{"title":"Integrating user and group preferences for top-k search from distributed web resources","authors":"A. Eckhardt, J. Pokorný, P. Vojtás","doi":"10.1109/DEXA.2007.40","DOIUrl":"https://doi.org/10.1109/DEXA.2007.40","url":null,"abstract":"We discuss models of user and group preferences in social networks and the Semantic web. We construct a model for user and group preference querying over RDF data as well as for ordering of answers by aggregation of particular attribute ranking. We have implemented our methods and heuristics into the Tokaf middleware framework prototype. We describe also experiments with Tokaf.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126675321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Esther Palomar, J. Tapiador, J. Castro, A. Ribagorda
{"title":"Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security","authors":"Esther Palomar, J. Tapiador, J. Castro, A. Ribagorda","doi":"10.1109/DEXA.2007.103","DOIUrl":"https://doi.org/10.1109/DEXA.2007.103","url":null,"abstract":"A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending peer-to-peer (P2P) characteristics to wireless environments. As a result, the P2P paradigm has begun to migrate to pervasive computing scenarios. So far, research in this domain has led to some middleware models working over mobile ad hoc networks (MANETs), which are now viewed as a mobile-P2P (M-P2P) networks. However, the highly dynamic, decentralized and self-organizing nature of MANETs does not fit well with many approaches developed in the P2P world. In particular, it does not seem easy to deploy security solutions for M-P2P due, among other reasons, to the inherent limitations of the peers' devices and their potentially very sporadic interaction with other peers. Under these assumptions, a significant challenge is how to establish a decentralized trust management system. In this paper, we first summarize the advances in M-P2P security services and point out potential future applications based on opportunistic interactions. Then, we discuss several kind of threats and attacks, and finally analyze the (un)suitability of employing trust-based systems in some of these environments.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134482648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthesis of artificial neural networks by evolutionary methods","authors":"Z. Ivan, V. Pavel","doi":"10.1109/DEXA.2007.134","DOIUrl":"https://doi.org/10.1109/DEXA.2007.134","url":null,"abstract":"This work deals with a problem of synthesis of the artificial neural networks using the evolutional scanning method. The basic task to be solved is to create a symbolic regression algorithm on principles of analytic programming, which will be capable of performing a convenient neural network synthesis. The main motivation here is the computerization of such synthesis and discovering so far unknown solutions.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variants of Memetic And Hybrid Learning of Perceptron Networks","authors":"Roman Neruda, S. Slusny","doi":"10.1109/DEXA.2007.66","DOIUrl":"https://doi.org/10.1109/DEXA.2007.66","url":null,"abstract":"Hybrid models combining neural networks and genetic algorithms have been studied recently in order to achieve better performance and/or faster training. In this paper we deal with variants of memetic genetic learning applied for the structure optimization and weights evolution of multilayer perceptron networks. The memetic approach combines genotype and phenotype evolution together with local search represented here by gradient based optimization. It is shown, that combining memetic algorithms with neural networks can lead to better results than relying on neural networks alone in terms of the quality of the solution (both training and generalization error).","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"425 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121057868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A system for summary-document similarity in notary domain","authors":"C. Cesarano, A. Mazzeo, A. Picariello","doi":"10.1109/DEXA.2007.77","DOIUrl":"https://doi.org/10.1109/DEXA.2007.77","url":null,"abstract":"In this paper we propose a methodology to perform a comparison between a legal document and its related handwritten summary. We thus describe the algorithms that verify when a human-produced summary is consistent with its source document. We first analyze both documents in order to extract only the relevant information then we compare such information in order to obtain a measure of correlation indicating the consistence between the two documents. Eventually, we briefly report on the performance of these algorithms.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible Querying of Multiple Data Sources through Fuzzy Summaries","authors":"P. Bosc, A. Hadjali, Hélène Jaudoin, O. Pivert","doi":"10.1109/DEXA.2007.26","DOIUrl":"https://doi.org/10.1109/DEXA.2007.26","url":null,"abstract":"This paper deals with efficient fuzzy query processing in a distributed database context. The idea suggested is to forward the query only to the data sources that are likely to provide \"good answers\" to the query, which entails to define a way to assess each source by means of a \"compact\" representation of its content. A solution based on fuzzy summaries is outlined, and different approaches to fuzzy summaries are presented and compared. The query/summary matching aspect is tackled for each of these approaches and a general processing strategy is described.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Mandreoli, Antonio Massimiliano Perdichizzi, W. Penzo
{"title":"A P2P-based Architecture for SemanticWeb Service Automatic Composition","authors":"F. Mandreoli, Antonio Massimiliano Perdichizzi, W. Penzo","doi":"10.1109/DEXA.2007.21","DOIUrl":"https://doi.org/10.1109/DEXA.2007.21","url":null,"abstract":"The ultimate vision for eBusiness is an Internet-based global market place, accessible to all enterprises, regardless of size and geographical location, where automatic cooperation and integration among firms are allowed and enhanced. A powerful mean for these purposes is represented by sharing, reusing and composing value-added services made available on the Web, i.e. Web services. In this scenario, by making the Web content machine accessible and understandable, semantic Web services aim to provide efficient and effective Web service automatic discovery, selection, and composition. As part of the NeP4B project, in this paper we propose an architecture to address these issues in a flexible and scalable P2P network.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128363576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incorporating Knowledge into e-Commerce Automated Negotiation","authors":"Zhuang Yan, F. Yan, S. Fong","doi":"10.1109/DEXA.2007.137","DOIUrl":"https://doi.org/10.1109/DEXA.2007.137","url":null,"abstract":"Challenges in e-Commerce negotiation reside in two issues such as, automation and knowledge incorporation. In this paper, we describe how knowledge plays a role in automated negotiation. A methodology that uses knowledge beads (KB) as knowledge representation that would be suitable for the design of automated negotiation systems is specified. KB helps in giving a unified approach for representing the data throughout the process that includes evaluation, negotiation, and post-negotiation. We classify the types of knowledge namely contextual e-Commerce knowledge and negotiation knowledge, in the negotiation process.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128225408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Forstner, R. Stumptner, B. Freudenthaler, J. Küng
{"title":"VCDECIS -- Knowledge Online Advanced Content Management Using a Semantic Network","authors":"E. Forstner, R. Stumptner, B. Freudenthaler, J. Küng","doi":"10.1109/DEXA.2007.144","DOIUrl":"https://doi.org/10.1109/DEXA.2007.144","url":null,"abstract":"The ambitious goal of VCDECIS (Vienna consulting decision support system) is the establishment of a well organized system which supports the experts and engineers in all tasks during the assessment of structures based on ambient vibration monitoring. Real expertise, as required in structural dynamics, is characterized by a combination of complexity and a short period of validity. The current practice in structural health monitoring is a case to case approach which needs a lot of experience for proper interpretation and assessment. VCDECIS enables access to the existing knowledge represented in data or literature resulting from former efforts.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128519014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facilitating the Use of TPM Technologies through S&D Patterns","authors":"S. Gürgens, C. Rudolph, A. Maña, A. Muñoz","doi":"10.1109/DEXA.2007.113","DOIUrl":"https://doi.org/10.1109/DEXA.2007.113","url":null,"abstract":"Trusted platform modules (TPMs) can provide a variety of security functionalities. However, the TPM specification is highly complex and the deployment of TPM-based solutions is a difficult and delicate task. In this paper we propose the use of security patterns to specify TPM-based security solutions. The refined notion of security patterns developed in the SERENITY research project allows us to produce precise specifications of TPM-based solutions for particular security goals. This approach makes TPM technology available to system engineers without in-depth knowledge of trusted computing specifications.","PeriodicalId":314834,"journal":{"name":"18th International Workshop on Database and Expert Systems Applications (DEXA 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}