Reija Nurmeksela, E. Jauhiainen, Airi Salminen, Anne Honkaranta
{"title":"XML document implementation: Experiences from three cases","authors":"Reija Nurmeksela, E. Jauhiainen, Airi Salminen, Anne Honkaranta","doi":"10.1109/ICDIM.2007.4444227","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444227","url":null,"abstract":"Implementing production of XML documents is a rarely discussed topic in academic literature even though it is an important issue in many contemporary organizations. This paper describes findings from three case organizations where different kinds of XML documents were implemented. Our findings suggest that the implementation is a domain-specific task related to various kinds of organizational activities from document authoring to business processes. As expected, the amount and complexity of document types as well as the number of people and organizations involved affect the challenges in the implementation process. Hiding the XML format from the software users and training the end users are important means to reduce the user resistance against structured document authoring and novel tools.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131830233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Peek, D. Terry, Venugopalan Ramasubramanian, Meg Walraed-Sullivan, T. Rodeheffer, Ted Wobber
{"title":"Fast encounter-based synchronization for mobile devices","authors":"Daniel Peek, D. Terry, Venugopalan Ramasubramanian, Meg Walraed-Sullivan, T. Rodeheffer, Ted Wobber","doi":"10.1109/ICDIM.2007.4444314","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444314","url":null,"abstract":"The large and growing number of computing devices used by individuals has caused the challenges of distributed storage to take on increased importance. In addition to desktops and laptops, portable devices, such as cell phones, digital cameras, iPods, and PDAs are capable of storing and sharing data. These devices’ mobility coupled with wireless networking capabilities allows them to opportunistically propagate data to other devices they might encounter, even if connectivity is unplanned and transient. To take advantage of such ad hoc connectivity, devices must have an efficient method for determining which files they hold in common and which versions must be propagated to achieve consistency. This paper presents new techniques for reducing the cost of this data synchronization operation by over an order of magnitude in many situations.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127814360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Citation auctions as a method to improve selection of scientific papers","authors":"J. L. D. L. R. Esteva, B. Szymanski","doi":"10.1109/ICDIM.2007.4444269","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444269","url":null,"abstract":"This paper describes the basis of citation auctions as a new approach to selecting scientific papers for publication. Our main idea is to use an auction for selecting papers for publication through - differently from the state of the art - bids that consist of the number of citations that a scientist expects to receive if the paper is published. Hence, a citation auction is the selection process itself, and no reviewers are involved. The benefits of the proposed approach are two-fold. First, the cost of refereeing will be either totally eliminated or significantly reduced, because the process of citation auction does not need prior understanding of the paper's content to judge the quality of its contribution. Additionally, the method will not prejudge the content of the paper, so it will increase the openness of publications to new ideas. Second, scientists will be much more committed to the quality of their papers, paying close attention to distributing and explaining their papers in detail to maximize the number of citations that the paper receives. Sample analyses of the number of citations collected in papers published in years 1999-2004 for one journal, and in years 2003-2005 for a series of conferences (in a totally different discipline), via Google scholar, are provided. Finally, a simple simulation of an auction is given to outline the behaviour of the citation auction approach.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131410542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-invertible copyright protection of digital images using DWT and SVD","authors":"A. Al-Haj, T. Manasrah","doi":"10.1109/ICDIM.2007.4444264","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444264","url":null,"abstract":"Copyright protection of digital media has become a major concern for owners and providers of digital media such as images, audio, and video products. To provide the required copyright protection, watermarking has recently emerged as a major technology, offering many algorithms and techniques that have different characteristics and effectiveness. In this paper, we propose an imperceptible and robust digital image watermarking algorithm. The algorithm is based on cascading two powerful mathematical transforms; the Discrete Wavelet Transform (DWT) and the Singular Value Decomposition (SVD). The algorithm, unlike most algorithms proposed earlier in the literature, is non-invertible. Simulation results demonstrated the effectiveness of our proposed algorithm and revealed a common misconception regarding the locations at which watermark information should be embedded to achieve robust and non-invertible SVD-based watermarking.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130603369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The OntoNL Semantic Relatedness Measure for OWL ontologies","authors":"A. Karanastasi, S. Christodoulakis","doi":"10.1109/ICDIM.2007.4444245","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444245","url":null,"abstract":"An effect of the growing importance of the semantic Web used for sharing knowledge over the Internet was the development and publishing of many ontologies in different domains. This led to the need of developing mechanisms for capturing the semantics of the ontologies. In this paper, we introduce the OntoNL semantic relatedness measure, a fully automated way of measuring, in an asymmetric way, semantic relatedness between concepts of domain ontologies. We have developed metrics to guide the automation of the procedure by using feedback from an extensive evaluation with human subjects.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124576600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding the evolution process of program source for investigating software authorship and plagiarism","authors":"Jeong-Hoon Ji, Su-Hyun Park, G. Woo, Hwan-Gue Cho","doi":"10.1109/ICDIM.2007.4444207","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444207","url":null,"abstract":"This paper addresses the evolution process of program source codes to establish the framework for software authorship identification. Since program code cheating is getting serious in academic institutions, we will be able to apply the software authorship identification tool as a detection tool for code plagiarism. The main contribution of our work is twofold. First, we have devised new asymmetric distance measure to compute the distance of authorship between two different programs. Second, we have proposed an algorithm to construct the evolution tree(hylogenetic tree) for a set of similar program clones. For the experiment we have gathered two set of codes: a set of assignment programs and another program set which have been submitted to the ICPC, an international programming contests. Our experiment showed that our distance measure for program sources has successfully identified the code authorship and has also reliably detected plagiarized programs. This experiment has showed a strong possibility that the proposed construction algorithm for phylogenetic forest can be used to trace the evolution(improving) process of software. This paper shows the confidence of the authorship identification and plagiarism detection can be interchangeably applied for both these purposes in student assignment program domain.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124652117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating engineering processes in PLM context","authors":"M. Messaadia, A. Sahraoui","doi":"10.1109/ICDIM.2007.4444257","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444257","url":null,"abstract":"This paper concentrates on modeling systems engineering (SE) processes contained within the product management lifecycle (PLM). Both SE and PLM are concerned with managing the multiple views and interrelationships of system information to maintain consistency, so that it can be applied to more than one product (C. Bock, 2005). Our work focuses primarily on the system design, product realization, and technical evaluation processes. The core concept is to make use of the available SE tools and standards, to develop a model based on SysML language, where the PLM ensures the processes are successfully linked.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129879090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accessibility and scalability in collaborative eCommerce environments","authors":"M. Khoury, S. Shirmohammadi","doi":"10.1109/ICDIM.2007.4444312","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444312","url":null,"abstract":"The Much advancement has lately occurred in eCommerce systems’ interfaces. Product specifications listings combined with pictures is no longer considered the benchmark for eCommerce interfaces. Albeit commercial websites haven’t ventured in these developments, academic research has tried, through this progression, to mimic the real-life shopping experience. Shopping in real-life is a social experience with other components attached to it: customers consult with experts and shop in groups benefiting from others’ opinions. These aspects, when lacking, can lead to reduction in sales. In this paper, we build on a collaborative eCommerce system. The system adopts concepts from virtual environments, allowing customers to interact with three-dimensional models of the items of interests in the virtual shop, as well as share those items with other customers or ask for expert opinions, in real-time. Our system addresses accessibility, by using Macromedia Shockwave, a widely deployed player, and therefore avoids the need of unusual plug-ins, such as VRML viewers. The system also addresses scalability, by using a peer-to-peer communications architecture to support a number of geographically dispersed users on the Internet simultaneously.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128655524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive modeling in XML compression","authors":"Olli Luoma, J. Teuhola","doi":"10.1109/ICDIM.2007.4444283","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444283","url":null,"abstract":"Since its advent, the Extensible Markup Language (XML) has gained tremendous popularity in many different application areas. However, XML data is generally very verbose and redundant, and thus it requires a lot of disk space to store and bandwidth to transfer. To overcome this problem, many methods for compressing XML documents have been proposed. In general, data compression requires a model which is used to predict the next symbol in the data. In this paper, we compare different models suitable for XML compression. We also present a novel modeling method and measure the information content in a set of XML documents using different modeling methods.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129560828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Goudos, Vassilios Peristeras, Nikos Loutas, K. Tarabanis
{"title":"A public administration domain ontology for semantic discovery of eGovernment services","authors":"S. Goudos, Vassilios Peristeras, Nikos Loutas, K. Tarabanis","doi":"10.1109/ICDIM.2007.4444233","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444233","url":null,"abstract":"In this paper we present a top level public administration (PA) domain ontology. For this purpose we employ the generic public service object model of the governance enterprise architecture (GEA) providing PA domain specific semantics. We represent this service model using the Web ontology language (OWL). This domain ontology may serve as the knowledge base for eGovernment semantic Web applications. A sample application is presented that finds the public services that can be executed by a citizen based on his/hers profile using semantic discovery. The input to the application consists of the user profile, while the output returned consists of the public services that match the specified profile.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125664968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}