{"title":"A Framework for Ontology-Based Data Integration","authors":"Li Dong, Huang Linpeng","doi":"10.1109/ICICSE.2008.96","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.96","url":null,"abstract":"This paper presents an ontology-based data integration framework that is capable of deriving an ontology from a collection of XML schemas in a semiautomatic manner and integrating heterogeneous XML sources at the semantic level. The ontology in our system is constructed following a layered approach where an intermediate model is introduced to explicate the underlying semantics of XML schemas and to reduce the complexity of ontology derivation. This two-phase approach is performed semi-automatically by applying a set of heuristic rules and by interpreting mapping information defined by users. The resulting ontology serves as a global semantic view over a set of data sources to be integrated. Moreover, we also adopt a data warehousing approach to populate this ontology with data from XML instance documents automatically. The proposed framework has been implemented and evaluated using off the-Web XML schemas.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131194142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ubiquitous Computing in Financial Forecast and Early Warning","authors":"Yuan Wan, Hengqing Tong, Jingtang","doi":"10.1109/ICICSE.2008.49","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.49","url":null,"abstract":"Establishing reliable financial forecast and early warning systems is important to protect economy from the financial crisis and to weaken its influences. In order to implement forecast and early warning of complex system by use of simple models, we presented a lag-cointegration method which obtained good result for CPI forecast. For the purpose of information sharing, we developed a new system with data warehouse. This new system combines software and hardware, using technologies such as reflective middleware UIC, fingerprint recognition, and acceptable sound and video terminal. It makes users possible to obtain the transparent network service via any facility and any network at any time In other words, the service can be ubiquitous. Meanwhile, when users share the information, this system eliminates the danger of privacy betraying under the circumstance of human-computer interaction.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131323018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Improved GIS Service Based on WSRF","authors":"Zhiming Gui, Kai Song","doi":"10.1109/ICICSE.2008.12","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.12","url":null,"abstract":"To implement some complex geoprocessing functions, it may need to integrate several different GIS service. Due to the low level HTTP Get/Post method only support synchronous data queries and could not keep service context information, the current OpenGIS Web service (OWS) architecture can not meet the requirement of chained geoprocessing. Though the OpenGIS message framework (OMF, discussing paper of OGC) provides a mechanism to favor service chaining in OWS, it does not clearly illustrate how to implement it. With the coming of Web service resource framework (WSRF), it provides a feasible way to enables the service chain. This paper first analyzes the WSRF and compares it with the OWS architecture. Then it provides a method on converting the OWS under WSRF. The detailed progress of implementing an improved map service using Globus Toolkit is provided at the end. The result shows it get better performance and collaborative than standard OWS.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Ontology-Based Measuring Semantic Similarity","authors":"Yin Guisheng, Sheng Qiuyan","doi":"10.1109/ICICSE.2008.42","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.42","url":null,"abstract":"Ontology is an explicit specification of a conceptualization on semantic and knowledge. This paper presents a formal definition on ontology and gives an example. Then, a method to measuring semantic similarity is presented. Semantic similarity is divided into concept similarity and description similarity. A calculation of semantic similarity between concepts in ontology is presented by the hierarchy of ontology concepts. To make the calculation of semantic similarity between concepts more similar to human's subjective judgment, semantic similarity is divided into concept similarity and description similarity; the final semantic similarity is produced by merging concept similarity and description similarity. Finally, the optimized parameter settings are gained through the experiment results.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ru-zhi Xu, Ningbo Zhang, Peiguang Lin, Zesheng Wang
{"title":"Logic Inference-Based Semantic Web Service for KB Retrieval","authors":"Ru-zhi Xu, Ningbo Zhang, Peiguang Lin, Zesheng Wang","doi":"10.1109/ICICSE.2008.73","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.73","url":null,"abstract":"Because the ontology-based knowledge base is distributed and heterogeneous, a logic inference-based semantic Web service is presented in this paper. By use of the query converter, the service can retrieve the knowledge base by logic inference. Then the service can retrieve each distributed knowledge base independently and by the unified interfaces supplied by the service, the problem of heterogeneity becomes transparent for other services. The experiments show that this service is very perfect in retrieving the knowledge base.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125950910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation Study of Flood Attacking of DDOS","authors":"Ming Li, Jun Li, Wei Zhao","doi":"10.1109/ICICSE.2008.14","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.14","url":null,"abstract":"Distributed denial-of-service (DDOS) attacking remains a great threat to the Internet. The literature regarding qualitative descriptions of DDOS attacking is rich. However, quantitative descriptions are rarely reported. This paper aims at providing our results of five experiments in this regard for flood attacking in the simulation environment with NS2. The results in this paper indicate that the bandwidth may be more easily flooded by UDP-type attacking than by TCP-type one. In addition, by introducing the concepts of attack time and attack intensity, we show that attack time mainly relates to attack intensity. Furthermore, we give the quantitative evidence to show that buffer size plays a role in dealing with attack traffic.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129775558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eunyong Park, Sunyoung Han, Heemin Kim, K. Son, Liu Jing
{"title":"Efficient Multicast Video Streaming for IPTV Service over WLAN Using CC-FEC","authors":"Eunyong Park, Sunyoung Han, Heemin Kim, K. Son, Liu Jing","doi":"10.1109/ICICSE.2008.75","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.75","url":null,"abstract":"With rapidly growing IPTV market and IPTV standardization activity, multicasting starts to gain a lot of attention again. The use of multicasting conserves the bandwidth of a network and this becomes especially important with wireless channels with limited throughput. But, multicasting over wireless channel is facing many challenges. In this paper, we discuss the challenges for the multicast streaming to provide IPTV service over WLAN and present system architecture to model the wireless IPTV service environment. And we apply a novel CC-FEC (Cross- correlated Forwarding Error Correction) scheme to the model and analyze the efficiency of the scheme.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132430851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Realization of Random Encryption Algorithm","authors":"Gao Wei, Zhang Guoyin, Liang Yanmei, Chen Weihua","doi":"10.1109/ICICSE.2008.105","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.105","url":null,"abstract":"In order to resolve the trust problem due to the opening, the dynamics, the anonymity and uncertainty of p2p system, this paper proposes a new p2p trust model by analyzing and improving the subjective logic , a new trust quantification formula with the negative events effect and the time effect is given, and a definition of risk is also presented, By doing this, we can evaluate the trust relationships between peers more precisely and prevent the hidden security dangers of cooperative cheat and slander more effectively, thus can resolve security problems exist in p2p environment more effectively.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125311879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Mathematical Formula Recognition Method Base on Baseline Structure Analysis","authors":"Yonghua Li, Ke-jun Wang, W. Shangguan, Liqun Tang","doi":"10.1109/ICICSE.2008.102","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.102","url":null,"abstract":"As a long time, the mathematical formula recognition has become one important problem in OCR research field, how to recognize the formula in magazine or book exactly and quickly has become one difficult task. In general, the formula recognition problem could be divided into character segmentation and structure analysis two stages. In this paper, the whole recognition process was studied in detail, using character over-segmentation method and BST character structure analysis algorithm, the general formula could be recognized and remerged successfully, and the recognition ratio is very high. As we can conclude from the experiment result that the mathematical formula recognition method base on baseline structure analysis could satisfy the need of most situations.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOS: A Service Oriented Storage Scheme for Data Grid","authors":"Haitao Li, Zhaobin Liu, Peng Gu","doi":"10.1109/ICICSE.2008.45","DOIUrl":"https://doi.org/10.1109/ICICSE.2008.45","url":null,"abstract":"It is widely believed that future computing environment will consist of logically connected but geographically distributed computation and storage resources with a variety of capabilities. Furthermore, these systems typically go through rather complicated upgrades which lead to heterogeneity over time. Meanwhile, there are various applications that exhibit different I/O access patterns. In this paper, we proposed a novel scheme called service oriented storage (SOS) to automatically adapt diverse storage systems to their services in a large data grid environment. Using clustering algorithm based Pattern Discovery, Pattern Divisive, Storage Agent and Dissimilation Diagnosis modules, SOS attempts to identify proper storage nodes from the storage pool based on interactions of the user's I/O attribute. In other words, structure and attribute of the storage systems can adapt to the changed workloads and allow system service to achieve optimal and maximum self adaptively.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123883772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}