Proceedings. 13th International Workshop on Database and Expert Systems Applications最新文献

筛选
英文 中文
Data privacy, US common practices 数据隐私,美国惯例
Noushin Ashrafi, Jean-Pierre Kuilboer
{"title":"Data privacy, US common practices","authors":"Noushin Ashrafi, Jean-Pierre Kuilboer","doi":"10.1109/DEXA.2002.1045945","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045945","url":null,"abstract":"The advancement in Internet technologies has led to high expectations about the growth of e-commerce and e-business. Predictions, however, have not materialized; E-commerce represents less that 1% of the total trade and signs of a sharp growth are not in sight. Slow growth of e-commerce has often been attributed to the lack of trust in either the medium (Internet) or the agents involved in the transaction (organizations). Our research is aimed at providing some insights as what privacy policies are and how they are practiced in the US. To this effect we have surveyed firms in multiple sectors that have been listed as most active in trading online. Our findings indicate that most interactive companies have published privacy policies (PPP). However, the percentage of companies with PPP varies based on their type of business, size, and whether the company is 100% interactive or it also has brick and mortar presence.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"140 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The PROMOTE/sup /spl reg// prototype: a Meta/sup 2/Model based process oriented KMS promotion /sup /spl reg// prototype:一个基于Meta/sup 2/Model的面向过程的KMS
D. Karagiannis, R. Woitsch
{"title":"The PROMOTE/sup /spl reg// prototype: a Meta/sup 2/Model based process oriented KMS","authors":"D. Karagiannis, R. Woitsch","doi":"10.1109/DEXA.2002.1045890","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045890","url":null,"abstract":"This article introduces the EC-project PROMOTE/sup /spl reg// (IST-1999-11658) where an overall framework for process-oriented knowledge management, starting at modelling knowledge intensive business processes in a Web-environment and focusing on the knowledge management processes such as identification, access, storage, distribution and evaluation where knowledge is being developed. The main focus of this text is the analysis of requirements of such a process oriented model based knowledge management system (KMS) and the system architecture of the PROMOTE/sup /spl reg// prototype. The application scenario \"Quality Management for Software Development\" is introduced to depict the realisation of the KMS.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy of trust in similarity estimation through secure computations 通过安全计算实现相似度估计中的信任隐私
J. Carbo, J. M. Molina, J. Davila
{"title":"Privacy of trust in similarity estimation through secure computations","authors":"J. Carbo, J. M. Molina, J. Davila","doi":"10.1109/DEXA.2002.1045947","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045947","url":null,"abstract":"Current e-commerce applications provide a binary definition of trust depending on whether requirements are satisfied or not. However, trust can be seen as a more general and subjective concept tightly linked to reputation. The subjectivity of the evaluations of certain behaviours justifies this kind of trust. We intend agents to manage subjective trust as humans do, in a vague and abstract way, as a fuzzy concept. In this paper we extend our previous work about the introduction of newcomers into an already running agent system. Because of the economical and strategic value of the trust-related information exchanged in such e-commercial scenarios, access to this information should be restricted to a certain group of close agents. Agents were grouped in cooperative clusters according to similarity of opinions about others. Specifically this paper evaluates the privacy of these opinions while similarity can be easily estimated. The results of this evaluation will justify the use of secure computations in the introduction of newcomers.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122930053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing a curious negotiator 设计一个好奇的谈判者
J. Debenham, S. Simoff
{"title":"Designing a curious negotiator","authors":"J. Debenham, S. Simoff","doi":"10.1109/DEXA.2002.1045974","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045974","url":null,"abstract":"In negotiation the exchange of contextual information is as important as the exchange of specific offers. The curious negotiator is a multiagent system with three types of agent. Two negotiation agents, each representing an individual, develop consecutive offers, supported by information, whilst requesting information from its opponent. A mediator agent, with experience of prior negotiations, suggests how the negotiation may develop. A failed negotiation is a missed opportunity. An observer agent analyses failures looking for new opportunities. The integration of negotiation theory and data mining enables the curious negotiator to discover and exploit negotiation opportunities. Trials will be conducted in electronic business.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117342389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Knowledge-based self-support system for corporate users 基于知识的企业用户自助系统
Franck Noël, K. Delic
{"title":"Knowledge-based self-support system for corporate users","authors":"Franck Noël, K. Delic","doi":"10.1109/DEXA.2002.1045891","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045891","url":null,"abstract":"Today's corporations use complex IT systems fabrics to control and manage their businesses, maintain linkages with clients and customers and synchronize their operations with suppliers and partners. In doing so, corporate employees have to master their IT environment. User support automation, which is defined as the process of discovery of user self-support chores, is introduced here to address the issue of the TCO (Total Cost of Ownership) reduction. This paper will briefly describe our experiences gained during deployment of the pilot self-support system within Hewlett-Packard Corporation.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127197170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semi-automated extraction of ontological knowledge from XML datasources 从XML数据源中半自动提取本体知识
S. Castano, V. D. Antonellis, S. Vimercati, M. Melchiori
{"title":"Semi-automated extraction of ontological knowledge from XML datasources","authors":"S. Castano, V. D. Antonellis, S. Vimercati, M. Melchiori","doi":"10.1109/DEXA.2002.1046003","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1046003","url":null,"abstract":"In the paper we present a methodology for the semiautomated extraction of ontological knowledge from XML data sources in a given domain. We consider an interconnection scenario over the Web, where various independent organizations use XML as a data interchange language for conducting business activities. The resulting ontology is organized into concepts and concept relationships at different levels of detail. Semantic links within and between the different levels are studied in order to capture and formalize semantic relationships between concepts to support multiple views on the ontological knowledge.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124825090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Web informetrics: extending classical informetrics to the Web Web信息计量学:将经典信息计量学扩展到Web
Devanshu Dhyani, S. Bhowmick, W. Ng
{"title":"Web informetrics: extending classical informetrics to the Web","authors":"Devanshu Dhyani, S. Bhowmick, W. Ng","doi":"10.1109/DEXA.2002.1045921","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045921","url":null,"abstract":"We explore the extension of classical informetric theory to the WWW. From the power law distribution of Web page degrees, we derived other interesting laws that hold for the Web such as Mandelbrot's law, Leimkuhler's law and Bradford's law. We introduced the theory of information producing processes that serves as a generic framework for studying the interrelationships between these informetric regularities. The theory of informetrics leads to a repertoire of metrics for measuring the scale of concentration that can be applied to the WWW.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126646875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Notes on application-orientated access control 关于面向应用的访问控制的注意事项
Adrian Spalka, Hanno Langweg
{"title":"Notes on application-orientated access control","authors":"Adrian Spalka, Hanno Langweg","doi":"10.1109/DEXA.2002.1045939","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045939","url":null,"abstract":"The protection qualities of discretionary access control systems realised by today's prevalent operating systems are based on an assessment of the trustworthiness of users. By starting a program a user transfers his trustworthiness to it, i.e., there is the tacit assumption that the program's trustworthiness at least matches that of the user. However, malicious programs are a growing source of threat. They perform operations without the user's consent and often in contravention of his interests. To eliminate this danger we examine program-orientated protection strategies. We then present, firstly, a small enhancement to the operating system and, secondly, an addition to the operating system, which support both a user and an application with high security demands in the enforcement of authenticity and integrity even in the presence of malicious programs.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"63 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
English as a formal specification language 英语作为正式的规范语言
Rolf Schwitter
{"title":"English as a formal specification language","authors":"Rolf Schwitter","doi":"10.1109/DEXA.2002.1045903","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045903","url":null,"abstract":"PENG is a computer-processable controlled natural language designed for writing unambiguous and precise specifications. PENG covers a strict subset of standard English and is precisely defined by a controlled grammar and a controlled lexicon. In contrast to other controlled languages, the author does not need to know the grammatical restrictions explicitly. ECOLE, a look-ahead text editor, indicates the restrictions while the specification is written. The controlled lexicon contains domain-specific content words that can be defined by the author on the fly and predefined function words. Specifications written in PENG can be deterministically translated into discourse representations structures to cope with anaphora and presuppositions and also into first-order predicate logic. To test the formal properties of PENG, we reformulated Schubert's steamroller puzzle in PENG, translated the resulting specification via discourse representation structures into first-order predicate logic with equality, and proved the steamroller's conclusion with OTTER, a standard theorem prover.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116284189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
Clustering Web sessions by sequence alignment 通过序列对齐对Web会话进行集群
Weinan Wang, Osmar R Zaiane
{"title":"Clustering Web sessions by sequence alignment","authors":"Weinan Wang, Osmar R Zaiane","doi":"10.1109/DEXA.2002.1045928","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045928","url":null,"abstract":"In the context of Web mining, clustering could be used to cluster similar click-streams to determine learning behaviours in the case of e-learning, or general site access behaviours in e-commerce. Most of the algorithms presented in the literature to deal with clustering Web sessions treat sessions as sets of visited pages within a time period and don't consider the sequence of the click-stream visitation. This has a significant consequence when comparing similarities between Web sessions. We propose in this paper a new algorithm based on sequence alignment to measure similarities between Web sessions where sessions are chronologically ordered sequences of page accesses.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":" November","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113947009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 136
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信