various different environments. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
80. A Quantitative Assessment of Requirements Engineering Publications - 1963-2006.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Sawyer, Pete, Paech, Barbara, Heymans, Patrick, Davis, Alan, and Hickey, Ann
- Abstract
Requirements engineering research has been conducted for over 40 years. It is important to recognize the plethora of results accumulated to date to: (a) improve researchers' understanding of the historical roots of our field in the real-world and the problems that they are trying to solve, (b) expose researchers to the breadth and depth of solutions that have been proposed, (c) provide a synergistic basis for improving those solutions or building new ones to solve real-world problems facing the industry today, and d) increase practitioner awareness of available solutions. A detailed meta-analysis of the requirements engineering literature will provide an objective overview of the advances and current state of the discipline. This paper represents the first step in a planned multi-year analysis. It presents the results of a demographic analysis by date, type, outlet, author, and author affiliation for an existing database of over 4,000 requirements engineering publications. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
81. REFSQ 2007 International Working Conference on Requirements Engineering: Foundation for Software Quality.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Sawyer, Pete, Paech, Barbara, and Heymans, Patrick
- Abstract
The 13th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'07) will take place in the beautiful city of Trondheim, Norway on the 11th and 12th June 2007. As with most previous years, REFSQ'07 is affiliated with CAiSE. However, REFSQ'07 is significantly larger than in previous years, both in terms of the number of submissions and the size of the programme. 27 papers will be presented, plus a keynote address by Klaus Pohl, and parallel sessions will be necessary to make the programme possible within two days. However, the essential highly interactive and participatory nature of the REFSQ 'brand' will be retained. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
82. A Fair Anonymous Submission and Review System.
- Author
-
Leitold, Herbert, Markatos, Evangelos, Naessens, Vincent, Demuynck, Liesje, and Decker, Bart
- Abstract
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more privacy-friendly reputation system is desirable while maintaining its trustworthiness. This paper presents a fair anonymous submission and review system. The review process is reputation-based and provides better anonymity properties than existing reputation systems. Moreover, the system allows for accountability measures. Anonymous credentials are used as basic blocks. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
83. A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Ceravolo, Paolo, Damiani, Ernesto, and Fugazza, Cristiano
- Abstract
Transfusion Ontology is a simple task-based ontology developed in the emergency health care domain. Taking the assumption that ontologies are instruments for supporting exchange of information among parties, the principles governing the design of this ontology was mainly based on the identification of the interactions of messages to be exchanged among parties. This paper shows how this simple design principle is able to guide a whole ontology construction. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
84. Competency Model in a Semantic Context: Meaningful Competencies (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Christiaens, Stijn, Bo, Jan, and Verlinden, Ruben
- Abstract
In this paper, we will propose our ideas for a semantically ready competency model. The model will allow semantic enrichment on different levels, creating truly meaningful competencies. The aim of this model is to provide a flexible approach for (re)use, matching, interpretation, exchange and storage for competencies. Our competency model is based on the DOGMA ontology framework and the proposed IEEE standards RCD and SCRM. We will focus on the model itself and how semantics can be applied to it as these elements form the basis for any kind of processing on them. Keywords: competence, competency, RCD, semantics, DOGMA, e-HRM, HRM, occupation, ontology, Semantic Web. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
85. AOSE and Organic Computing - How Can They Benefit from Each Other? Position Paper.
- Author
-
Akoka, Jacky, Liddle, Stephen W., Song, Il-Yeol, Bertolotto, Michela, Comyn-Wattiau, Isabelle, Si-Said Cherfi, Samira, Heuvel, Willem-Jan van den, Thalheim, Bernhard, Kolp, Manuel, Bresciani, Paolo, Trujillo, Juan, Kop, Christian, Mayr, Heinrich C., Bauer, Bernhard, and Kasinger, Holger
- Abstract
Organic computing is an upcoming research area with strong relationships to the ideas and concepts of agent-based systems. In this paper, we therefore will have a closer look at agent systems, organic computing systems (as well as autonomic computing systems) and state commonalities and divergences between them. We then propose a common view on these technologies and show, how they can benefit from each other with regard to software engineering. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
86. Requirements Elicitation and Elaboration in Task-Based Design Needs More Than Task Modelling: A Case Study.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Coninx, Karin, Luyten, Kris, Schneider, Kevin A., Dittmar, Anke, and Gellendin, Andreas
- Abstract
In this paper, a small case study is presented to illustrate our conceptual understanding of a task-based requirements process. We argue that sub-models as known in model-based design (e.g. task models, dialog models) support the reflection about an existing work situation at a conceptual level and allow a formal specification of requirements. However, it is also shown that the integration of complementary analysis approaches facilitates a richer consideration of social as well as technical aspects. An intertwined creation of models differing in their focus and in the degree of abstraction and formality supports a more effective requirements elicitation and elaboration. In addition, the paper discusses some crucial issues in task- and model-based design such as the ‘myth' of generalised task models, the different roles of task and dialog models, or the influence of intentions on models of current situations. We hope to contribute to a further clarification of the problem space. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
87. Application and Analysis of Interpersonal Networks for a Community Support System.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Sakurai, Akito, Hasida, Kôiti, Nitta, Katsumi, Hamasaki, Masahiro, Takeda, Hideaki, Ohmukai, Ikki, and Ichise, Ryutaro
- Abstract
In this paper, we discuss importance and usefulness of interpersonal network in a community support system. We built a scheduling support system for an academic conference. Our system supports information exchange among participants and information discovery with generating participants' interpersonal network. This system was used in an academic conference called JSAI2003 involving 276 active users. The analysis of the networks reveals that interpersonal networks can promote information exchange among people by indicating existence of people to the others, and that it can also support information discovery by recommendation. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
88. Conduct, Performance, and Dilemmas of Inter-organizational Virtual Organizing.
- Author
-
Crowston, Kevin, Sieber, Sandra, Wynn, Eleanor, Jha, Sanjeev, and Watson-Manheim, Mary Beth
- Abstract
Firms are increasingly embedded in networks of relationships with other organizations that are of strategic importance. An organization's participation in a network may provide access to information, resources, markets, and technologies, or it may lock it in unproductive relationships from which it may be difficult to extricate. Therefore, it is no longer adequate to analyze firms' conduct and performance by examining firms in isolation from their network partners. Strategy research has investigated inter-organizational alliances for some time. However, the primary focus of this research has been to examine the antecedents of network formation and relatively lesser attention has been paid to the implications of alliances and networks on a firm's performance. Since virtual organizations are conceptualized as strategic networks and alliances among organizations, we examined literature on virtual organizations to understand what has been done in inter-organizational context. We found 34 papers out of a total of 117 papers on virtual organization that examined virtual organizing at inter-organizational level. We classified each of the short-listed papers by virtual organizing type (network membership, network structure, tie modality, and time-frame), performance, and dilemmas of virtual organizing. Our analyses showed that inter-organization virtual organizing strategy varied with the goals of virtual organizing. Across the short-listed papers we found a pattern of organizing that depended on whether organizing was for abstract resources (knowledge, skills, competencies, etc.) or for specific goals (outsourcing key components). Virtual organizing for abstract resources tended to exhibit decentralized network structure and collaborative ties with partners, while virtual organizing for specific goals tended to exhibit centralized network structure and opportunistic ties. We found a lack of empirical literature examining the process of inter-organization virtual organizing strategy and its consequences. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
89. Dirty-Paper Writing Based on LDPC Codes for Data Hiding.
- Author
-
Gunsel, Bilge, Jain, Anil K., Tekalp, A. Murat, Sankur, Bülent, Dikici, Çagatay, Idrissi, Khalid, and Baskurt, Atilla
- Abstract
We describe a new binning technic for informed data hiding problem. In information theoretical point of view, the blind watermarking problem can be seen as transmitting a secret message M through a noisy channel on top of an interfered host signal S that is available only at the encoder. We propose an embedding scheme based on Low Density Parity Check(LDPC) codes, in order to quantize the host signal in an intelligent manner so that the decoder can extract the hidden message with a high probability. A mixture of erasure and symmetric error channel is realized for the analysis of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
90. Synthesizing the Artistic Effects of Ink Painting.
- Author
-
Kalviainen, Heikki, Parkkinen, Jussi, Kaarna, Arto, Ching-tsorng Tsai, Chishyan Liaw, Cherng-yue Huang, and Jiann-Shu Lee
- Abstract
A novel method that is able to simulate artistic effects of ink-refusal and stroke-trace-reservation in ink paintings is developed. The main ingredients of ink are water, carbon particles, as well as glue. However, glue is not taken into account in other researches, although it plays an important role in ink diffusion. In our ink-diffusion model, we consider the number of fibers and the quantity of glue as parameters of the structure of paper. We simulate the physical interaction among water, carbon particles, glue, and fiber mesh of paper. The realistic renderings created from our models have demonstrated that our models are successful, and are able to imitate the special artistic effects of ink painting. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
91. Overview of Awarded Papers: The 19th Annual Conference of JSAI.
- Author
-
Washio, Takashi, Sakurai, Akito, Nakajima, Katsuto, Takeda, Hideaki, Yokoo, Makoto, and Tojo, Satoshi
- Abstract
In this chapter, we introduce five awarded papers, selected from the 19th annual conference of JSAI (Japan Society for Artificial Intelligence) 2005. These five papers are truly excellent, for they were selected out of over 290 papers, the rate of which was less than 2%, voted by the total number of approximately seventy reviewers. As has been often mentioned, the research of artificial intelligence branches to many fields; among them, we could observe such tendency that empirical methods were rather prevalent compared with theoretical issues. However, we contend that the following five papers were both sound in theory and practical in feasibility. We show the synopses of the five papers, adding short comments for the award for each. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
92. Award-Winning Papers (Overview).
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Sakurai, Akito, Hasida, Kôiti, and Nitta, Katsumi
- Abstract
On behalf of the program committee (PC) of JSAI 2003, I would like to thank all the chair persons, discussants, and attentive audience who contributed to select these awarded papers. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
93. Best Paper Award 2004: Characterization of a Taxonomy for Business Applications and the Relationships Among Them.
- Author
-
Franch, Xavier, Port, Daniel, Carvallo, Juan P., Quer, Carme, and Torchiano, Marco
- Abstract
In the paper [1] we propose a taxonomy for classifying COTS business applications, i.e. products that are used in the daily functioning of all types of organizations worldwide, such as ERP systems and document management tools. We propose the identification of characterization attributes to arrange the domains which these products belong to, and also we group these domains into categories. We define questions and answers as a means for browsing the taxonomy during COTS selection. We show the need of identifying and recording the relationships among the domains and propose the use of actor-oriented models for expressing these relationships as dependencies. Last, we explore the definition of quality models for the domains, to be used in COTS selection, focusing on their reusability and stepwise definition downwards the hierarchy. [ABSTRACT FROM AUTHOR]
- Published
- 2005
94. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Seneviratne, Aruna, Strang, Thomas, Patel, Shwetak N., and Robertson, Thomas
- Abstract
Activity sensing in the home has a variety of important applications, including healthcare, entertainment, home automation, energy monitoring and post-occupancy research studies. Many existing systems for detecting occupant activity require large numbers of sensors, invasive vision systems, or extensive installation procedures. We present an approach that uses a single plug-in sensor to detect a variety of electrical events throughout the home. This sensor detects the electrical noise on residential power lines created by the abrupt switching of electrical devices and the noise created by certain devices while in operation. We use machine learning techniques to recognize electrically noisy events such as turning on or off a particular light switch, a television set, or an electric stove. We tested our system in one home for several weeks and in five homes for one week each to evaluate the system performance over time and in different types of houses. Results indicate that we can learn and classify various electrical events with accuracies ranging from 85-90%. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
95. Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Yang, Christopher C., Zeng, Daniel, Chau, Michael, Kuiyu Chang, and Qing Yang
- Abstract
The aim of this study is to explore trends in computer crime and cybercrime research from 1974 to 2006. All publications for this analysis were drawn from the ISI Web of Science, the Science Citation Index (SCI), and the Social Science Citation Index (SSCI). The ISI Web of Science is considered a powerful and relatively accurate tool in bibliometric studies. About 292 papers related to computer crime and cybercrime were published during this period. The greatest number of these papers was written in English, and the annual output increased significantly after 2003. In the period under study, most papers originated in the USA. Approximately 57% of the publications were articles, and 72% of these articles had single authors. More bibliometric analyses are described in this study, which shows a high scientific production of articles on computer crime and cybercrime publications. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
96. Interactive Virtual Oriental Brush with Pen-Tablet System.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Apolloni, Bruno, Howlett, Robert J., Jain, Lakhmi, Won-Du Chang, and Jungpil Shin
- Abstract
In spite of the importance of natural drawing with input device, the interface between the device and virtual brush's status has been dealt less in literatures. Through this paper, we present a natural interface between pen-tablet device and virtual brush. Proposed system uses pressure instead of z-coordinate of pen to allow drawing with the similar feeling to the real brush. The contribution of this paper is as follows: first, a brush model interacting with pressure is generated. Second, 3D brush model is allowed to be folded back decreasing droplet size intensively according to pen direction changes. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
97. The Tension Between Expectations of Availability and the Reality of Availability in Hybrid Teams.
- Author
-
Crowston, Kevin, Sieber, Sandra, Wynn, Eleanor, Ocker, Rosalie, Huang, Haiyan, Trauth, Eileen, and Purao, Sandeep
- Abstract
The demands of the global world increasingly dictate that people travel in order to conduct work. Oftentimes, this means that team members are neither strictly here nor there. Teams such as these are hybrids, where members alternate between co-located and distributed contexts. The pervasive nature of information and communication technologies, however, continues to impose an expectation of availability on the team members even as they travel. In this paper, we take a reflexive research stance to inform our understanding of the complexities of accomplishing knowledge work within a hybrid team configuration. An illustrative case highlights issues and outcomes associated with member availability that arose during the writing of a research paper. Categorical reasons for member unavailability are identified and contrasted with the expectation of availability. We suggest that the issues and conflict we experienced may be traced to the ambiguous nature of the task and the early project phase requiring problem for mulation. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
98. Introduction to the ICCS 2007 Workshop on Dynamic Data Driven Applications Systems.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Shi, Yong, van Albada, Geert Dick, Dongarra, Jack, Sloot, Peter M. A., and Darema, Frederica
- Abstract
This is the 5th International Workshop on Dynamic Data Driven Applications Systems (DDDAS), organized in conjunction with ICCS. The DDDAS concept entails the ability to dynamically incorporate data into an executing application simulation, and in reverse, the ability of applications to dynamically steer measurement processes. Such dynamic data inputs can be acquired in real-time on-line or they can be archival data. DDDAS is leading to new capabilities by improving applications modeling and systems management methods, augmenting the analysis and prediction capabilities of simulations, improving the efficiency of simulations and the effectiveness of measurement systems. The scope of the present workshop provides examples of research and technology advances enabled through DDDAS and driven by DDDAS. The papers presented in this workshop represent ongoing multidisciplinary research efforts by an international set of researchers from academe, industry, national and research laboratories. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
99. QoS-Predictions Service: Infrastructural Support for Proactive QoS- and Context-Aware Mobile Services (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Wac, Katarzyna, Halteren, Aart, and Konstantas, Dimitri
- Abstract
Today's mobile data applications aspire to deliver services to a user anywhere - anytime while fulfilling his Quality of Service (QoS) requirements. However, the success of the service delivery heavily relies on the QoS offered by the underlying networks. As the services operate in a heterogeneous networking environment, we argue that the generic information about the networks' offered-QoS may enable an anyhow mobile service delivery based on an intelligent (proactive) selection of ‘any' network available in the user's context (location and time). Towards this direction, we develop a QoS-predictions service provider, which includes functionality for the acquisition of generic offered-QoS information and which, via a multidimensional processing and history-based reasoning, will provide predictions of the expected offered-QoS in a reliable and timely manner. We acquire the generic QoS-information from distributed mobile services' components quantitatively (actively and passively) measuring the applicationlevel QoS, while the reasoning is based on statistical data mining and pattern recognition techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
100. Exploration of Researchers' Social Network for Discovering Communities.
- Author
-
Washio, Takashi, Sakurai, Akito, Nakajima, Katsuto, Tojo, Satoshi, Yokoo, Makoto, Ichise, Ryutaro, Takeda, Hideaki, and Ueyama, Kosuke
- Abstract
The research community plays a very important role in helping researchers undertake new research topics. The authors propose a community mining system that helps to find communities of researchers by using bibliography data. The basic concept of this system is to provide interactive visualization of communities both local and global communities. We implemented this concept using actual bibliography data and present a case study using the proposed system. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.