2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)最新文献

筛选
英文 中文
R.A.R.E.: Round-About Risk Evaluation 迂回风险评估
A.E. Forman
{"title":"R.A.R.E.: Round-About Risk Evaluation","authors":"A.E. Forman","doi":"10.1109/ICADIWT.2008.4664406","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664406","url":null,"abstract":"With risk assessment such a crucial part of any IT operation, it is necessary to re-evaluate some of the methods used to procure genuine responses from those under assessment. Many current risk assessment methodologies are set up to fail from the beginning. When performing a risk assessment, the evaluator is dependent on the integrity of the IT team s/he is questioning as part of the assessment. A new methodology called the Round-About Risk Evaluation (R.A.R.E.), implements techniques to reduce the Social Desirability Bias (SDB) that can lead to an assessment that does not represent the depth of security vulnerabilities. Implementation of R.A.R.E. prior to the start of a new a risk assessment, can be used to help the risk assessment team discover vulnerabilities that might otherwise go unreported.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Storage structures for efficient query processing in a stock recommendation system 股票推荐系统中高效查询处理的存储结构
You-min Ha, Sang-Wook Kim, Sanghyun Park, Seung-Hwan Lim
{"title":"Storage structures for efficient query processing in a stock recommendation system","authors":"You-min Ha, Sang-Wook Kim, Sanghyun Park, Seung-Hwan Lim","doi":"10.1109/ICADIWT.2008.4664358","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664358","url":null,"abstract":"Rule discovery is an operation that uncovers useful rules from a given database. By using the rule discovery process in a stock database, we can recommend buying and selling points to stock investors. In this paper, we discuss storage structures for efficient processing of queries in a system that recommends stock investment types. First, we propose five storage structures for efficient recommending of stock investments. Next, we discuss their characteristics, advantages, and disadvantages. Then, we verify their performances by extensive experiments with real-life stock data. The results show that the histogram-based structure performs best in query processing and improves the performance of other ones in orders of magnitude.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130300696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of architecture and node deployment in Wireless Sensor Network 无线传感器网络结构与节点部署综述
P. Gajbhiye, A. Mahajan
{"title":"A survey of architecture and node deployment in Wireless Sensor Network","authors":"P. Gajbhiye, A. Mahajan","doi":"10.1109/ICADIWT.2008.4664386","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664386","url":null,"abstract":"Wireless sensor networks consist of small nodes with sensing, computation and wireless communication capabilities. Various architectures and node deployment strategies have been developed for wireless sensor network, depending upon the requirement of application. Sensor networks are used in different applications e.g. environmental monitoring, habitat monitoring, home automation, military application etc. In this paper we present survey of state-of-the-art of architecture and node deployment in wireless sensor network. We present the characteristics of the environment in which the sensor networks may deploy. Node deployment in wireless sensor network is application dependent and can be either deterministic or randomized. But in both the cases coverage of interested area is the main issue. We also explain the routing protocols for wireless sensor network.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129792818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
An approach to a Cloud Computing network 云计算网络的一种方法
F. Aymerich, G. Fenu, S. Surcis
{"title":"An approach to a Cloud Computing network","authors":"F. Aymerich, G. Fenu, S. Surcis","doi":"10.1109/ICADIWT.2008.4664329","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664329","url":null,"abstract":"ldquoCloud Computingrdquo is becoming increasingly relevant, as it will enable companies involved in spreading this technology to open the doors to Web 3.0. In this work the basic features of cloud computing are presented and compared with those of the original technology: Grid Computing. The new categories of services introduced will slowly replace many types of computational resources currently used. In this perspective, grid computing, the basic element for the large scale supply of cloud services, will play a fundamental role in defining how those services will be provided. The paper describes the concept of computational resources outsourcing, referred to computational grids and a real application. This work utilises the results by the Cybersar Project managed by the COSMOLAB Consortium (Italy).","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125467214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 246
Hierarchical Intra-Context Handoff Awareness Approach to Personal Recommender Systems: A mobile DTV case study 个人推荐系统的分层上下文内切换感知方法:移动数字电视案例研究
L. Vaguetti, P. Gondim
{"title":"Hierarchical Intra-Context Handoff Awareness Approach to Personal Recommender Systems: A mobile DTV case study","authors":"L. Vaguetti, P. Gondim","doi":"10.1109/ICADIWT.2008.4664339","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664339","url":null,"abstract":"This paper proposes a hierarchical intra-context handoff awareness (HICHA) approach to personal mobile TV recommender systems. The HICHA approach involves a basic hierarchical approach that extends your features to context-aware and intra-context handoff awareness approach. The user model, prediction model and calculate of users interest methods are presented. Moreover, experiments and results using HICHA approach are completed, showing its effectiveness.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An algorithm for reusable uninteresting rules in association rule mining 关联规则挖掘中无趣规则的可重用算法
P. Thongtae, S. Srisuk
{"title":"An algorithm for reusable uninteresting rules in association rule mining","authors":"P. Thongtae, S. Srisuk","doi":"10.1109/ICADIWT.2008.4664326","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664326","url":null,"abstract":"In this paper, we present a new framework for reusable association rule mining based on chi2 and odds ratio. We start at mining the association rules using standard Apriori algorithm. The strong rules are defined as association rules, while the weak rules will be evaluated by our proposed method. Firstly, the weak rules must be converted to 2 times 2 contingency table. We then compute the relationship between variables using chi2 and odds ratio. If the weak rules are related to each other with positive or negative relationship, then the weak rules will also be determined as association rules. Our system is evaluated with experiments on the crime data.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128828379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Social communities detection in Enron corpus using h-Index 基于h-Index的安然语料库社会群体检测
Anton Timofieiev, V. Snás̃el, J. Dvorský
{"title":"Social communities detection in Enron corpus using h-Index","authors":"Anton Timofieiev, V. Snás̃el, J. Dvorský","doi":"10.1109/ICADIWT.2008.4664401","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664401","url":null,"abstract":"Development of modern technologies is expanded with communications possibilities. Electronic systems of communications make possible overcoming of traditional barriers of communication, for example, such as distance. On their basis there are new types of communities which any more have no geographical restrictions. Increasing popularity of electronic communities among which projects LiveJournal, LiveInternet, and also projects popular in Russian-speaking part Internet Mamba, MirTesen, VKontakte, Odnoklassniki, etc., makes as never earlier actual questions on working out of techniques of research of similar social networks. However communications of elements of such communities only on means of electronic communications create difficulties at definition of such communities. There is some question of the specific communities connected with identification and their properties. Nevertheless such communities can be presented graphs, i.e. objects - vertices, and communications channels between them - edges. Thus a number of problems can be solved by means of use of methods from the theory of graphs. In this paper application for such networks of the methods offered for measurement of the importance of scientists work, for the purpose of definition of popularity of objects in community is described and shown. Approach demonstration is made on Enron corpus.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133230026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using an interactive interface to support Web search for improving user experience 使用交互式界面支持Web搜索,以改善用户体验
Jianquan Liu, Hanxiong Chen, K. Furuse, N. Ohbo
{"title":"Using an interactive interface to support Web search for improving user experience","authors":"Jianquan Liu, Hanxiong Chen, K. Furuse, N. Ohbo","doi":"10.1109/ICADIWT.2008.4664346","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664346","url":null,"abstract":"With rapidly developing of the Internet, the current Web search engines are lack of interactivity for advanced users, thus the user experience cannot be satisfied. Exactly, in most of Web search engines, they only return a large number of search result pages, or suggest several correlative words according to their large-scale searching histories at the same time. For instance, Google, Yahoo! and MSN, they are the most popular and well-known search engines in the world. However, they are not enough for the advanced users who require user experience, much more correlative words, or interactive operations applied to returned results such as re-ranking and zooming. To focus on this idea of interactivity, we proposed and implemented an interactive interface to improve user experience for supporting Web search. It is a nice interface supporting dynamically changing re-ranking, related word zooming, and related word emphasizing and deemphasizing. It has been served as online search service recently. Our experimental evaluation confirms its convenience and good online performance.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130997775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信