{"title":"Automated and scheduled maintenance of digital library collections","authors":"W. Osborn, Steve Fox","doi":"10.1109/ICDIM.2007.4444199","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444199","url":null,"abstract":"In this paper, we propose a strategy for the automated and scheduled maintenance of a digital library collection. Existing systems require the user either to add new data manually to a collection, or to have programming knowledge in order to use existing application programming interfaces (APIs) in order to automate scheduled collection updates. We incorporate a scheduling module into the Greenstone digital library software, which allows the user to set up scheduled and automated building of a collection at periodic intervals. This module interacts with the task scheduler on the host platform, such as Linux. Windows and Mac OS X, thereby making it a simple yet powerful tool for scheduled collection maintenance.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"738 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incentives for resource sharing in self-organized communities: From economics to social psychology","authors":"P. Antoniadis, B. L. Grand","doi":"10.1109/ICDIM.2007.4444315","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444315","url":null,"abstract":"In this position paper we analyze the benefits of enabling virtual communities to self-organize and introduce a novel research direction for providing incentives, required in this context, for resource sharing and cooperation. We argue that the social aspect, which is missing from today’s peer-to-peer (p2p) systems, should be seen both as a goal and a means for self-organized virtual communities to be built and fostered. Hence, we propose that the ongoing research efforts for designing effective incentive mechanisms in p2p systems, based on principles from game theory, should be directed towards a more sociological/psychological approach. We also provide some possible first steps towards this direction.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131560457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting multi-evidence from multiple user’s interests to personalizing information retrieval","authors":"L. Tamine, M. Boughanem, N. Zemirli","doi":"10.1109/ICDIM.2007.4444192","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444192","url":null,"abstract":"The goal of personalization in information retrieval is to tailor the search engine results to the specific goals, preferences and general interests of the users. We propose a novel model that considers the user's interests as sources of evidence in order to tune the accuracy of documents returned in response to the user query. The model's fundation comes from influence diagrams which are extension of Bayesian graphs, dedicated to decision-making problems. Hence, query evaluation is carried out as an inference process that aims to computing an aggregated utility of a document by considering its relevance to the query but also the corresponding utility with regard to the user's topics of interest. Experimental results using enhanced TREC collections indicate that our personalized retrieval model is effective.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134314041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of least frequent item sets in association discovery","authors":"Rani J. Swargam, M. Palakal","doi":"10.1109/ICDIM.2007.4444226","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444226","url":null,"abstract":"Advances in commercial and scientific data collection have generated a flood of data which has triggered the need to turn such data into useful information and knowledge to identify novel, potentially useful patterns in data stored in databases. This work presents the development, implementation and application of an adaptive apriori algorithm for mining large datasets focusing on extracting interesting associations rules for less frequent item sets. The relevance of the adaptive apriori algorithm has been studied with respect to the set of data that was obtained by applying the transitive closure property among objects obtained from the biomedical scientific literature where both frequent and infrequent events need to be detected. Three adaptive apriori association rule mining methods, the weight induced apriori association rule mining (WIAARM), weight and significance induced apriori association rule mining (WSIAARM) and significance induced apriori association rule mining (SIAARM) are presented to effectively prune and extract meaningful association rules. These rules were applied on a large set of biological entity-entity association records and the results indicated that both WIAARM and WSIAARM were able to discover item sets with low and high frequency.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of multiple target network storage access using multi-routing VPN connections","authors":"Nozomi Chishima, Saneyasu Yamaguchi, M. Oguchi","doi":"10.1109/ICDIM.2007.4444277","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444277","url":null,"abstract":"As the introduction of SAN progresses for the purpose of the storage management cost reduction, iSCSI is expected as a representative of IP-SAN that uses IP network. However, SAN is mostly used only in the server site currently. Thus we have claimed iSCSI can be employed in a WAN environment using VPN, as well as in a local environment. In this paper, the behavior of the TCP Congestion Window is observed and the performance of the system is evaluated when iSCSI access through multiple connections is performed using a multi-routing function of a VPN router. Furthermore, we have examined the iSCSI access method with mutiple connections on VPN when a parallel storage system is used as Target of network storage.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of replica assisting and speed adjustment for service-aware horizontal data migration on autonomous disks","authors":"D. Kobayashi, H. Yokota","doi":"10.1109/ICDIM.2007.4444279","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444279","url":null,"abstract":"We have previously proposed Autonomous Disks System as a dependable and high-performance networked parallel storage system. The system has function of load balancing by online horizontal data migration. However, the migration causes a reduction of system availability by insensitively utilizing of system resources for massive data transfers. Thus we have also proposed Replica-assisted Migration, which solve the problem by using replica data for data redundancy. In this paper we show the efficiency of this method with experimental results on simulation program, comparing to speed adjusting method which is widely used for service-aware data migration.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128737498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Makoto Yui, Jun Miyazaki, Shunsuke Uemura, Hirokazu Kato
{"title":"Efficient XML storage based on DTM for read-oriented workloads","authors":"Makoto Yui, Jun Miyazaki, Shunsuke Uemura, Hirokazu Kato","doi":"10.1109/ICDIM.2007.4444282","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444282","url":null,"abstract":"We propose an XML storage scheme based on Document Table Model (DTM) which expresses an XML document as a table form. When performing query processing on large scale XML data, XML storage schemes on secondary storage and their access methods greatly affect the entire performance. For this reason, we developed an XQuery processing scheme in which an XML document is internally represented as a set of DTM blocks and can be directly stored on secondary storage. Our scheme is tailored for read-oriented workloads, and an XML document is stored on disks as arrays of nodes. We analyzed the actual data access patterns to DTM appeared in processing XML queries, and employed the combination of informed prefetching and scan-resistant buffer management based on the analysis. Our experimental results showed that our storage scheme outperforms competing schemes with respect to I/O-intensive workloads, and our sophisticated prefetching and caching increase overall throughput without significant drawbacks.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jérôme Kunegis, A. Lommatzsch, Martin Mehlitz, S. Albayrak
{"title":"Assessing the value of unrated items in collaborative filtering","authors":"Jérôme Kunegis, A. Lommatzsch, Martin Mehlitz, S. Albayrak","doi":"10.1109/ICDIM.2007.4444225","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444225","url":null,"abstract":"In collaborative filtering systems, a common technique is default voting. Unknown ratings are filled with a default value to alleviate the sparsity of rating databases. We show that the choice of that default value represents an assumption about the underlying prediction algorithm and dataset. In this paper, we empirically analyze the effect of a varying default value of unrated items on various memory-based collaborative rating prediction algorithms on different rating corpora, in order to understand the assumptions these algorithms make about the rating database and to recommend default values for them.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114876530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Souer, Paul Honders, J. Versendaal, S. Brinkkemper
{"title":"Defining operations and maintenance in web engineering: A framework for CMS-based Web applications","authors":"J. Souer, Paul Honders, J. Versendaal, S. Brinkkemper","doi":"10.1109/ICDIM.2007.4444261","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444261","url":null,"abstract":"Content management systems provide a modern method of Web engineering to improve development speed and maintenance effectiveness. Organizations increasingly use these content management systems to leverage their Web applications. However, organizations lack the organizational processes and structure to effectively maintain content management system-based Web applications. In this paper, we provide a framework for the operation and maintenance phase of Web engineering, consisting of guidelines for managing Web content management systems. It includes processes for Web content management on a strategic, tactical, and operational level. The framework is validated through a case study at an inter-municipal cooperative union.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. MacCormac, F. Mtenzi, M. Deegan, B. O'Shea, C. Shoniregun
{"title":"Towards local resource redirection across thin client protocols","authors":"D. MacCormac, F. Mtenzi, M. Deegan, B. O'Shea, C. Shoniregun","doi":"10.1109/ICDIM.2007.4444218","DOIUrl":"https://doi.org/10.1109/ICDIM.2007.4444218","url":null,"abstract":"In this paper we discuss the design, implementation and testing of amount, a package to support the use of client side hot-pluggable storage devices across thin client protocols in a Linux environment. Many third level institutions utilise thin client and remote access protocols, and as the use of portable storage devices continues to increase, there is a strong case for the development of such a tool. Several existing thin client implementations lack the ability' to manipulate client side file systems when working on the server side, and consequently restrict users productivity. By modifying the existing thin client computing model and creating a supplemental package for existing thin client protocols, we can eliminate these barriers, and support redirection of local peripheral devices from the client to the server. While existing support for local peripheral redirection is often platform or protocol dependent, our approach is independent of either. Moreover, we demonstrate that our approach improves on existing implementations in certain aspects of performance.","PeriodicalId":198626,"journal":{"name":"2007 2nd International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129107910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}