{"title":"Motivational factors for bringing in and demanding contents from knowledge management systems","authors":"Vesna Milijic","doi":"10.1109/DEXA.2002.1045896","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045896","url":null,"abstract":"This article refers to the fact that employees often cannot be motivated to use knowledge management (KM) systems. With respect to psychological studies and theories, it will be explained that employees behave 'normal' considering the given circumstances. By identifying the factors that determine behaviour in the case of implementing KM systems, propositions can be derived, how to increase employees' motivation for bringing in and demanding contents from KM systems.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117281113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using dynamically created decision-making organizations (holarchies) to plan, commit, and execute control tasks in a chilled water system","authors":"F. Maturana, P. Tichý, R. Staron, P. Šlechta","doi":"10.1109/DEXA.2002.1045966","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045966","url":null,"abstract":"A multi-agent architecture to automate complex industrial systems is described. The multi-agent system is created with artificial social behaviors to enable cooperation among the agents. Agents organize their respective views about the system to react to changes and to discover system capabilities. We explore the implications of using agent technology in the design and operation of a chilled water system. Our aim is to contribute with a set of guidelines on how to build autonomous agents for industrial automation.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116992806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Brennan, Scott G. Olsen, M. Fletcher, D. Norrie
{"title":"Comparing two approaches to modelling decentralised manufacturing control systems with UML capsules","authors":"R. Brennan, Scott G. Olsen, M. Fletcher, D. Norrie","doi":"10.1109/DEXA.2002.1045961","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045961","url":null,"abstract":"In this paper, we describe two orthogonal methodologies for building decentralised manufacturing control systems. The fundamental building block of these control systems is the UML capsule stereotype that can be used to design object-oriented software systems that are open, agile, have the capacity to manage real-time tasks and so can provide varying degrees of 'intelligence' within a 21/sup st/ century manufacturing environment. We also evaluate the merits of these two viewpoints using a discrete-event simulation experimental test bed.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117001300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-discourses with Zeno","authors":"A. Voß","doi":"10.1109/DEXA.2002.1045914","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045914","url":null,"abstract":"Zeno is an open-source platform for E-discourses. Its key concepts are protected sections with configurable discourse grammars, articles with labels and attachments, and two-way traversable labeled links to form threads or even cyclic networks. We show how discourses can be set up and moderated, how readers can choose between different views, and how writers can contribute. Illustrations are taken from a range of application projects.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114558620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bettoni, R. Ottiger, Rolf Todesco, Kurt Zwimpfer
{"title":"Individual knowledge management with MailTack","authors":"M. Bettoni, R. Ottiger, Rolf Todesco, Kurt Zwimpfer","doi":"10.1109/DEXA.2002.1045892","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045892","url":null,"abstract":"We present our EU-sponsored research in the domain of individual knowledge management and collaborative learning: the MailTack system. MailTack is a stand-alone software tool that we use to understand and support our behaviour in complex e-mail discussions with the aim of contributing to a systematic Individual Knowledge Management and Team Learning. Based on a constructivist understanding of knowing, we have developed MailTack as a tool for Persistent Business Discussions combined with an Individual Knowledge Assessment. By helping the involved individuals in improving the effectiveness and efficiency of their asynchronous conversations we think that MailTack could contribute to make collaborative learning and asynchronous interactions (for cooperating, coaching, tutoring, etc.) more successful and attractive thus facilitating the dynamics of Communities of Practice and more generally of learning communities.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"394 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124454849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cultural heritage forum celebrating technological innovation at Station X","authors":"T. Collins, P. Mulholland","doi":"10.1109/DEXA.2002.1045956","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045956","url":null,"abstract":"We aim to encourage and support public participation in heritage through the development of Cultural Heritage Forums, a kind of cultural web portal that enables active participation of communities of interest in a way that complements rather than replaces visits to physical cultural institutions. The cultural heritage forum described here (Station X) is concerned with promoting an understanding of technology innovation in the areas of computing and cryptography. We propose a number of scenarios concerning how the forum can be designed, drawing on our earlier work in using knowledge modelling and text analysis to support the exploration of digital resources.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126571203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time traffic updates in moving objects databases","authors":"Goce Trajcevski, O. Wolfson, Bo Xu, P. Nelson","doi":"10.1109/DEXA.2002.1045979","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045979","url":null,"abstract":"This work addresses the problem of updating moving objects databases (MOD) using real-time traffic information. The motion of the object is represented by a trajectory, which can be constructed using the available electronic maps and the information about traffic patterns. However, the statistical information about traffic patterns may change due to accidents, extreme weather conditions, road work, etc. In this work, we present a model for updating the trajectories of moving objects when unexpected traffic conditions occur. Many sites provide up-to-date information about traffic conditions on major expressways. However, the unexpected traffic conditions may affect not only the vehicles on the expressways for which an on-line monitoring is provided, but may also have an effect on the streets near those expressways. We propose a model of this spill-over effect and we utilize it in the process of identifying the trajectories which are affected by the abnormal traffic.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121679226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role based specification and security analysis of cryptographic protocols using asynchronous product automata","authors":"S. Gürgens, Peter Ochsenschläger, C. Rudolph","doi":"10.1109/DEXA.2002.1045943","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045943","url":null,"abstract":"Cryptographic protocols are formally specified as a system of protocol agents using asynchronous product automata (APA). APA are a universal and very flexible operational description concept for communicating automata. Their specification, analysis and verification is supported by the SH-verification tool (SHVT). The local state of each agent is structured in several components describing its knowledge of keys, its \"view\" of the protocol and the goals to be reached within the protocol. Communication is modeled by adding messages to and removing them from a shared state component network. Cryptography is modeled by symbolic functions with certain properties. In addition to the regular protocol agents an intruder is specified, which has no access to the agents' local states but to the network. The intruder may intercept messages and create new ones based on his initial knowledge and on what he can extract from intercepted messages. Violations of the security goals can be found by state space analysis performed by the SHVT. The method is demonstrated using the symmetric Needham-Schroeder protocol, and an attack is presented that does not involve compromised session keys. Our approach defers from others in that protocol specifications do not use implicit assumptions, thus protocol security does not depend on whether some implicit assumptions made are reasonable for a particular environment. Therefore, our protocol specifications explicitly provide relevant information for secure implementations.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132747993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining structure search and content search for online courses","authors":"C. Lecon, S. Seehusen","doi":"10.1109/DEXA.2002.1045924","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045924","url":null,"abstract":"In order to allow flexible searching in online courses, both structure information and content information has to be considered. Consequently, an appropriate data model, index structure and query model which combine structure search and content search are required. The development process of an online course has to support the generation of this data, i.e. it has to separate and provide these two kinds of information. We give an overview of work concerning the development processes of online courses and appropriated data models. Then we propose our development process, and introduce a data model and a query model which fulfills the requirements mentioned above by mapping the structure information on attributes.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132884151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STREAMOBILE: pay-per-view video streaming to mobile devices over the Internet","authors":"J. Domingo-Ferrer, A. Martínez-Ballesté","doi":"10.1109/DEXA.2002.1045931","DOIUrl":"https://doi.org/10.1109/DEXA.2002.1045931","url":null,"abstract":"As new mobile communication technologies are becoming broadly available, there is urgent pressure to populate them with services that provide returns for the huge investments made by telecommunications operators. Services around video transmission are expected to play a key role: news broadcasting, videoconferencing, movie channels, on-line gambling, etc. The goal of the STREAMOBILE project is to demonstrate an Internet pay-per-view distribution system toward GPRS and UMTS mobile devices. Copyright-protected contents are streamed to the customer and a micropayment scheme is used so that contents are not paid for in advance, but as they are being received by the customer. This paper presents an evolving prototype., whose client software has been designed in such a way that it can be easily migrated to 3G mobile devices.","PeriodicalId":254550,"journal":{"name":"Proceedings. 13th International Workshop on Database and Expert Systems Applications","volume":"79 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}