12 results on '"Tharam Dillon"'
Search Results
2. Converged Voice Access to Data (CVAD)
- Author
-
Alex Talevski, Elizabeth Chang, Tharam Dillon Alexander Fedoseev, and Eenjun Hwang
- Subjects
business.product_category ,Voice over IP ,Multimedia ,Computer science ,business.industry ,Mobile computing ,computer.software_genre ,Data access ,Personal computer ,Internet access ,The Internet ,Telephony ,Data as a service ,business ,computer - Abstract
The rapid growth of the Internet and widespread use of mobile computing and telephony has resulted in a broad range of ways to communicate and access information. Data and telecommunications convergence promises a wide range of possible solutions that will increase productivity, reduce costs, and provide new opportunities and revenues for enterprises. However, such converged telecommunications and data services have been largely isolated to static environments where fixed Personal Computers (PC) and an Internet connection are used in conjunction with various software tools to simulate a pseudo converged session. Generally, data presented on the internet and in enterprise applications is not available on voice networks and vice-versa. Due to the versatile nature of today's enterprise, a feature-rich, flexible, adaptive and widely accessible convergence solution is required. This paper presents an Interactive Voice Response (IVR) driven approach that uses Converged voice access to data (CVAD) services. The CVAD solution offers enhanced service effectiveness, flexibility and convenience for professionals on the move.
- Published
- 2007
- Full Text
- View/download PDF
3. On the Move to Meaningful Internet Systems: OTM 2009 : Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II
- Author
-
Robert Meersman, Tharam Dillon, Pilar Herrero, Robert Meersman, Tharam Dillon, and Pilar Herrero
- Subjects
- Computer networks, Data protection, Computer science, Database management, Data mining, Application software
- Abstract
Internet-based information systems, the second covering the large-scale in- gration of heterogeneous computing systems and data resources with the aim of providing a global computing space. Eachofthesefourconferencesencouragesresearcherstotreattheirrespective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more'archival'nature of the main conferences with research results in a number of selected and more'avant-garde'areas related to the general topic of Web-based distributed c- puting. For instance, the so-called Semantic Web has given rise to several novel research areas combining linguistics, information systems technology, and ar-?cial intelligence, such as the modeling of (legal) regulatory systems and the ubiquitous nature of their usage. We were glad to see that ten of our earlier s- cessful workshops (ADI, CAMS, EI2N, SWWS, ORM, OnToContent, MONET, SEMELS, COMBEK, IWSSA) re-appeared in 2008 with a second, third or even?fth edition, sometimes by alliance with other newly emerging workshops, and that no fewer than three brand-new independent workshops could be selected from proposals and hosted: ISDE, ODIS and Beyond SAWSDL. Workshop - diences productively mingled with each other and with those of the main c- ferences, and there was considerable overlap in authors.
- Published
- 2009
4. Emergent semantics systems
- Author
-
Karl Aberer, Tiziana Catarci, Philippe Cudré-Mauroux, Tharam Dillon, Stephan Grimm, Mohand-Said Hacid, Arantza Illarramendi, Mustafa Jarrar, Vipul Kashyap, Massimo Mecella, Eduardo Mena, Erich J. Neuhold, Aris M. Ouksel, Thomas Risse, Monica Scannapieco, Fèlix Saltor, Luca de Santis, Stefano Spaccapietra, Steffen Staab, Rudi Studer, Olga De Troyer, Eidgenössische Technische Hochschule - Swiss Federal Institute of Technology [Zürich] (ETH Zürich), Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome], University of Technology Sydney (UTS), Universität Karlsruhe (TH), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), University of the Basque Country/Euskal Herriko Unibertsitatea (UPV/EHU), Vrije Universiteit Brussel (VUB), National Library of Medicine (NLM), National Institutes of Health [Bethesda] (NIH)-National Center for Biotechnology Information (NCBI), University of Zaragoza - Universidad de Zaragoza [Zaragoza], Fraunhofer Institute for Systems and Innovation Research (Fraunhofer ISI ), Fraunhofer (Fraunhofer-Gesellschaft), University of Illinois [Chicago] (UIC), University of Illinois System, Universitat Politècnica de Catalunya [Barcelona] (UPC), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Bouzeghoub, M, Goble, C, Kashyap, V, and Spaccapietra, S
- Subjects
Computer science ,Distributed computing ,Data management ,Interoperability ,Overlay network ,02 engineering and technology ,Ontology (information science) ,computer.software_genre ,Semantic heterogeneity ,020204 information systems ,Semantic computing ,0202 electrical engineering, electronic engineering, information engineering ,Semantic integration ,[INFO]Computer Science [cs] ,Semantic Web ,Semantic compression ,Distributed database ,business.industry ,Semantic interoperability ,Digital library ,Metadata ,Semantic grid ,Ontology ,020201 artificial intelligence & image processing ,Data mining ,business ,computer - Abstract
Until recently, most data interoperability techniques involved central components, e.g., global schemas or ontologies, to overcome semantic heterogeneity for enabling transparent access to heterogeneous data sources. Today, however, with the democratization of tools facilitating knowledge elicitation in machine-processable formats, one cannot rely on global, centralized schemas anymore as knowledge creation and consumption are getting more and more dynamic and decentralized. Peer Data Management Systems (PDMS) implementing semantic overlay networks are a good example of this new breed of systems eliminating the central semantic component and replacing it through decentralized processes of local schema alignment and query processing. As a result semantic interoperability becomes an emergent property of the system. In this talk we provide examples of both structural and dynamic aspects of such emergent semantics systems based on semantic overlay networks. ?From the structural perspective we can show that the typical properties of self-organizing networks also appear in semantic overlay networks. They form directed, scalefree graphs. We present both analytical models for characterizing those graphs and empirical results providing insight on their quantitative properties. Then we present semantic gossiping, a model for the dynamic reorganization of semantic overlay networks resulting from information propagation through the network and local realignment of semantic relationships. The techniques we apply in that context are based on belief propagation, a distributed probabilistic reasoning technique frequently encountered in self-organizing systems. Finally we will give a quick glance on how this techniques can be implemented at the systems level, based on a peer-to-peer systems approach.
- Full Text
- View/download PDF
5. Teenagers’ Stress Detection Based on Time-Sensitive Micro-blog Comment/Response Actions
- Author
-
Jia Jia, Liang Zhao, Ling Feng, Tsinghua University [Beijing] (THU), Tharam Dillon, and TC 12
- Subjects
Computer science ,business.industry ,Microblogging ,Time sensitivity ,Sentiment analysis ,Internet privacy ,Computer security ,computer.software_genre ,Tweeter ,3. Good health ,law.invention ,Leverage (negotiation) ,law ,Stress (linguistics) ,Detection performance ,Social media ,[INFO]Computer Science [cs] ,business ,computer ,Time sensitive - Abstract
Part 1: Artificial Intelligence Techniques in Bio Medicine; International audience; Accurately detecting psychological stress in time is a significant issue in the modern stressful society, especially for adolescents who are not mature enough to cope with pressure well. Micro-blog offers a new channel for teens’ stress detection, since more and more teenagers nowadays prefer to express themselves on the lively virtual social networks. Previous work mainly rely on tweeting contents to detect tweeters’ psychological stress. However, a tweet is limited to 140 characters, which are too short to provide enough information to accurately figure out its tweeter’s stress. To overcome the limitation, this paper proposes to leverage details of social interactions between tweeters and their following friends (i.e., time-sensitive comment/response actions under a tweet) to aid stress detection. Experimental results through a real user study show that time sensitivity of comment/response acts plays a significant role in stress detection, and involving such interaction acts can improve the detection performance by 23.5% in F-measure over that without such interactions.
- Published
- 2015
- Full Text
- View/download PDF
6. Dynamic Data Mart for Business Intelligence
- Author
-
M. Machizaud, Wenny Rahayu, Elizabeth Chang, M. Diallo, University of New South Wales [Sydney] (UNSW), La Trobe University [Melbourne], IMT École nationale supérieure des Mines d'Albi-Carmaux (IMT Mines Albi), Institut Mines-Télécom [Paris] (IMT), Tharam Dillon, and TC 12
- Subjects
business.industry ,Computer science ,Data management ,Dynamic data ,InformationSystems_DATABASEMANAGEMENT ,computer.software_genre ,Data science ,Data warehouse ,Data governance ,Dynamic data mart ,Disparate data sources ,Data quality ,Data mart ,Business intelligence ,Data integration ,[INFO]Computer Science [cs] ,business ,computer - Abstract
Part 2: Artificial Intelligence for Knowledge Management; International audience; Companies today have several major issues while managing information. Many subsidiaries and departments have developed their own Data Management which has led to a multitude of Operational Databases and sometimes a multitude of Data Marts, policies and processes. Thus, these systems lack sustainability because they are not dynamic and not self-organizing, and so they do not adapt to the continuous needs arising from evolution that the companies experience. The Dynamic Data Mart architecture is built around 6 main functions, namely the 3Ms (Data Mining, Data Marshalling and Data Meshing) and the 3Rs (Recommendation, Reconciliation and Representation), which will address the aforementioned problems. Once the totality of the data have been loaded into a single Data Warehouse, the Dynamics Data Marts address these problems by mining the user’s behavior and the user’s decision making processes and continuously and automatically adapting the Data Mart to the needs of the users. Dynamic Data Marts create adapted dimensions, facts, data associations and views and then automatically find the ones that are not used anymore. These latter are then automatically dropped by the system, or can be presented to the IT manager if needed for validation of their removal.
- Published
- 2015
- Full Text
- View/download PDF
7. Semantic Measures Based on RDF Projections: Application to Content-Based Recommendation Systems
- Author
-
Sylvie Ranwez, Stefan Janaqi, Sébastien Harispe, Jacky Montmain, Laboratoire de Génie Informatique et Ingénierie de Production (LGI2P), IMT - MINES ALES (IMT - MINES ALES), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Robert Meersman, Hervé Panetto, Tharam Dillon, Johann Eder, Zohra Bellahsene, Norbert Ritter, Pieter Leenheer, and Deijing Dou, Ranwez, Sylvie, and Robert Meersman, Hervé Panetto, Tharam Dillon, Johann Eder, Zohra Bellahsene, Norbert Ritter, Pieter Leenheer, and Deijing Dou
- Subjects
[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI] ,Measure (data warehouse) ,Information retrieval ,Exploit ,business.industry ,Computer science ,02 engineering and technology ,computer.file_format ,Linked data ,Representation (arts) ,Recommender system ,Semantics ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,Knowledge base ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,RDF ,business ,computer - Abstract
Many applications take advantage of both ontologies and the Linked Data paradigm to characterize various kinds of resources. To fully exploit this knowledge, measures are used to estimate the relatedness of resources regarding their semantic characterization. Such semantic measures mainly focus on specific aspects of the semantic characterization (e.g. types) or only partially exploit the semantics expressed in the knowledge base. This article presents a framework for defining semantic measures to compare instances defined within an RDF knowledge base. A special type of measure, based on the representation of an instance through projections, is detailed and evaluated through its use in a music band recommender system.
8. Towards Evaluating an Ontology-Based Data Matching Strategy for Retrieval and Recommendation of Security Annotations for Business Process Models
- Author
-
Ioana Ciuciu, Robert Meersman, Yan Tang, Vrije Universiteit Brussel (VUB), Karl Aberer, Ernesto Damiani, Tharam Dillon, WG 2.6, TC 2, and WG 2.12
- Subjects
Matching (statistics) ,Computer science ,Process ontology ,02 engineering and technology ,Ontology (information science) ,Security policy ,semantic annotation ,business process model design ,03 medical and health sciences ,security policy ,ontology-based data matching ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Knowledge retrieval ,[INFO]Computer Science [cs] ,ontology ,030304 developmental biology ,0303 health sciences ,Information retrieval ,business.industry ,Ontology-based data integration ,knowledge retrieval ,Business process modeling ,Knowledge base ,security constraints ,business ,evaluation methodology - Abstract
International audience; In the Trusted Architecture for Securely Shared Services (TAS3) EC FP7 project we have developed a method to provide semantic support to the process modeler during the design of secure business process models. Its supporting tool, called Knowledge Annotator (KA), is using ontology-based data matching algorithms and strategy in order to infer the recommendations the best fitted to the user design intent, from a dedicated knowledge base. The paper illustrates how the strategy is used to perform the similarity (matching) check in order to retrieve the best design recommendation. We select the security and privacy domain for trust policy specification for the concept illustration. Finally, the paper discusses the evaluation of the results using the Ontology-based Data Matching Framework evaluation benchmark.
- Published
- 2011
- Full Text
- View/download PDF
9. MailOfMine – Analyzing Mail Messages for Mining Artful Collaborative Processes
- Author
-
Monica Scannapieco, Massimo Mecella, Diego Zardetto, Tiziana Catarci, Claudio Di Ciccio, Università degli Studi di Roma 'La Sapienza' = Sapienza University [Rome], Istituto Nazionale di Statistica (ISTAT), ISTAT, Karl Aberer, Ernesto Damiani, Tharam Dillon, WG 2.12, TC 2, and WG 2.6
- Subjects
Computer science ,process mining ,Process mining ,Object matching ,02 engineering and technology ,Data science ,knowledge workers ,Set (abstract data type) ,email analysis ,visual representation of processes ,object matching ,declarative workflows ,artful processes ,Workflow ,Work (electrical) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,[INFO]Computer Science [cs] - Abstract
International audience; Artful processes are informal processes typically carried out by those people whose work is mental rather than physical (managers, professors, researchers, engineers, etc.), the so called “knowledge workers”. In this paper we propose the MailOfMine approach, to automatically build, on top of a collection of email messages, a set of workflow models that represent the artful processes laying behind the knowledge workers activities.
- Published
- 2011
- Full Text
- View/download PDF
10. Fragment-Based Version Management for Repositories of Business Process Models
- Author
-
Chathura C. Ekanayake, Marcello La Rosa, Marie-Christine Fauvet, Arthur H. M. ter Hofstede, Queensland University of Technology [Brisbane] (QUT), Eindhoven University of Technology [Eindhoven] (TU/e), Modélisation et Recherche d’Information Multimédia [Grenoble] (MRIM), Laboratoire d'Informatique de Grenoble (LIG), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF), Research funded by the Smart Services Cooperative Research Centre (CRC) through the Australian Government's CRC Programme, Robert Meersman, Tharam Dillon, and Pilar Herrero, and Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Institut National Polytechnique de Grenoble (INPG)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Process modeling ,Database ,Process modeling languages ,Artifact-centric business process model ,Computer science ,Process (engineering) ,version ,020207 software engineering ,02 engineering and technology ,Business process modeling ,computer.software_genre ,Data science ,Maturity (finance) ,080300 COMPUTER SOFTWARE ,process model ,storage ,repository ,[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR] ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Information system ,Empirical evidence ,computer ,080600 INFORMATION SYSTEMS - Abstract
Section: Business process repositories; International audience; As organizations reach higher levels of Business Process Management maturity, they tend to accumulate large collections of process models. These repositories may contain thousands of activities and be managed by different stakeholders with varying skills and responsibilities. However, while being of great value, these repositories induce high management costs. Thus, it becomes essential to keep track of the various model versions as they may mutually overlap, supersede one another and evolve over time. We propose an innovative versioning model, and associated storage structure, specifically designed to maximize sharing across process models and process model versions, reduce conflicts in concurrent edits and automatically handle controlled change propagation. The focal point of this technique is to version single process model fragments, rather than entire process models. Indeed empirical evidence shows that real-life process model repositories have numerous duplicate fragments. Experiments on two industrial datasets confirm the usefulness of our technique.
- Published
- 2011
- Full Text
- View/download PDF
11. Complementarity in Competence Management: Framework and Implementation
- Author
-
Dong Cheng, Nacer Boudjlida, Services and Cooperation (SCORE), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Networks, Systems and Services (LORIA - NSS), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL), Robert Meersman, Tharam Dillon, and Pilar Herrero, Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), and Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR] ,Capability management ,Knowledge management ,Knowledge representation and reasoning ,Computer science ,ACM: H.: Information Systems/H.3: INFORMATION STORAGE AND RETRIEVAL ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Description Logics ,Mediator Federation ,Description logic ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Composite Answer ,Heterogeneous ,Competence (human resources) ,business.industry ,Mediation ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,ACM: H.: Information Systems/H.1: MODELS AND PRINCIPLES ,ACM: I.: Computing Methodologies/I.2: ARTIFICIAL INTELLIGENCE ,010201 computation theory & mathematics ,Human resource management ,[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR] ,Representation language ,Capability discovery ,business - Abstract
The original publication is available at www.springerlink.com; International audience; Retrieving and composing individuals' capabilities are the matter of several research fields, like competence-based management, human resources management, enterprise knowledge management systems, knowledge representation systems, etc. This work focuses on capability representation, discovery and composition in heterogeneous, and possibly distributed, knowledge representation environments. We define a capability representation language in Description Logics, and we propose approaches and algorithms for capability management and discovery. In addition, we outline how our proposals are implemented in a mediator-based prototype system.
- Published
- 2010
- Full Text
- View/download PDF
12. Improved Load Balancing on Distributed Massive Simulation Environments
- Author
-
Gennaro Cordasco, Cristoforo Caponigri, Rosario De Chiara, Vittorio Scarano, Robert Meersman, Tharam Dillon, Pilar Herrero, Cristoforo, Caponigri, Cordasco, Gennaro, Rosario De, Chiara, and Vittorio, Scarano
- Subjects
Battle ,Computer science ,Computation ,Distributed computing ,media_common.quotation_subject ,Workload ,Load balancing (computing) ,media_common - Abstract
In this paper, we report the findings we gathered in designing and implementing a system that provides a distributed massive simulation environment. Massive Battle is a system capable of simulating historical battles for the purpose of learning and to carry out historical researches (e.g. what-if scenarios). We present a distributed implementation of Massive Battle and some early tests. We report and discuss some analysis of the problems related to the workload distribution in this particular environment. We report how is possible to measure a better load balancing by adopting a more general scheme of computation that generalize the assignments that each peer has to complete together with simulation.
- Published
- 2010
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.