{"title":"A Ontology-Based Multimedia Resource Sharing Framework in Multimedia Science Paper Generation","authors":"Junhua Zhu, Hao Chen, Beiji Zou, Haoyu Zhou","doi":"10.1109/WKDD.2008.63","DOIUrl":"https://doi.org/10.1109/WKDD.2008.63","url":null,"abstract":"The rapid increase of multimedia resources makes it difficult for organizing, describing and locating. The method based on ontology is one of the resolving directions, which can simplify resource organization and improve the resource searching efficiency. Based on ontology, we developed a Multimedia Science Paper Generation System (MSPGS). It implements an ontology-based multimedia resource sharing framework. In this paper, three key processes of multimedia resource sharing framework are introduced in detail. First, the ontology based multimedia resource organization structure is proposed; then, we introduce an approach for multimedia description; finally, in order to locate the target multimedia resource accurately and efficiently, the Concept Classified Semantic Search algorithm is described. To evaluate the efficiency and precision of the sharing framework, some widely used evaluation methods such as Precision, Recall and F-Measure are used in the experiments. The experimental results show that MSPGS can work well and the proposed multimedia resource sharing framework is effective.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yingjie Xia, Guang-hua Song, Yao Zheng, Mingzhe Zhu
{"title":"R2P: A Peer-to-Peer Transfer System Based on Role and Reputation","authors":"Yingjie Xia, Guang-hua Song, Yao Zheng, Mingzhe Zhu","doi":"10.1109/WKDD.2008.28","DOIUrl":"https://doi.org/10.1109/WKDD.2008.28","url":null,"abstract":"This paper introduces R2P, a Peer-to-Peer (P2P) transfer system with role based and reputation based access control policies. With the combination of user authentication, organization authorization and scoring system, we solve the problem of resource piracy, user privacy and network jam, which exist in traditional P2P systems. The R2P system takes advantage of the X509 certificate to implement the role based access control policy. By assembling the artificial scoring and the automatic scoring components, the system evaluates the quantity and quality of the transfer resources, putting forward the reputation based access control policy. Upon the two policies and the adaptive P2P transfer model, the R2P system provides a secure, controllable and efficient resource transfer community.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123679063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancing Knowledge Discovery and Data Mining","authors":"Qi Luo","doi":"10.1109/WKDD.2008.153","DOIUrl":"https://doi.org/10.1109/WKDD.2008.153","url":null,"abstract":"Knowledge discovery and data mining have become areas of growing significance because of the recent increasing demand for KDD techniques, including those used in machine learning, databases, statistics, knowledge acquisition, data visualization, and high performance computing. Knowledge discovery and data mining can be extremely beneficial for the field of Artificial Intelligence in many areas, such as industry, commerce, government, education and so on. The relation between Knowledge and Data Mining, and Knowledge Discovery in Database (KDD) process are presented in the paper. Data mining theory, Data mining tasks, Data Mining technology and Data Mining challenges are also proposed. This is an belief abstract for an invited talk at the workshop.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Machine Scheduling Problem with Temperature Loss","authors":"D. Bai, Lixin Tang, Mengmeng Su","doi":"10.1109/WKDD.2008.36","DOIUrl":"https://doi.org/10.1109/WKDD.2008.36","url":null,"abstract":"This paper considers a new problem of scheduling hot jobs with nonlinear temperature drop curve which is more approximate to the real situation than linear temperature drop curve to minimize the total temperature drop loss. In the problem, all jobs have the same temperature drop curve and different processing times. In this paper, two cases of problems are studied. (1) For the case of jobs without release dates, we prove that the shortest processing time first rule is optimal to the single-machine problem. And we extend the result to the parallel-machine problem. (2) For the case of jobs with release dates, the single-machine problem is strongly NP-hard. And a heuristic, modified shortest processing time first, is proposed to deal with the problem. In order to verify the performance of the heuristic, a lower bound based on release times delaying is presented. Computational results show the effectiveness of the heuristic on a set of random test problems.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115551446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Mechanical Parameters for SSP Rolling Process","authors":"X. Feng, Jinfeng Wang, Faxin Li, H. Tang, Cai Liu","doi":"10.1109/WKDD.2008.10","DOIUrl":"https://doi.org/10.1109/WKDD.2008.10","url":null,"abstract":"Based on the study of rolling force variation rules of the different deformed areas during side pressing for slab, the finite element model of slab side pressing was established through finite element method(FEM) , and the whole process of side pressing was simulated for slab detail, these rules of relation of rolling force and time were yielded. The calculated results indicated that the rolling force of slab head and middle were increasing with the side pressures amount increasing, the maximal rolling force appeared the part of middle slab, which have provided the reference values for the slab side pressing in engineering.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reusable Component-Based Library for GUI Regression Testing","authors":"Hao Chen, Beiji Zou, Naizheng Bian, Lili Pan","doi":"10.1109/WKDD.2008.79","DOIUrl":"https://doi.org/10.1109/WKDD.2008.79","url":null,"abstract":"The widespread use of graphical user interfaces (GUIs) makes the GUIs construction more and more complicated. It makes the GUIs testing become a challenging problem. In this paper, a framework of component-based library (CBL) for GUI regression testing is proposed. Test components, which encapsulate associated properties, operations and meta-information, are defined as reusable object. Three key processes of CBL are introduced in detail. The first process is the CBL organization structure based on message mechanism. The second process is the test components regeneration guidelines for GUI testing. The third process is to divide test procedure into several phases to improve the testing efficiency. The phases include message segment capture phase, component abstract phase, regenerate test component phase and component-driven testing phase. Experimental results show that CBL model can performance well and the proposed reusable component for GUI regression testing can regenerate a large number of test cases automatically and efficiently.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection for High-Speed Networks Based on Producing System","authors":"Ken Chen, Fei Yu, Cheng Xu, Yan Liu","doi":"10.1109/WKDD.2008.87","DOIUrl":"https://doi.org/10.1109/WKDD.2008.87","url":null,"abstract":"This paper firstly analyzed the front pattern matching algorithm of intrusion detection system, and improved on the pattern matching algorithm. Having immediately analyzed Rete algorithm and aimed at its shortage, the paper introduced the FRete net algorithm on the basis of Rete net algorithm constituting an inference machine based on FRete matching algorithm, which could infer logical suspicious facts. Then the authors discussed and designed an intrusion detection system based on high-speed networks, and finally established a simulation and experiment platform to test the performance of IDS.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Description Logic Based Services Semantic Matching","authors":"Zhixiong Jiang, Leqiu Qian, Y. Lau, Shan Tang","doi":"10.1109/WKDD.2008.47","DOIUrl":"https://doi.org/10.1109/WKDD.2008.47","url":null,"abstract":"A key issue in semantic Web services is semantic matching which is important to facilitate to reuse of Web services. Existing semantic matching technique such as ontology based, do not guarantee fulfilling the preconditions and desired effect, and hence do not guarantee the correctness of the matching results, in this paper we prose a novel semantic matching approach based on service dynamic description logic (SDDL). SDDL is used to present services specification for capturing both static information and dynamic state aspect of service function, and then semantic matching take into account all these aspects to achieve a precise matching. Furthermore not only exact matching, but also various kinds of matching degree are defined.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach","authors":"Xiantao Zhang, Qi Li, S. Qing, Huanguo Zhang","doi":"10.1109/WKDD.2008.135","DOIUrl":"https://doi.org/10.1109/WKDD.2008.135","url":null,"abstract":"Intrusion detection system (IDS) has been introduced and broadly applied to prevent unauthorized access to system resource and data for several years. However, many problems are still not well resolved in most of IDS, such as detection evasion, intrusion containment. In order to resolve these problems, we propose a novel flexible architecture VNIDA which is based on virtual machine monitor (VMM) and has no-intrusive behavior to target system after studying popular IDS architectures. In this architecture, a separate intrusion detection domain (IDD) is added to provide intrusion detection services for all virtual machines. Specially, an IDD helper is introduced to take response to the intrusions according to the security policies. Moreover, event sensors and IDS stub, as the core components of IDS, are separately isolated from target systems, so strong reliability is also achieved in this architecture. To show the feasibility of the VNIDA, we implement a prototype based on the proposed architecture. Based on the prototype, we employed some rootkits to evaluate our VNIDA, and the results shows that VNIDA has the ability to detect them efficiently, even some potential intrusions. In addition, system performance evaluation also shows that VNIDA only introduce less than 1.25% extra overhead.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Electronic Commerce KMS Based on Agent and Ontology","authors":"Ruixue Fu, Zhanhong Xin","doi":"10.1109/WKDD.2008.102","DOIUrl":"https://doi.org/10.1109/WKDD.2008.102","url":null,"abstract":"To extract value of knowledge, the multi-agent architecture of electronic commerce knowledge management system (KMS) based on agent and ontology has been introduced, which includes four major types of agent and one Function Knowledge Agency that deals with each stage of knowledge life cycle. In this architecture, Ontology is used to define a common vocabulary for agents to communicate with one another, and explicitly formalize the domain knowledge. To illustrate the architecture, a simulation work has been done and the results imply that the architecture provides a very efficient method to design electronic commerce KMS with the purposes of flexibility to apply tools, extensibility, and reusable ability of the software components. The objective of this paper is to illustrate the architecture of electronic commerce KMS, and the approach how Agent and Ontology support the electronic commerce KMS.","PeriodicalId":101656,"journal":{"name":"First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}