Proceedings. 2003 International Conference on Cyberworlds最新文献

筛选
英文 中文
Web agents with a three-stage information filtering approach 具有三阶段信息过滤方法的Web代理
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253464
K. Sim
{"title":"Web agents with a three-stage information filtering approach","authors":"K. Sim","doi":"10.1109/CYBER.2003.1253464","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253464","url":null,"abstract":"With ever-increasing number of Web sites, users face the challenge of locating, as well as filtering, browsing, and monitoring information of astronomical magnitude. While there are many extant search engines that assist users in locating URLs, they often return an overwhelmingly large number of information sources for a query, and the (time-consuming but perhaps interesting) task of browsing Web sites rests heavily on users. This article presents detailed designs of Web agents that assist users in browsing and filtering information in Web sites. In engineering Web browsing agents (WBAs), the contributions of this research include: (1) devising a 3-stage information filtering approach that determines the relevance of Web pages by detecting evidence phrases (EP) constructed from WORDNET, counting the frequencies of EP and considering the nearness among keywords; and (2) devising a relevance metric to measure the relatedness of evidence phrases. Favorable experimental results show that WBAs are successful in filtering relevant information in many instances. Discussions on how different word senses affect the information filtering approach are also given.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132143599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Feature maps: a new approach in hierarchical interpretation of images 特征映射:图像分层解释的一种新方法
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253461
A. Sluzek
{"title":"Feature maps: a new approach in hierarchical interpretation of images","authors":"A. Sluzek","doi":"10.1109/CYBER.2003.1253461","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253461","url":null,"abstract":"The paper introduces hierarchical image transformations that can be used for detecting various image features of gradually increased complexity. The major prospective application of the method is in (semi-) autonomous vision-guided robotic systems and, therefore, the local operators that can be prospectively hardware-implemented are the core component of the proposed algorithms. A feature map is a grey-level digital image with a vector attached to each pixel. Pixel intensities represent \"the feature intensity\", i.e. the estimated confidence that a feature of interest is located at the pixel. The vector components are characterizing the feature configuration. The low-level \"intensity map\" is the original grey-level image with the \"feature intensity\" being just the brightness value. A transformation from the current feature map to the map of a higher level is obtained by applying a local operator (with a circular scanning window). For each location of the window, the operator determines the template instance of a higher-level feature prospectively existing at this location. Then, the template is matched to the actual content of the window and - based on their similarity - the feature intensity value for the higher-level map pixel is determine. The associated vectors are containing the configuration parameters of the templates extracted by the operator. The paper contains the theoretical foundations of the proposed method, but exemplary results illustrating the method's principles are also provided.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127419436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Technology development trends for cyber civilization 网络文明的技术发展趋势
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253433
A. Patki, M. Kulkarni, S. Sivasubramanian, Dhanvanti D. Patki
{"title":"Technology development trends for cyber civilization","authors":"A. Patki, M. Kulkarni, S. Sivasubramanian, Dhanvanti D. Patki","doi":"10.1109/CYBER.2003.1253433","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253433","url":null,"abstract":"This paper discusses the applications of soft computing technology for developing and implementing information technology projects required for cyber civilization era. The technological requirements for facilitating the systems development along with the initial experience obtained through the case of MISNOS technology based product development are discussed.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117191540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Disappearing computers, social actors and embodied agents 正在消失的电脑、社会行动者和实体代理人
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253445
A. Nijholt
{"title":"Disappearing computers, social actors and embodied agents","authors":"A. Nijholt","doi":"10.1109/CYBER.2003.1253445","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253445","url":null,"abstract":"Presently, there are user interfaces that allow multimodal interactions. Many existing research and prototype systems introduced embodied agents, assuming that they allow a more natural conversation or dialogue between user and computer. Here we will first take a look at how in general people react to computers. We will look at some of the theories, in particular the CASA (\"Computers Are Social Actors\") paradigm, and then discuss how new technology, for example ambient intelligence technology, needs to anticipate the need of humans to build up social relationships. One way to anticipate is to do research in the area of social psychology, to translate findings there to the human-computer situation and to investigate technological possibilities to include human-human communication characteristics in the interface. For that reason we will discuss embodied conversational agents, the role they can play in human-computer interaction (in face-to-face conversation), in ambient intelligence environments and in virtual communities.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121543595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Law and regulation in cyberspace 网络空间法律法规
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253432
Yee Fen Lim
{"title":"Law and regulation in cyberspace","authors":"Yee Fen Lim","doi":"10.1109/CYBER.2003.1253432","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253432","url":null,"abstract":"This paper analyses the issue of Internet regulation and the role of law as a regulatory medium. It will firstly argue that it is necessary for the Internet to be regulated as without regulation, the rights of users in the real world and in the cyberworld will be compromised and suppressed and the laws of the physical world will be undermined. An unregulated cyberspace has the potential to compromise legal systems, stifle activity in cyberspace and erode community values. Two key models of regulation will be discussed, namely the judicial model and the socio-normative model. It will be argued that neither offers satisfactory solutions. The paper will argue that a workable model of regulation in cyberspace is one that encompasses elements of law, social norms and Internet architecture.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The empty museum. Multi-user interaction in an immersive and physically walkable VR space 空荡荡的博物馆。多用户交互在一个身临其境和物理步行的虚拟现实空间
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253488
L. Hernández, J. Taibo, A. Seoane, Rubén López, Rocío López
{"title":"The empty museum. Multi-user interaction in an immersive and physically walkable VR space","authors":"L. Hernández, J. Taibo, A. Seoane, Rubén López, Rocío López","doi":"10.1109/CYBER.2003.1253488","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253488","url":null,"abstract":"Until quite recently, virtual reality systems consisted of fixed devices which enabled the user to feel immersed in a spot of the virtual space by means of the adequate hardware. The recent emergence of wireless systems for motion capture, together with the increase in graphic power of laptops, and the generalisation of wireless networks has allowed the appearance of the first systems in which at last the user is able to walk physically within a given space framed in the real one, and containing the objects and elements of the virtual space. Some examples of this hybrid space have already been accomplished worldwide. However, beyond the technical problems with the development of these systems, we must bear in mind the types of contents to be shown, making the most of the possibilities offered by the fact that the user him/herself is the pointer in this kind of virtual reality, while the space itself is the interface. The authors have recently developed a system similar to the ones described. This is a totally immersive, walkable and wireless system called the Empty Museum. The paper outlines its enlargement with the purpose of making it simultaneously usable by several persons. Besides, an example of content is provided which has been specifically designed in order to be experienced in multi-user mode with this equipment: the Virtual Art Gallery.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Parallel algorithm for mining fuzzy association rules 模糊关联规则挖掘的并行算法
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253467
Baowen Xu, Jianjiang Lu, Yingzhou Zhang, Lei Xu, Huowang Chen, Hongji Yang
{"title":"Parallel algorithm for mining fuzzy association rules","authors":"Baowen Xu, Jianjiang Lu, Yingzhou Zhang, Lei Xu, Huowang Chen, Hongji Yang","doi":"10.1109/CYBER.2003.1253467","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253467","url":null,"abstract":"The principle and steps of the algorithm for mining fuzzy association rules is studied, and the parallel algorithm for mining fuzzy association rules is presented. In this parallel mining algorithm, quantitative attributes are partitioned into several fuzzy sets by the parallel fuzzy c-means algorithm, and fuzzy sets are applied to soften the partition boundary of the attributes. Then, the parallel algorithm for mining Boolean association rules is improved to discover frequent fuzzy attributes. Last, the fuzzy association rules with at least fuzzy confidence are generated on all processors. The parallel mining algorithm is implemented on the distributed linked PC/workstation. The experiment results show that the parallel mining algorithm has fine scaleup, sizeup and speedup.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125425689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Negotiation paradigms for e-commerce agents using knowledge beads methodology 基于知识珠方法论的电子商务代理谈判范式
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253466
Zhuang Yan, S. Fong, Meilin Shi
{"title":"Negotiation paradigms for e-commerce agents using knowledge beads methodology","authors":"Zhuang Yan, S. Fong, Meilin Shi","doi":"10.1109/CYBER.2003.1253466","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253466","url":null,"abstract":"The technology of using computer Agents for B2B trading in Cyberworld is getting prevalent nowadays. Much of the research work has been done on the models, architectures and service provision in the past. However, agent negotiation remains as a challenge in making the whole trading process fully automated, due to its fuzzy and complex nature. The lack of interoperability and knowledge-reuse that limits to case-based, pose certain drawback. An object-oriented ontology-based Knowledge Bead (KB) method for knowledge representation has been proposed (S. Fong et al., 2002). It was designed as a foundation to enable agent negotiation in e-trading environment in a systematic way. This paper continues the research work of KB on formulating its theorems and methodology. Some typical negotiation paradigms using appropriate strategies based on the KB's methodology are presented as well. In particular, KB's taxonomies and their use in the whole negotiation process are discussed. The main advantage of this approach is the ability to describe the deal that is under negotiation in an object-oriented format which in turn allows reasoning, optimizing, knowledge reuse and management.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"158 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114030574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dematerialised data and human desire: the Internet and copy culture 非物质化数据与人类欲望:互联网与复制文化
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253431
M. Allen
{"title":"Dematerialised data and human desire: the Internet and copy culture","authors":"M. Allen","doi":"10.1109/CYBER.2003.1253431","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253431","url":null,"abstract":"Since Licklider in the 1960s influential proponents of networked computing have envisioned electronic information in terms of a relatively small (even singular) number of 'sources', distributed through technologies such as the Internet. Most recently, Levy writes, in Becoming Virtual, that \"in cyberspace, since any point is directly accessible from any other point, there is an increasing tendency to replace copies of documents with hypertext links. Ultimately, there will only need to be a single physical exemplar of the text\". Hypertext implies, in theory, the end of 'the copy', and the multiplication of access points to the original. But, in practice, the Internet abounds with copying, both large and small scale, both as conscious human practice, and also as autonomous computer function. Effective and cheap data storage that encourages computer users to keep anything of use they have downloaded, lest the links they have found, 'break'; while browsers don't 'browse' the Internet - they download copies of everything to client machines. Not surprisingly, there is significant regulation against 'copying' regulation that constrains our understanding of 'copying' to maintain a legal fiction of the 'original' for the purposes of intellectual property protection. In this paper, I will firstly demonstrate, by a series of examples, how 'copying' is more than just copyright infringement of music and software, but is a defining, multi-faceted feature of Internet behaviour. I will then argue that the Internet produces an interaction between dematerialised, digital data and human subjectivity and desire that fundamentally challenges notions of originality and copy. Walter Benjamin noted about photography: \"one can make any number of prints [from a negative]; to ask for the 'authentic' print makes no sense\". In cyberspace, it makes no sense to ask which one is the copy.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhanced approaches of content management for the collaborative semiconductor business 协作半导体业务内容管理的增强方法
Proceedings. 2003 International Conference on Cyberworlds Pub Date : 2003-12-03 DOI: 10.1109/CYBER.2003.1253476
H. Jang, Young Joong Lee, Y. Han, Chung-sam Ahn, J. M. Choi
{"title":"Enhanced approaches of content management for the collaborative semiconductor business","authors":"H. Jang, Young Joong Lee, Y. Han, Chung-sam Ahn, J. M. Choi","doi":"10.1109/CYBER.2003.1253476","DOIUrl":"https://doi.org/10.1109/CYBER.2003.1253476","url":null,"abstract":"Over the last several years in the semiconductor business, types of the semiconductor products have been dramatically diversified, and its business has expanded on a large scale. As a result, technology of advanced processes and devices has been more sophisticated, and its information produced has been too huge to be well managed. Therefore there have been many difficulties in creating and sharing information and knowledge necessary for developing and manufacturing products, with traditional processes and existing information systems. Eventually such problems caused additional lead-time of product and technology development, and had it lagged behind other competitors, being an obstacle to reduce costs and time to market. In order to solve the problem, a new classification of contents is established so that technology and information necessary for product development and production can be composed of knowledge chain. Further, the collaborative content management system base on the enterprise-wide knowledge chain is developed. This paper discusses models of designed system and its construction approach.","PeriodicalId":130458,"journal":{"name":"Proceedings. 2003 International Conference on Cyberworlds","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121016698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信