18th International Workshop on Database and Expert Systems Applications (DEXA 2007)最新文献

筛选
英文 中文
A Novel Approach to Multi-document Summarization 一种新的多文档摘要方法
Li-qing Qiu, Bin Pang, Sai-Qun Lin, Peng Chen
{"title":"A Novel Approach to Multi-document Summarization","authors":"Li-qing Qiu, Bin Pang, Sai-Qun Lin, Peng Chen","doi":"10.1109/DEXA.2007.32","DOIUrl":"https://doi.org/10.1109/DEXA.2007.32","url":null,"abstract":"In the paper we have studied the application of document sets categorization and different features combination in the summarization. The most important work is that we implement an improved extractive summarizer, which analyzes the document sets and decides the categories of the documents using different summarization strategies. The novel summarizer with categorization has confirmed better than summarizer without categorization.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132924582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Understanding enterprise integration project risks: A focus group study 理解企业集成项目风险:焦点小组研究
S. Purao, S. Paul, Steven Smith
{"title":"Understanding enterprise integration project risks: A focus group study","authors":"S. Purao, S. Paul, Steven Smith","doi":"10.1109/DEXA.2007.46","DOIUrl":"https://doi.org/10.1109/DEXA.2007.46","url":null,"abstract":"The prerequisites of success and reasons for failure for enterprise integration projects are still not well-understood as evidenced by large failure rates, including cost or schedule overruns, abandoned projects, and projects delivered with diminished functionality. These failures point to the inherently human activities of planning and overseeing that are critical to successful large-scale integration. In spite of a rich stream of research on systems development risks, few research efforts have attempted to understand enterprise integration risks. This paper reports preliminary findings, based on an analysis of data gathered via focus groups at an organization poised to embark on an integration project, about how organizational participants perceive these risks. The analysis shows that risk perception is fuzzy, it differs significantly across organizational actors, and points to considerable information asymmetry between risk managers and project participants.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114897854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An MDA Approach to Implement Personal IR Tools 实现个人IR工具的MDA方法
Sven Meyer zu Eissen, Benno Stein
{"title":"An MDA Approach to Implement Personal IR Tools","authors":"Sven Meyer zu Eissen, Benno Stein","doi":"10.1109/DEXA.2007.101","DOIUrl":"https://doi.org/10.1109/DEXA.2007.101","url":null,"abstract":"We introduce Tira (text-based information retrieval architecture), a software architecture for the rapid prototyping of tailored information retrieval (IR) tools. Tira allows to compose personal IR tools from atomic IR services, following the model driven architecture (MDA) paradigm: In a first step, an IR process is defined independently from platforms, by means of a UML activity diagram. In a second step, the activity diagram is transformed to a platform specific model, which is executed in a distributed environment. Major driving force behind our research is the question of personalization: We see a large gap between information retrieval theory and algorithms on the one hand and their implementation and deployment to satisfy a personal information need on the other. This gap can be closed with adequate software engineering means, and Tira shall contribute in this respect.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121906535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Getting Rid of Straitjackets for Flexible Integrity Checking 为灵活的完整性检查摆脱束缚
H. Decker, D. Martinenghi
{"title":"Getting Rid of Straitjackets for Flexible Integrity Checking","authors":"H. Decker, D. Martinenghi","doi":"10.1109/DEXA.2007.54","DOIUrl":"https://doi.org/10.1109/DEXA.2007.54","url":null,"abstract":"Various requirements that usually are imposed on data, constraints, updates and methods for checking the integrity of databases can be perceived as inflexible straitjackets. We show that such restrictions can be notably relaxed or even completely abandoned without forfeiting any major advantage. On the contrary, a significant amount of flexibility is gained by relaxing or abandoning several established prerequisites for integrity checking.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117315937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mining Complex Hydrobiological Data with Galois Lattices 利用伽罗瓦格挖掘复杂的水生生物数据
Aurélie Bertaux, Agnès Braud, F. Ber
{"title":"Mining Complex Hydrobiological Data with Galois Lattices","authors":"Aurélie Bertaux, Agnès Braud, F. Ber","doi":"10.1109/DEXA.2007.148","DOIUrl":"https://doi.org/10.1109/DEXA.2007.148","url":null,"abstract":"We have used Galois lattices for mining hydrobiological data. These data are about macrophytes, that are macroscopic plants living in water bodies. These plants are characterized by several biological traits, that own several modalities. Our aim is to cluster the plants according to their common traits and modalities and to find out the relations between traits. Galois lattices are efficient methods for such an aim, but apply on binary data. In this article, we detail a few approaches we used to transform complex hydrobiological data into binary data and compare the first results obtained thanks to Galois lattices.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122934092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Visual Surveillance Metadata Management 视觉监控元数据管理
P. Chmelar, J. Zendulka
{"title":"Visual Surveillance Metadata Management","authors":"P. Chmelar, J. Zendulka","doi":"10.1109/DEXA.2007.50","DOIUrl":"https://doi.org/10.1109/DEXA.2007.50","url":null,"abstract":"The paper deals with a solution for visual surveillance metadata management. Data coming from many cameras is annotated using computer vision units to produce metadata representing moving objects in their states. It is assumed that the data is often uncertain, noisy and some states are missing. The solution consists of the following three layers: (a) data cleaning layer - improves quality of the data by smoothing it and by filling in missing states in short sequences referred to as tracks that represent a composite state of a moving object in a spatiotemporal subspace followed by one camera, (b) Data integration layer - assigns a global identity to tracks that represent the same object, (c) Persistence layer - manages the metadata in a database so that it can be used for online identification and offline querying, analyzing and mining. A Kalman filter technique is used to solve (a) and a classification based on the moving object's state and its visual properties is used in (b). An object model for layer (c) is presented too.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Flexible Architecture for Context-Aware Physical Hypermedia 上下文感知物理超媒体的灵活架构
C. Challiol, Andrés Fortier, S. Gordillo, G. Rossi
{"title":"A Flexible Architecture for Context-Aware Physical Hypermedia","authors":"C. Challiol, Andrés Fortier, S. Gordillo, G. Rossi","doi":"10.1109/DEXA.2007.9","DOIUrl":"https://doi.org/10.1109/DEXA.2007.9","url":null,"abstract":"In this paper we present the rationale and the main components for a modular and extensible architecture for building and deploying physical hypermedia software. We show that this kind of software systems poses strong requirements on supporting software (such as Web browsers) because they involve complex context-aware navigation semantics. By using some simple archetypical examples we also show how to provide context-aware assistance to the mobile user, as he explores the physical world.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic Genre Classification of TV Programmes Using Gaussian Mixture Models and Neural Networks 基于高斯混合模型和神经网络的电视节目类型自动分类
M. Montagnuolo, A. Messina
{"title":"Automatic Genre Classification of TV Programmes Using Gaussian Mixture Models and Neural Networks","authors":"M. Montagnuolo, A. Messina","doi":"10.1109/DEXA.2007.92","DOIUrl":"https://doi.org/10.1109/DEXA.2007.92","url":null,"abstract":"In this paper we investigate the problem of automatically identifying the genre of TV programmes. The approach here proposed is based on two foundations: Gaussian mixture models (GMMs) and artificial neural networks (ANNs). Firstly, we use Gaussian mixtures to model the probability distributions of low-level audiovisual features. Secondly, we use the parameters of each mixture model as new feature vectors. Finally, we train a multilayer perceptron (MLP), using GMM parameters as input data, to identify seven television programme genres. We evaluated the effectiveness of the proposed approach testing our system on a large set of data, summing up to more than 100 hours of broadcasted programmes.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116141166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Author Identification Using Imbalanced and Limited Training Texts 利用不平衡和有限的训练文本识别作者
E. Stamatatos
{"title":"Author Identification Using Imbalanced and Limited Training Texts","authors":"E. Stamatatos","doi":"10.1109/DEXA.2007.41","DOIUrl":"https://doi.org/10.1109/DEXA.2007.41","url":null,"abstract":"This paper deals with the problem of author identification. The common N-grams (CNG) method [6] is a language-independent profile-based approach with good results in many author identification experiments so far. A variation of this approach is presented based on new distance measures that are quite stable for large profile length values. Special emphasis is given to the degree upon which the effectiveness of the method is affected by the available training text samples per author. Experiments based on text samples on the same topic from the Reuters Corpus Volume 1 are presented using both balanced and imbalanced training corpora. The results show that CNG with the proposed distance measures is more accurate when only limited training text samples are available, at least for some of the candidate authors, a realistic condition in author identification problems.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
A Scheme of Certificate Authority for Ad Hoc Networks 一种针对Ad Hoc网络的证书颁发方案
Jaydip Sen, M. Chandra, P. Balamuralidhar, G. HariharaS., H. Reddy
{"title":"A Scheme of Certificate Authority for Ad Hoc Networks","authors":"Jaydip Sen, M. Chandra, P. Balamuralidhar, G. HariharaS., H. Reddy","doi":"10.1109/DEXA.2007.90","DOIUrl":"https://doi.org/10.1109/DEXA.2007.90","url":null,"abstract":"The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-organized: the hosts constituting the networks can communicate with each other without reliance on any centralized or specified entities such as base stations or access points. With these networks finding more applications, the need for adequate security mechanism is increasingly becoming important. Key management is an essential cryptographic primitive upon which other security protocols are built. However, most of the existing key management schemes are not feasible in ad hoc networks because public key infrastructures with a centralized certification authority are hard to deploy there. In this paper, we propose and evaluate a security mechanism based on distributed certification authority based on threshold cryptography that is suited to wireless ad hoc networks. A collection of nodes acts as the certificate authority and provides the certification service. The feasibility of the proposed scheme is verified by some simulation studies. The results show the effectiveness of the scheme.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131716039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信