{"title":"An approach for semantic query mapping on the heterogeneous web data sources","authors":"Abdolreza Hajmoosaei, S. A. Kareem","doi":"10.1109/ICADIWT.2008.4664409","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664409","url":null,"abstract":"There are a lot of valuable data on the web that users may need to improve their decision making process. The answer of user query often exists in multiple Web data sources. The extraction and combination of answers of user queries from different Web data sources often fails because of syntax and semantic heterogeneity between user queries and web data sources. The retrieval and extraction of these answers from the different web data sources impose a need for queries to be syntactically and semantically mapped to Web sources query languages. In this paper, we focus on semantic heterogeneity among user query terms and web data sources terms. We propose an approach for the semantic mapping of user query terms to web data sources terms.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123292692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Achieving data warehouse quality using GDI approach","authors":"A. Gosain, J. Singh","doi":"10.1109/ICADIWT.2008.4664399","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664399","url":null,"abstract":"Data warehouses are complex systems that have to deliver highly-aggregated data from heterogeneous sources to decision makers. It is essential that we can assure the quality data warehouse in terms of data as well as the services provided by it. Therefore, we should use methods, models, techniques and tools to help us in designing and maintaining high quality DWs. In this paper we outline a general methodological framework for the quality of data warehouse systems, adapting the goal-decision-information approach. This model considers the quality of conceptual models to reach at specific decisions in data warehousing environment.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User interface design practices in simple single page web applications","authors":"Ladislav Doležal, Christian Kollmann","doi":"10.1109/ICADIWT.2008.4664349","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664349","url":null,"abstract":"The single page Web design is an extreme approach of designing the Web applications. It limits the structure of the application to fit into only one single physical Web page and suppresses the further navigational capabilities. Such limitations strongly affect the design process of the application development, putting more emphasis on the design of the user interface components. We present and discuss the list of five higher level user interface design principles with implementation examples that make the development process easier and bring additional application usability.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-commerce privacy and trust: Overview and foundation","authors":"A.E. Forman","doi":"10.1109/ICADIWT.2008.4664316","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664316","url":null,"abstract":"The proliferation of the Internet has given rise to electronic commerce or e-commerce. Each year consumer privacy becomes more of an issue. There are a number of actions that online merchants can take to give a sense of security to their customers in addition to actions that consumers can take to ensure their own privacy. This review is an overview of the issues found in the e-commerce literature and is provided as a foundation for future research regarding the issues of privacy and trust in e-commerce.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123421251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"JCAM: The Joined Clustered Access Method","authors":"A. Sleit, W. Almobaideen, M. Smadi, M. Qatawneh","doi":"10.1109/ICADIWT.2008.4664360","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664360","url":null,"abstract":"Spatial data management has been an active area of intensive research for more than two decades. In order to support objects in a database system, several issues should be taken into consideration including indexing and efficient query processing. Several indexing techniques have been proposed in the literature. Most of the existing indexing mechanisms are designed for spatial selection but may not be efficient for join operations. In this paper, a new structure is proposed to handle join operations between spatial data sets, called the joined clustered access method (JCAM). JCAM is pre-joined index dedicated for answering spatial join queries designed to enhance the response time of spatial join queries by decreasing the number of disk accesses. JCAM is a secondary index used to represent relationships between data sets as a colored-graph. Experiments show that JCAM outperforms the RTJ algorithm which is based on R-tree but requires more construction time.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124814168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the performance of multi-homed networks","authors":"H. Farhat","doi":"10.1109/ICADIWT.2008.4664385","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664385","url":null,"abstract":"We present a simple and efficient method to optimize the outgoing bandwidth in a multi-homed autonomous systems (AS). This method rely on the properties of the border gateway protocol (BGP) and a simple heuristic to balance the load on all egress links. Taking advantage of the fact that only a small number of ASes are responsible for most traffic we show how the proposed technique is deployed. The results of a simulation on data collected from a real networks shows that the proposed method is promising.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of current routing protocols for ad hoc underwater acoustic networks","authors":"Omar O. Aldawibi","doi":"10.1109/ICADIWT.2008.4664387","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664387","url":null,"abstract":"It is well known that underwater acoustic communications are unlike radio communications, where data are transmitted via electromagnetic waves. In contrast, acoustic waves are used in underwater channels, so communications in an underwater acoustic environment must overcome the combination of extreme conditions that adversely impact throughput, latency, and capacity. In underwater acoustic networks the physical layer considerations include multipath distortion, signal attenuation, frequency-selective fading, and long propagation delay. Additionally, the delay also severely affects network layer protocols that must provide efficient routing of traffic through the network. This paper studies and investigates what are the best routing protocols that give better performance for underwater acoustic networks using built-in routing protocols in the NS2 and the developed media access protocol for underwater acoustic networks. The developed system will be used extensively in complex simulations to contribute to ad hoc underwater acoustic networks that maximize throughput and reliability, and minimize delay and power consumption.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115538339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realizing process interoperability using E-Mail communication","authors":"Thomas Burkhart, Dirk Werth, Peter Loos","doi":"10.1109/ICADIWT.2008.4664413","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664413","url":null,"abstract":"More than 99% of European enterprises are SMEs (small and medium-sized enterprises). While in the current market situation collaboration is evolving to an indispensable key factor of success, research is yet to produce results which can be used by SMEs. This paper introduces an interoperability approach in the context of the European Commius Project which enables SMEs collaborate easily on the level of process interoperability. The Commius solution will dock onto existing e-mail structures and enrich incoming e-mails with additional information dependant upon its content and provide recommendations of expedient further steps to process the e-mail. A first picture of the Commius process interoperability layer architecture will be drawn. Furthermore proposals to adapt Commius to the specific processes every SME has, in a simple way, are being exposed.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115073740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architectures for small mobile communication devices and performance analyses","authors":"H. Gumuskaya, A.V. Gurel, M. Nural","doi":"10.1109/ICADIWT.2008.4664369","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664369","url":null,"abstract":"In this paper, software architectures for small mobile communication devices are proposed for system independent and portable mobile applications and systems for a context-aware system. The wireless network packet measurements and architecture performance analyses are given for the proposed architectures. In these analyses, using basic TCP socket connections, RMI distributed object technology and service oriented approaches, which are the representatives of three important generations in distributed systems, client/server architectures are studied and the time analyses for different wireless network connections are presented. As a result of these analyses, software architectures and technologies which can be used on todaypsilas mobile devices for different applications are evaluated.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125496930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A splog filtering method based on string copy detection","authors":"T. Takeda, A. Takasu","doi":"10.1109/ICADIWT.2008.4664407","DOIUrl":"https://doi.org/10.1109/ICADIWT.2008.4664407","url":null,"abstract":"Recently many people publicize their blogs and the blogosphere becomes an important information source. It is used for various purposes such as analyzing trends and reputations, marketing, etc. One problem of blogosphere is spam like e-mails and web links. There are many spam blogs (splogs) that are generated to make users to access specific sites. This paper proposes a splog filtering method. Splog is usually generated automatically by copying words and phrases from other documents. Therefore, the proposed method detects strings appearing in multiple blogs and uses a copy rate of strings as a key feature for splog filtering. To evaluate the proposed method, we constructed an evaluation corpus by gathering blogs randomly during a certain period of time and manually judged whether each blog is splog or not. The experiment using this corpus reveals several features of splog filtering by copy string detection. The proposed method uses the suffix array for copied substring detection and it can judge each blog with time complexity of (m2 log n) where n and m denote total length of documents used for copy detection and the lengths of the blog to be judged, respectively.","PeriodicalId":189871,"journal":{"name":"2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124782857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}