9,942 results
Search Results
2. Efficient Wet Paper Codes.
- Author
-
Barni, Mauro, Herrera-Joancomartí, Jordi, Katzenbeisser, Stefan, Pérez-González, Fernando, Fridrich, Jessica, Goljan, Miroslav, and Soukal, David
- Abstract
Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipient. In this paper, we describe new approaches to wet paper codes that enjoy low computational complexity and improved embedding efficiency (number of message bits per embedding change). Some applications of wet paper codes to steganography and data embedding in binary images are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
3. Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kim, Hyoung Joong, Chae, Jong-Suk, Kim, Seong-Dong, Kim, Joonwoong, and Beresford, Alastair R.
- Abstract
U-Healthcare promises increases in efficiency, accuracy and availability of medical treatment; however it also introduces the potential for serious abuses including major privacy violations, staff discrimination and even life-threatening attacks. In this position paper we highlight some potential threats and open the discussion about the security requirements of this new scenario. We take a few initial steps towards a U-Healthcare security policy and propose a system architecture designed to help enforce the policy's goals. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
4. Impact of Culture on International User Research -A Case Study: Integration Pre-study in Paper Mills.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aykin, Nuray, Oikarinen, Anna, and Nieminen, Marko
- Abstract
Global paper industry needs systems that can be used in all locations. International user studies can be helpful when integrating systems. Not only due to the lack of common language but also the differences in culture and the usage of systems, information from different countries needs to be collected and analyzed so that the integration development is not be biased and unilateral. During the study some food for thought was gathered on what to consider when planning an international user study. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
5. Augmented Classroom: A Paper-Centric Approach for Collaborative Learning System.
- Author
-
Murakami, Hitomi, Nakashima, Hideyuki, Tokuda, Hideyuki, Yasumura, Michiaki, Miura, Motoki, Kunifuji, Susumu, Shizuki, Buntarou, and Tanaka, Jiro
- Abstract
We developed AirTransNote, a computer-mediated classroom collaboration system. The system enables real-time note-sharing. AirTransNote manages notes written by students on paper and enables the teacher to browse through the notes or show them to the students. AirTransNote can analyze students' answers, helping the teacher better understand their problems. The system is not meant to provide an alternative to the conventional way of instruction; rather, it is designed to enhance class interaction. We conducted a preliminary study using questionnaires and found that this system can be feasible to apply for classroom environment. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
6. A Publishing Framework for Digitally Augmented Paper Documents: Towards Cross-Media Information Integration.
- Author
-
Yueting Zhuang, Shiqiang Yang, Yong Rui, Qinming He, Xiaoqing Lu, and Zhiwu Lu
- Abstract
Paper keeps as a key information medium and this has motivated the development of new technologies for digitally augmented paper (DAP) that enable printed content to be linked with multimedia information. Among those technologies, one simplest approach is to print some visible patterns on paper (e.g., barcodes in the margin) as cross-media links. Due to the latest progress in printing industry, some more sophisticated methods have been developed, that is, some kinds of patterns printed on the background of a page in a high resolution are almost invisible and then we are affected little when reading. For all these pattern-embedding based approaches to integrate printed and multimedia information, we aim to present a unified publishing framework independent of particular patterns and readers(e.g., cameras to capture patterns) used to realize DAP. The presented framework manages semantic information about printed documents, multimedia resources, and patterns as links between them and users are provided with a platform for publishing DAP documents. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
7. The web impact: A white paper.
- Author
-
Goos, G., Hartmanis, J., Leeuwen, J., Margaria, Tiziana, Steffen, Bernhard, Rückert, Roland, Posegga, Joachim, and Lardenois, Alain
- Published
- 1998
- Full Text
- View/download PDF
8. Citation-Based Methods for Personalized Search in Digital Libraries.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Weske, Mathias, Hacid, Mohand-Saïd, Godart, Claude, Van, Thanh-Trung, and Beigbeder, Michel
- Abstract
In this paper we present our work about personalized search in digital libraries. Unlike other researches which use content-based methods, we focus on citation-based methods for this purpose. We propose a practical approach to estimate the co-citation relatedness between scientific papers using the Google search engine. We conducted some experiments to evaluate performance of different citation-based methods. The experimental results show that our approach is promising and applicable for personalized search in digital libraries. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
9. Practical Security Analysis of Dirty Paper Trellis Watermarking.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Furon, Teddy, Cayre, François, Doërr, Gwenaël, and Bas, Patrick
- Abstract
This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN). [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
10. "Merolyn the Phone": A Study of Bluetooth Naming Practices (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Abowd, Gregory D., Seneviratne, Aruna, Strang, Thomas, and Kindberg, Tim
- Abstract
This paper reports the results of an in-depth study of Bluetooth naming practices which took place in the UK in August 2006. There is a significant culture of giving Bluetooth names to mobile phones in the UK, and this paper's main contribution is to provide an account of those Bluetooth naming practices, putting them in their social, physical and intentional context. The paper also uncovers how users have appropriated the ways in which Bluetooth, with its relatively short range of about 10-100m, operates between their mobile phones as a partially embodied medium, making it a distinctive paradigm of socially and physically embedded communication. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
11. Discovering User Profiles from Semantically Indexed Scientific Papers.
- Author
-
Carbonell, Jaime G., Siekmann, Jörg, Berendt, Bettina, Hotho, Andreas, Mladenic, Dunja, Semeraro, Giovanni, Basile, Pierpaolo, de Gemmis, Marco, and Lops, Pasquale
- Abstract
Typically, personalized information recommendation services automatically infer the user profile, a structured model of the user interests, from documents that were already deemed relevant by the user. We present an approach based on Word Sense Disambiguation (WSD) for the extraction of user profiles from documents. This approach relies on a knowledge-based WSD algorithm, called JIGSAW, for the semantic indexing of documents: JIGSAW exploits the WordNet lexical database to select, among all the possible meanings (senses) of a polysemous word, the correct one. Semantically indexed documents are used to train a naïve Bayes learner that infers "semantic", sense-based user profiles as binary text classifiers (user-likes and user-dislikes). Two empirical evaluations are described in the paper. In the first experimental session, JIGSAW has been evaluated according to the parameters of the Senseval-3 initiative, that provides a forum where the WSD systems are assessed against disambiguated datasets. The goal of the second empirical evaluation has been to measure the accuracy of the user profiles in selecting relevant documents to be recommended. Performance of classical keyword-based profiles has been compared to that of sense-based profiles in the task of recommending scientific papers. The results show that sense-based profiles outperform keyword-based ones. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
12. The Management and Integration of Biomedical Knowledge: Application in the Health-e-Child Project (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Jimenez-Ruiz, E., Berlanga, R., Sanz, I., McClatchey, R., Danger, R., Manset, D., Paraire, J., and Rios, A.
- Abstract
The Health-e-Child project aims to develop an integrated healthcare platform for European paediatrics. In order to achieve a comprehensive view of children's health, a complex integration of biomedical data, information, and knowledge is necessary. Ontologies will be used to formally define this domain knowledge and will form the basis for the medical knowledge management system. This paper introduces an innovative methodology for the vertical integration of biomedical knowledge. This approach will be largely clinician-centered and will enable the definition of ontology fragments, connections between them (semantic bridges) and enriched ontology fragments (views). The strategy for the specification and capture of fragments, bridges and views is outlined with preliminary examples demonstrated in the collection of biomedical information from hospital databases, biomedical ontologies, and biomedical public databases. Keywords: Vertical Knowledge Integration, Approximate Queries, Ontology Views, Semantic Bridges. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
13. Competency Model in a Semantic Context: Meaningful Competencies (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Christiaens, Stijn, Bo, Jan, and Verlinden, Ruben
- Abstract
In this paper, we will propose our ideas for a semantically ready competency model. The model will allow semantic enrichment on different levels, creating truly meaningful competencies. The aim of this model is to provide a flexible approach for (re)use, matching, interpretation, exchange and storage for competencies. Our competency model is based on the DOGMA ontology framework and the proposed IEEE standards RCD and SCRM. We will focus on the model itself and how semantics can be applied to it as these elements form the basis for any kind of processing on them. Keywords: competence, competency, RCD, semantics, DOGMA, e-HRM, HRM, occupation, ontology, Semantic Web. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
14. A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Ceravolo, Paolo, Damiani, Ernesto, and Fugazza, Cristiano
- Abstract
Transfusion Ontology is a simple task-based ontology developed in the emergency health care domain. Taking the assumption that ontologies are instruments for supporting exchange of information among parties, the principles governing the design of this ontology was mainly based on the identification of the interactions of messages to be exchanged among parties. This paper shows how this simple design principle is able to guide a whole ontology construction. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
15. A Fair Anonymous Submission and Review System.
- Author
-
Leitold, Herbert, Markatos, Evangelos, Naessens, Vincent, Demuynck, Liesje, and Decker, Bart
- Abstract
Reputation systems play an important role in many Internet communities. They allow individuals to estimate other individual's behavior during interactions. However, a more privacy-friendly reputation system is desirable while maintaining its trustworthiness. This paper presents a fair anonymous submission and review system. The review process is reputation-based and provides better anonymity properties than existing reputation systems. Moreover, the system allows for accountability measures. Anonymous credentials are used as basic blocks. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
16. Dirty-Paper Writing Based on LDPC Codes for Data Hiding.
- Author
-
Gunsel, Bilge, Jain, Anil K., Tekalp, A. Murat, Sankur, Bülent, Dikici, Çagatay, Idrissi, Khalid, and Baskurt, Atilla
- Abstract
We describe a new binning technic for informed data hiding problem. In information theoretical point of view, the blind watermarking problem can be seen as transmitting a secret message M through a noisy channel on top of an interfered host signal S that is available only at the encoder. We propose an embedding scheme based on Low Density Parity Check(LDPC) codes, in order to quantize the host signal in an intelligent manner so that the decoder can extract the hidden message with a high probability. A mixture of erasure and symmetric error channel is realized for the analysis of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
17. At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line (Nominated for the Best Paper Award).
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Krumm, John, Seneviratne, Aruna, Strang, Thomas, Patel, Shwetak N., and Robertson, Thomas
- Abstract
Activity sensing in the home has a variety of important applications, including healthcare, entertainment, home automation, energy monitoring and post-occupancy research studies. Many existing systems for detecting occupant activity require large numbers of sensors, invasive vision systems, or extensive installation procedures. We present an approach that uses a single plug-in sensor to detect a variety of electrical events throughout the home. This sensor detects the electrical noise on residential power lines created by the abrupt switching of electrical devices and the noise created by certain devices while in operation. We use machine learning techniques to recognize electrically noisy events such as turning on or off a particular light switch, a television set, or an electric stove. We tested our system in one home for several weeks and in five homes for one week each to evaluate the system performance over time and in different types of houses. Results indicate that we can learn and classify various electrical events with accuracies ranging from 85-90%. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
18. Trends in Computer Crime and Cybercrime Research During the Period 1974-2006: A Bibliometric Approach.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Yang, Christopher C., Zeng, Daniel, Chau, Michael, Kuiyu Chang, and Qing Yang
- Abstract
The aim of this study is to explore trends in computer crime and cybercrime research from 1974 to 2006. All publications for this analysis were drawn from the ISI Web of Science, the Science Citation Index (SCI), and the Social Science Citation Index (SSCI). The ISI Web of Science is considered a powerful and relatively accurate tool in bibliometric studies. About 292 papers related to computer crime and cybercrime were published during this period. The greatest number of these papers was written in English, and the annual output increased significantly after 2003. In the period under study, most papers originated in the USA. Approximately 57% of the publications were articles, and 72% of these articles had single authors. More bibliometric analyses are described in this study, which shows a high scientific production of articles on computer crime and cybercrime publications. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
19. QoS-Predictions Service: Infrastructural Support for Proactive QoS- and Context-Aware Mobile Services (Position Paper).
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Wac, Katarzyna, Halteren, Aart, and Konstantas, Dimitri
- Abstract
Today's mobile data applications aspire to deliver services to a user anywhere - anytime while fulfilling his Quality of Service (QoS) requirements. However, the success of the service delivery heavily relies on the QoS offered by the underlying networks. As the services operate in a heterogeneous networking environment, we argue that the generic information about the networks' offered-QoS may enable an anyhow mobile service delivery based on an intelligent (proactive) selection of ‘any' network available in the user's context (location and time). Towards this direction, we develop a QoS-predictions service provider, which includes functionality for the acquisition of generic offered-QoS information and which, via a multidimensional processing and history-based reasoning, will provide predictions of the expected offered-QoS in a reliable and timely manner. We acquire the generic QoS-information from distributed mobile services' components quantitatively (actively and passively) measuring the applicationlevel QoS, while the reasoning is based on statistical data mining and pattern recognition techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
20. Capturing Abstract Matrices from Paper.
- Author
-
Borwein, Jonathan M., Farmer, William M., Kanahori, Toshihiro, Sexton, Alan, Sorge, Volker, and Suzuki, Masakazu
- Abstract
Capturing and understanding mathematics from print form is an important task in translating written mathematical knowledge into electronic form. While the problem of syntactically recognising mathematical formulas from scanned images has received attention, very little work has been done on semantic validation and correction of recognised formulas. We present a first step towards such an integrated system by combining the Infty system with a semantic analyser for matrix expressions. We applied the combined system in experiments on the semantic analysis of matrix images scanned from textbooks. While the first results are encouraging, they also demonstrate many ambiguities one has to deal with when analysing matrix expressions in different contexts. We give a detailed overview of the problems we encountered that motivate further research into semantic validation of mathematical formula recognition. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
21. Applications of Agent Based Simulation.
- Author
-
Carbonell, Jaime G., Siekmann, Jorg, Antunes, Luis, Takadama, Keiki, Davidsson, Paul, Holmgren, Johan, Kyhlbäck, Hans, Mengistu, Dawit, and Persson, Marie
- Abstract
This paper provides a survey and analysis of applications of Agent Based Simulation (ABS). A framework for describing and assessing the applications is presented and systematically applied. A general conclusion from the study is that even if ABS seems a promising approach to many problems involving simulation of complex systems of interacting entities, it seems as the full potential of the agent concept and previous research and development within ABS often is not utilized. We illustrate this by providing some concrete examples. Another conclusion is that important information of the applications, in particular concerning the implementation of the simulator, was missing in many papers. As an attempt to encourage improvements we provide some guidelines for writing ABS application papers. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
22. A Programming Model for the Automatic Construction of USN Applications Based on Nano-Qplus.
- Author
-
Sha, Edwin, Sung-Kook Han, Cheng-Zhong Xu, Moon Hae Kim, Yang, Laurence T., Bin Xiao, Kwangyong Lee, Woojin Lee, Juil Kim, and Kiwon Chong
- Abstract
A programming model for the automatic construction of USN applications based on Nano-Qplus is proposed in this paper. Nano-Qplus is a sensor network platform developed by ETRI. Programs of nodes such as sensors, routers, sinks and actuators in a sensor network are automatically generated through the technique of this paper. Developers can implement USN applications from models of sensor networks. The configuration information of each node is automatically generated from a model. Then, the execution code is automatically generated using the configuration information. Through the technique of this paper, developers can easily implement USN applications even if they do not know the details of low-level information. The development effort of USN applications also will be decreased because execution codes are automatically generated. Furthermore, developers can consistently construct USN applications from USN models using the proposed tool. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
23. ODBASE 2007 PC Co-chairs' Message.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Meersman, Robert, Tari, Zahir, Dillon, Tharam, Missikoff, Michele, and Staab, Steffen
- Abstract
As in recent years, the focus of the ODBASE conference lies in addressing research issues that bridge traditional boundaries between disciplines such as databases, artificial intelligence, networking, data extraction, or mobile computing. There has been an increasing focus on semantic technologies in ODBASE. The work on semantic modeling technologies is being progressively scaled up to handling millions of triples which permit adoption of semantic applications within a few days. The envelope is being progressively pushed out to enable even faster, wider and broader enterprise-wide and Web-scale applications. Also, ODBASE 2007 encouraged the submission of papers that examine the information needs of various applications, including electronic commerce, electronic government, mobile systems, or bioinformatics. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
24. Recipes for Semantic Web Dog Food — The ESWC and ISWC Metadata Projects.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aberer, Karl, Choi, Key-Sun, Noy, Natasha, Allemang, Dean, and Lee, Kyung-Il
- Abstract
Semantic Web conferences such as ESWC and ISWC offer prime opportunities to test and showcase semantic technologies. Conference metadata about people, papers and talks is diverse in nature and neither too small to be uninteresting or too big to be unmanageable. Many metadata-related challenges that may arise in the Semantic Web at large are also present here. Metadata must be generated from sources which are often unstructured and hard to process, and may originate from many different players, therefore suitable workflows must be established. Moreover, the generated metadata must use appropriate formats and vocabularies, and be served in a way that is consistent with the principles of linked data. This paper reports on the metadata efforts from ESWC and ISWC, identifies specific issues and barriers encountered during the projects, and discusses how these were approached. Recommendations are made as to how these may be addressed in the future, and we discuss how these solutions may generalize to metadata production for the Semantic Web at large. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
25. Using Packet Combination in Multi-query Optimization for Data Collection in Sensor Networks.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Zhang, Hongke, Olariu, Stephan, Cao, Jiannong, Johnson, David B., and Sun, Jun-Zhao
- Abstract
In sensor networks, queries need to be jointly designed, in order to minimize the power consumption and maximize the lifetime. Data reduction techniques can be employed to decrease the size of data to be transferred in the network, and therefore save energy of sensor nodes. This paper presents a novel method for optimizing multi-query in sensor networks. Our approach is, by using packet combination techniques, to reduce the data size of multiple simultaneous queries, so that the energy for data transmission can be saved to the best extent. A delay item is specified together with the query by the application. Then an optimal query plan can be obtained by studying the best time of sending local data to sink that can lead to the minimum cost. Algorithm is described in detail. Performance analysis is performed to validate the effectiveness of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
26. A Distributed Remote Rendering Method Based on Awareness Model.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Ip, Horace H.-S., Au, Oscar C., Leung, Howard, Ming-Ting Sun, and Wei-Ying Ma
- Abstract
This paper proposes a kind of remote rendering method based on awareness model. This method takes the additional cost caused by the movement of the viewpoint into cost calculation and designs a cost prediction algorithm based on the vision field divided by awareness model. The simulation results show that the improved method can not only improve the quality of the remote rendering, but also make full use of the bandwidth of the network, as well as make the remote rendering more fluent when the viewpoint moves fast. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
27. Relation-Driven Business Process-Oriented Service Discovery.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kevin Chen-Chuan Chang, Wei Wang, Lei Chen, Ellis, Clarence A., and Ching-Hsien Hsu
- Abstract
In order to discover services in business-driven Web service composition conveniently, accurately, and efficiently, this paper proposes a business process-oriented service discovery approach. In order to link business property with services, this paper proposes a business related description model of operations. Based on the business related relation model proposed in this paper, a relation-driven discovering algorithm for business process-oriented service discovery is presented. Compared with other discovering approach, the proposed discovering approach considers the business relation between operations and can solve the problem of discovering services with meaningful business relation. The experimentation shows the better performance of this algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
28. RFID Application Model and Performance for Postal Logistics.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Kevin Chen-Chuan Chang, Wei Wang, Lei Chen, Ellis, Clarence A., and Ching-Hsien Hsu
- Abstract
In this paper, we suggest a postal RFID application model that can be used for real time trace and tracking system implementation of parcel processing and pallet management. This paper also shows the tag recognition performance of parcels by speed and mounting tag material such as thin cans, water bottles, and paper using an implemented postal RFID system to find the best solution for RFID adaptation in postal logistics. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
29. Number of Processors with Partitioning Strategy and EDF-Schedulability Test: Upper and Lower Bounds with Comparison.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Stojmenovic, Ivan, Thulasiram, Ruppa K., Yang, Laurence T., Jia, Weijia, and Guo, Minyi
- Abstract
In this paper, we study the problem of scheduling a set of n periodic preemptive independent hard real-time tasks on the minimum number of processors. We assume that the partitioning strategy is used to allocate the tasks to the processors and the EDF method is used to schedule the tasks on each processor. It is known that this scenario is NP-hard; thus, it is unlikely to find a polynomial time algorithm to schedule the tasks on the minimum number of processors. In this work, we derive a lower and an upper bound for the number of processors required to satisfy the constraints of our problem. We also compare a number of heuristic algorithms with each other and with the bounds derived in this paper. Numerical results demonstrate that our lower bound is very tight and it is very close to the optimal solution. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
30. Modeling Asymmetric Slot Allocation for Mobile Multimedia Services in Microcell TDD Employing FDD Uplink as Macrocell.
- Author
-
Sha, Edwin, Sung-Kook Han, Cheng-Zhong Xu, Moon Hae Kim, Yang, Laurence T., Bin Xiao, and Dong-Hoi Kim
- Abstract
This paper introduces an analytical approach which is provided to calculate the downlink and uplink capacities of the time division duplex (TDD) system utilizing the underused frequency division duplex (FDD) uplink which shares the same frequency band. Then the ratio of downlink and uplink slots in one frame is adjusted, so as to prevent the radio resource waste due to asymmetric traffic characteristic in mobile multimedia services. The computer simulation shows that the resource waste problem can be considerably solved through the asymmetric slot allocation. Thus, this paper can be useful as a guideline in the course of planning a two-layer hierarchical cell structure (HCS) employing the TDD system as a microcell and FDD system as a macrocell as well as a mean to increase the performance of such a system. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
31. DNA Gene Expression Classification with Ensemble Classifiers Optimized by Speciated Genetic Algorithm.
- Author
-
Pal, Sankar K., Bandyopadhyay, Sanghamitra, Biswas, Sambhunath, Kim, Kyung-Joong, and Cho, Sung-Bae
- Abstract
Accurate cancer classification is very important to cancer diagnosis and treatment. As molecular information is increasing for the cancer classification, a lot of techniques have been proposed and utilized to classify and predict the cancers from gene expression profiles. In this paper, we propose a method based on speciated evolution for the cancer classification. The optimal combination among several feature-classifier pairs from the various features and classifiers is evolutionarily searched using the deterministic crowding genetic algorithm. Experimental results demonstrate that the proposed method is more effective than the standard genetic algorithm and the fitness sharing genetic algorithm as well as the best single classifier to search the optimal ensembles for the cancer classification. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
32. Semantically Rich Recommendations in Social Networks for Sharing, Exchanging and Ranking Semantic Context.
- Author
-
Gil, Yolanda, Motta, Enrico, Benjamins, V. Richard, Musen, Mark A., Ghita, Stefania, Nejdl, Wolfgang, and Paiu, Raluca
- Abstract
Recommender algorithms have been quite successfully employed in a variety of scenarios from filtering applications to recommendations of movies and books at Amazon.com. However, all these algorithms focus on single item recommendations and do not consider any more complex recommendation structures. This paper explores how semantically rich complex recommendation structures, represented as RDF graphs, can be exchanged and shared in a distributed social network. After presenting a motivating scenario we define several annotation ontologies we use in order to describe context information on the user's desktop and show how our ranking algorithm can exploit this information. We discuss how social distributed networks and interest groups are specified using extended FOAF vocabulary, and how members of these interest groups share semantically rich recommendations in such a network. These recommendations transport shared context as well as ranking information, described in annotation ontologies. We propose an algorithm to compute these rankings which exploits available context information and show how rankings are influenced by the context received from other users as well as by the reputation of the members of the social network with whom the context is exchanged. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
33. A Strategy for Automated Meaning Negotiation in Distributed Information Retrieval.
- Author
-
Gil, Yolanda, Motta, Enrico, Benjamins, V. Richard, Musen, Mark A., Ermolayev, Vadim, Keberle, Natalya, Matzke, Wolf-Ekkehard, and Vladimirov, Vladimir
- Abstract
The paper reports on the development of the formal framework to design strategies for multi-issue non-symmetric meaning negotiations among software agents in a distributed information retrieval system. The advancements of the framework are the following. A resulting strategy compares the contexts of two background domain theories not concept by concept, but the whole context to the other context by accounting the relationships among concepts, the properties, the constraints over properties, and the available instances. It contains the mechanisms for measuring contextual similarity through assessing propositional substitutions and to provide argumentation through generating extra contexts. It uses presuppositions for choosing the best similarity hypotheses and to make the mutual concession to the common sense monotonic. It provides the means to evaluate the possible eagerness to concede through semantic commitments and related notions of knowledgeability and degree of reputation. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
34. Software Engineering Track Chair's Message.
- Author
-
Chakraborty, Goutam and Gupta, Gopal
- Abstract
The Software Engineering track received 63 papers from which 7 papers were selected after an intensive reviewing and selection process. Many good papers could not be selected due to lack of space in the program. The selected papers cover a diverse range of topics within software engineering: from software reliability prediction to middle-ware for component management to runtime validation and code generation. The paper by Roychoudhury, Negi and Mitra analyzes programs loops for estimating program execution time. They use constraint propagation techniques to detect infeasible paths followed by timing analysis that employ memoization techniques. The paper by Sengupta and Cleaveland presents the operational semantics of timed message sequence charts to help detect errors and inconsistencies in specifications. Tripathi and Mall present a method for making predictions about reliability of software during the software development process itself when the failure data from the field cannot be available. The paper by Wang presents a logic programming framework for integrating architecture description languages (ADLs) which allows tools developed for one ADL to be used even though the architectural specification is written in another ADL. In a similar vain, the paper by Stevenson, Fu and Dong presents a framework for automated and validated realization of software architecture designs. The paper by Bhattarcharjee and Shyamsundar presents a method for validated code generation for activity diagrams which are useful in model driven design of software. Finally, the paper by Mousavi et al presents techniques that exploit symmetry for tackling the state-space explosion problem that arises in model checking. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
35. From Texts to Structured Documents: The Case of Health Practice Guidelines.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Aberer, Karl, Choi, Key-Sun, Noy, Natasha, Allemang, Dean, and Lee, Kyung-Il
- Abstract
This paper describes a system capable of semi-automatically filling an XML template from free texts in the clinical domain (practice guidelines). The XML template includes semantic information not explicitly encoded in the text (pairs of conditions and actions/recommendations). Therefore, there is a need to compute the exact scope of conditions over text sequences expressing the required actions. We present in this paper the rules developed for this task. We show that the system yields good performance when applied to the analysis of French practice guidelines. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
36. Supporting Implicit Coordination Between Distributed Teams in Disaster Management.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Löffler, Jobst, Klann, Markus, Baber, Chris, Cross, James, and Smith, Paul
- Abstract
In this paper we consider disaster management as the coordination of resources in space and time, and contrast this with the Joint Operational Picture (JOP) used in military planning. The basic premise is that the processes involved in the collection and management of information could interfere with the priorities of dealing with immediate demands on ‘rescuers' and their managers. Thus, we explore ways in which collaboration could be made as implicit as possible. The paper includes small-scale user trials of prototypes to highlight potential benefits and shortcomings. The paper concludes with consideration of how brokering approaches to coordination could be realized using the prototypes described in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
37. Mobile Devices in Emergency Medical Services: User Evaluation of a PDA-Based Interface for Ambulance Run Reporting.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Löffler, Jobst, Klann, Markus, Chittaro, Luca, Zuliani, Francesco, and Carchietti, Elio
- Abstract
The design of easy-to-use mobile systems for collecting and handling emergency medical care data in the field can significantly improve the effectiveness of rescue operations. In particular, this paper focuses on the design and evaluation of a mobile application that replaces ambulance run paper sheets. First, we discuss the limitations of traditional ambulance run paper sheets. Then, we present the PDA-based system we have developed. Finally, we discuss in detail the usability study we have carried out with first responders. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
38. Aspects of Anatomical and Chronological Sequence Diagrams in Software-Supported Emergency Care Patient Report Forms.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Löffler, Jobst, Klann, Markus, Waldher, Franz, Thierry, Jürgen, and Grasser, Simon
- Abstract
Across Europe emergency physicians are still using paper-based emergency report forms to document medical procedure at accident scenes. The forms are quite similar, but they differ in certain parameters or attributes. There are ongoing endeavours to combine the paper-based protocols and then transfer this new protocol standard into a software-based Emergency Patient Care Report Form (EPCRF). However during the transformation from a paper-based to an electronic solution, many problems occur. To keep the users' acceptance of the emergency medical services personnel, it is crucial that electronic EPCRF supports the central process efficiently. Therefore key elements within the emergency report form are the anatomical diagrams and the chronological sequence diagrams. These diagrams allow the emergency physician to track and record patient's parameters in a very fast and understandable and user friendly way. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
39. Improving Mobile Solution Workflows and Usability Using Near Field Communication Technology.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Schiele, Bernt, Dey, Anind K., Gellersen, Hans, de Ruyter, Boris, and Tscheligi, Manfred
- Abstract
Organisations want nowadays more controlled processes and easily usable solutions, but achieving them requires winning many challenges. Radio Frequency Identification (RFID) based technology has been proposed for improving mobile solution workflows and usability. NFC (Near Field Communication) technology is based on integrating RFID on mobile devices. This paper identifies how NFC based systems could be used to improve mobile solution workflows and usability. The results of this study are based on the implementation of six pilot cases in 2005-2007. This paper concludes that use of NFC provides both advantages and disadvantages and, therefore, to estimate the potential of NFC, its pros and cons have to be weighed up for each case in question. This paper also concludes that only a comprehensive solution achieves the full potential of NFC from users' point of view. Considering mobile solution usability, this paper concludes that NFC based solutions are easy to use, but the small and limited keyboard of mobile devices poses challenges to the design of these solutions. NFC use poses new organizational challenges like need for the rest of the system to catch up and feeling of distrust from the user side. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
40. Informed Recognition in Software Watermarking.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Rangan, C. Pandu, Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Yang, Christopher C., Zeng, Daniel, Chau, Michael, Kuiyu Chang, and Qing Yang
- Abstract
Software watermarking is a technique to protect programs from piracy through embedding secret information into the programs. As software unauthorized use and modification are ubiquitous in the world, progresses in software watermarking will certainly benefit software research and industry. In this paper, we study one of core concepts in this area - informed recognition. To recognize a watermark in a software is to judge the existence of such a watermark in the corresponding software code. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
41. In-Network Event Processing in a Peer to Peer Broker Network for the Internet of Things.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Meersman, Robert, Tari, Zahir, Herrero, Pilar, and Ziekow, Holger
- Abstract
With the rise of RFID technology, the so called internet of things for managing supply chain events has gained increasing attention. This paper proposes a peer to peer broker network on top of existing specifications for this infrastructure. With the broker network, event based communication is enabled for the internet of things. However, the main contribution of this paper is a mechanism to optimize event queries for in-network processing of supply chain events. Here, models of supply chain processes are exploited for optimizing event queries and enabling improved mapping of query operators to the broker network. Experiments are presented which show that the proposed mechanism reduces network load compared to existing approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
42. An Approach for Managing Ambiguities in Multimodal Interaction.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Meersman, Robert, Tari, Zahir, Herrero, Pilar, Caschera, Maria Chiara, and Ferri, Fernando
- Abstract
Multimodal systems support people with different needs and different features during the interaction process making it more easy and natural. However naturalness can usually produce ambiguous interpretation. This paper discusses ambiguities in multimodal interaction proposing in particular two different examples of ambiguities: a) multimodal ambiguities produced combining un-ambiguous modal information containing contrasting concepts in multimodal dialogue, b) ambiguities arising by the propagation at multimodal level of a modal input ambiguity. Moreover, the paper proposes a formal representation of multimodal inputs using the hybrid approach that combines the attribute multi-set grammar with the linear logic. This paper starts from discussing the main features of a multimodal system and the classes of cooperation between modalities. The attribute multi-set grammar combined with the linear logic enables to highlight the multidimensionality of multimodality and allows to formally describe ambiguities that can occur. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
43. Improvement of a Web Engineering Method Through Usability Patterns.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Weske, Mathias, Hacid, Mohand-Saïd, Godart, Claude, Panach, José Ignacio, and Valverde, Francisco
- Abstract
Usability is a feature of software quality that has traditional significance in the Human Computer Interaction (HCI) community. Recent works that have been proposed by the Software Engineering (SE) community are intended to improve the usability of software applications. This paper combines aspects that are defined in both these communities to produce usable web applications. To achieve this goal, a well-known strategy to improve usability is used: usability patterns. However, many usability patterns and guidelines could only be applied when the final system is implemented. In this work, STATUS patterns have been chosen because they solve usability issues at conceptual level. The main purpose of this paper is to improve the usability of Web Applications automatically generated by OOWS (a model-based web engineering method) applying the STATUS patterns. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
44. Integrating RFID Services and Ubiquitous Smart Systems for Enabling Organizations to Automatically Monitor, Decide, and Take Actions.
- Author
-
Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Indulska, Jadwiga, Ma, Jianhua, Yang, Laurence T., Ungerer, Theo, and Cao, Jiannong
- Abstract
Various organizations use the RFID technology for linking, tracking and identifying objects in their operative context. Nevertheless, the RFID components cannot yet be considered as mobile, intelligent and communicating elements of the organization's information infrastructure. They are not always used for accomplishing the linkage between the physical world and the adopted Information Technologies (IT) solutions. Therefore, they are not used for enabling organizations to automatically monitor, decide, and take actions. Heterogeneous networked devices and services installed within the organizations, often work independently instead of collaborating for offering a better quality of the daily activities to the end-user. This paper discusses the adoption of a Smart Ubiquitous Platform (SUP) for monitoring and managing the documents circulation by using the RFID technology. Advantages of the adoption of RFID are discussed too. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
45. An ID-Based Watermarking Scheme for Java Programs.
- Author
-
Xiaobo Zhou, Sokolsky, Oleg, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu, Zheng Yuan, Qiaoyan Wen, Wenling Wu, and Qing Zhang
- Abstract
In this paper, we propose an identities(ID) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants’ identities, embedded via the watermarked opaque predicates, and verified using zero-knowledge proof. We also present a construction of a family of opaque predicates by Legendre symbol, which is resilient, cheap, and stealthy. The order of the watermark is encoded and embedded into the watermarked opaque predicates, and the watermarked opaque predicates are treated as threads of a Java program. Thus, the embedded watermark is dynamic and secure against all usual types of watermarks algorithms attacks and watermarks protocols attacks, and also secure against static and dynamic attacks. Keywords: Java programs, watermarked opaque predicates, ID, aggregate signature, watermarking scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
46. Header Metadata Extraction from Semi-structured Documents Using Template Matching.
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Zewu Huang, Hai Jin, Pingpeng Yuan, and Zongfen Han
- Abstract
With the recent proliferation of documents, automatic metadata extraction from document becomes an important task. In this paper, we propose a novel template matching based method for header metadata extraction form semi-structured documents stored in PDF. In our approach, templates are defined, and the document is considered as strings with format. Templates are used to guide finite state automaton (FSA) to extract header metadata of papers. The testing results indicate that our approach can effectively extract metadata, without any training cost and available to some special situation. This approach can effectively assist the automatic index creation in lots of fields such as digital libraries, information retrieval, and data mining. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
47. Dynamic Consistency Between Value and Coordination Models - Research Issues.
- Author
-
Meersman, Robert, Tari, Zahir, Herrero, Pilar, Bodenstaff, Lianne, Wombacher, Andreas, and Reichert, Manfred
- Abstract
Inter-organizational business cooperations can be described from different viewpoints each fulfilling a specific purpose. Since all viewpoints describe the same system they must not contradict each other, thus, must be consistent. Consistency can be checked based on common semantic concepts of the different viewpoints. This is sufficient for equal concepts, while weakly related concepts, e.g. related to runtime behavior of viewpoints, have to be considered explicitly. In this paper we identify dynamic consistency issues correlated to the runtime behavior between value and coordination viewpoints on behalf of an example. In particular, an issue class on occurrence estimations of execution options and an issue class on granularity differences in modelling are identified and illustrated. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
48. Let's Dance: A Language for Service Behavior Modeling.
- Author
-
Meersman, Robert, Tari, Zahir, Zaha, Johannes Maria, Barros, Alistair, Dumas, Marlon, and Hofstede, Arthur
- Abstract
In Service-Oriented Architectures (SOAs), software systems are decomposed into independent units, namely services, that interact with one another through message exchanges. To promote reuse and evolvability, these interactions are explicitly described right from the early phases of the development lifecycle. Up to now, emphasis has been placed on capturing structural aspects of service interactions. Gradually though, the description of behavioral dependencies between service interactions is gaining increasing attention as a means to push forward the SOA vision. This paper deals with the description of these behavioral dependencies during the analysis and design phases. The paper outlines a set of requirements that a language for modeling service interactions at this level should fulfill, and proposes a language whose design is driven by these requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
49. Acceptance of Voting Technology: Between Confidence and Trust.
- Author
-
Stølen, Ketil, Winsborough, William H., Martinelli, Fabio, Massacci, Fabio, and Pieters, Wolter
- Abstract
Social aspects of security of information systems are often discussed in terms of "actual security" and "perceived security". This may lead to the hypothesis that e-voting is controversial because in paper voting, actual and perceived security coincide, whereas they do not in electronic systems. In this paper, we argue that the distinction between actual and perceived security is problematic from a philosophical perspective, and we develop an alternative approach, based on the notion of trust. We investigate the different meanings of this notion in computer science, and link these to the philosophical work of Luhmann, who distinguishes between familiarity, confidence and trust. This analysis yields several useful distinctions for discussing trust relations with respect to information technology. We apply our framework to electronic voting, and propose some hypotheses that can possibly explain the smooth introduction of electronic voting machines in the Netherlands in the early nineties. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
50. An Effective Searching Method Using the Example-Based Query.
- Author
-
Chakraborty, Goutam, Kil Hong Joo, and Jaeho Lee
- Abstract
An efficient searching system is needed to offer the exact result of diverse web information to the user. Due to this reason, it is important to extract and analyze the user requirements in the distributed information environment. The searching method proposed in this paper uses the keyword as well as its context information for effective searching. Moreover, the proposed searching method is extracted keywords by using the new keyword extraction method also proposed in this paper, and it is executed web searching based on keyword mining profile generated by the extracted keywords. Unlike the conventional searching method, which searched for information by representative words, the proposed searching method is more efficient and exact. This is because data are searched by the example-based query including the content information as well as the representative words. Moreover, this searching method makes a domain keyword list for a quick search. The domain keyword is the representative word of a special domain. The performance of the proposed algorithm is analyzed in a series of experiments to identify its various characteristics. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.