{"title":"Automatic Mining of Human Activity Attributes from Weblogs","authors":"The-Minh Nguyen, Takahiro Kawamura, Hiroyuki Nakagawa, Yasuyuki Tahara, Akihiko Ohsuga","doi":"10.1109/ICIS.2010.44","DOIUrl":"https://doi.org/10.1109/ICIS.2010.44","url":null,"abstract":"In this paper, we define an activity by five basic attributes: actor, action, object, time and location. The goal of this paper is to describe a method to automatically extract all attributes in each sentence retrieved from Japanese weblogs. Previous work had some limitations, such as high setup cost, inability of extracting all attributes, limitation on the types of sentences that can be handled, and insufficient consideration of interdependency among attributes. To resolve these problems, this paper proposes a novel approach that uses conditional random fields and self-supervised learning. This approach treats the activity extraction as a sequence labeling problem, and has advantages such as domain-independence, scalability, and does not require any hand-tagged data. Since it is unnecessary to fix the positions and the number of the attributes in activity sentences, this approach can extract all attributes by making only a single pass over its corpus. Additionally, by converting to simpler sentences, the proposed approach can deal with complex sentences retrieved from Japanese weblogs. In an experiment, this approach achieves high precision (activity: 88.87%, attributes: over 90%).","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomoo Sumida, T. Goto, Katsuyoshi Ito, K. Tsuchida
{"title":"Highly Efficient Transport Protocol for Large Capacity Data Files and Its Visualizing Methods","authors":"Tomoo Sumida, T. Goto, Katsuyoshi Ito, K. Tsuchida","doi":"10.1109/ICIS.2010.101","DOIUrl":"https://doi.org/10.1109/ICIS.2010.101","url":null,"abstract":"Internet-related technology has made remarkable progress in the past years, and the main problem is the increase in bandwidth required for delivery of large-capacity files. To solve this problem, we describe a protocol named Non-ordered Block Transfer on Explicit Multi-Unicast (NBT on XCAST). The purpose of this protocol is to save network bandwidth and to reduce server load in delivering large-capacity stored files. In addition, it is necessary to perform simulation for evaluating and reviewing the new protocol. Therefore, we propose a method for visualizing NBT on XCAST protocol. The purpose of this approach is to understand the status of the whole network system with NBT on XCAST. In this visualization method, vertices and edges represent client and routers and communication lines, respectively.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study for Management of Research Organizations and the Effect on Presentations of Information Processing at an Academic Meeting, by Students in the Humanity Course","authors":"Ayumu Toriyabe, Akinori Minazuki","doi":"10.1109/ICIS.2010.59","DOIUrl":"https://doi.org/10.1109/ICIS.2010.59","url":null,"abstract":"Most of the students who present their studies at student sessions are taking the science course, but in recent years students in the humanity course are also presenting the studies at information process society. Most of the students who present the studies at an academic society belong to organizations which specialize in the studies - seminars, and teachers help students get more information. Students do the studies with the information and present the outcome of indivisual studies or joint studies at an academic society. This is how the system of organizations (seminars) works in the presentation at an academic society. In this report, we target for the students in the humanity course, and considered the process of studies and how to manage organizations for the National Convention in the 50th anniversary of the foundation of information process society, which was held in march.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128417408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temporal Dynamics in Music Listening Behavior: A Case Study of Online Music Service","authors":"C. Park, Minsuk Kahng","doi":"10.1109/ICIS.2010.142","DOIUrl":"https://doi.org/10.1109/ICIS.2010.142","url":null,"abstract":"Although temporal context may significantly affect the popularity of items and user preference over items, traditional information filtering techniques such as recommender systems have not sufficiently considered temporal factors. Modeling temporal dynamics in user behavior is not trivial, and it is challenging to study its effect in order to provide better recommendation results to users. To incorporate temporal effects into information filtering systems, we analyze a large sized real-world usage log data gathered from Bugs Music, which is one of the well-known online music service in Korea, and study temporal dynamics in users' music listening behaviors considering periodicity of time dimension and popularity change. We insist that the result of our analysis can be a useful guideline to the industry which delivers music items to users and tries to consider temporal context in their recommendations.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127163901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node Compression Techniques Based on Cache-Sensitive B+-Tree","authors":"Rize Jin, Tae-Sun Chung","doi":"10.1109/ICIS.2010.9","DOIUrl":"https://doi.org/10.1109/ICIS.2010.9","url":null,"abstract":"Cache-conscious indices have been researched for a decade. These index structures can enhance data locality and reduce cache misses. Cache-Sensitive B+-tree (CSB+-tree) is a state-of-the-art, high performance index tree for main-memory database systems. However, in the worst case, the space utilization of CSB+-tree can fall to 25%. The main contribution of this paper is to improve space efficiency of CSB+-tree by using compression mechanisms. We have conducted experimental studies. Results show that the compressed CSB+-trees can yield significant space savings with additional benefits for search and delete operations by utilizing the superiority of modern hardware.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Goto, Yasunori Shiono, T. Nishino, T. Yaku, K. Tsuchida
{"title":"Behavioral Verification in Hichart Development Environment for Embedded Software","authors":"T. Goto, Yasunori Shiono, T. Nishino, T. Yaku, K. Tsuchida","doi":"10.1109/ICIS.2010.119","DOIUrl":"https://doi.org/10.1109/ICIS.2010.119","url":null,"abstract":"Developing embedded systems is becoming more complicated. However, the time taken to develop an embedded system must be shortened. Software development environments especially for test purposes are still inadequate. To reduce bugs, specifications in the upper process need to be checked, and model checking-methodologies are often used to do so. So far we have developed a visual software development environment for Hichart that targets LEGO MINDSTORM. We also enhanced the behavioral specifications table function to make it applicable to the environment for checking physical parameters of real machine. In this paper, we adopt model-checking methodologies to the environment. We propose a visual software development environment for embedded software with physical and logical checking.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121349914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web and Document Databases: An Effective Way to Explore the Internet","authors":"Yanjung Chen","doi":"10.1109/ICIS.2010.66","DOIUrl":"https://doi.org/10.1109/ICIS.2010.66","url":null,"abstract":"In this paper, we discuss the architecture of a system, the so-called Web and Document Databases (WDDBS for short), designed to explore the Internet effectively and efficiently. Abstractly, a WDDBS can be defined as a triple, where (1) D stands for a local docu¬ment database to store XML documents, (2) P for a subsystem responsible for remote query evaluation, including resolution of semantic conflicts among heterogeneous databases, and (3) W for a Web crawler which should be able to find information sources related to the local database in some way. Then, each information source can be organized into a WDDB distributed over the Internet, which may be con¬nected to others through URLs. A query submitted to a WDDBS will first be evaluated against the local document database, and then possibly switched over to some remote document databases if necessary, which is controlled by the ‘knowledge’ on how local WDDBSs are connected. In this way, the load of traffic over the Internet can effectively be decreased, but the information explored is more relevant.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116477775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Security of Outsourced and Untrusted Databases","authors":"Johannes Heurix, T. Neubauer","doi":"10.1109/ICIS.2010.60","DOIUrl":"https://doi.org/10.1109/ICIS.2010.60","url":null,"abstract":"The outsourcing of databases to third parties has become a viable alternative to traditional in-house data management. Database management by third parties including the storage and maintenance allows companies to reduce their expenses and profit from the expertise of data storage specialists. However, the price is the transfer of confidential data to third parties. The data owners need to trust the third party that data is stored (i) confidentially, such that the service providers cannot profit from passing the data to unauthorized parties, and (ii) in a correct and untampered state. This work identifies security issues that data owners have to face when it comes to database outsourcing. We provide an overview of existing techniques for solving the confidentiality and integrity problem and point out the limitations of these approaches. Thereby, this work aims to support decision makers who are confronted with the outsourcing question.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116452347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent Developments in the Russian Speech Recognition Technology","authors":"Daria Vazhenina, K. Markov","doi":"10.1109/ICIS.2010.114","DOIUrl":"https://doi.org/10.1109/ICIS.2010.114","url":null,"abstract":"In this paper, we present a review of the latest developments in the Russian speech recognition research. Although the underlying speech technology is mostly language independent, differences between languages with respect to their structure and grammar have substantial effect on the recognition systems performance. Russian language has a complicated word formation system which is characterized by high degree of inflection and unrigidness of the word order. This greatly reduces the predictive power of the conventional language models and consequently increases the error rate. Current statistical approach to speech recognition systems development requires large amount of both speech and text data. There exist several databases of Russian speech and their descriptions are given in the paper. In addition, we analyze and compare several speech recognition systems developed in Russia and Czech Republic and identify the most promising directions for further research in Russian speech technology.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128703350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Evaluation of Packet Flow Control Methods for a Ring Nework of Processors on Chip","authors":"Akiko Narita, K. Ichijo, Y. Yoshioka","doi":"10.1109/ICIS.2010.104","DOIUrl":"https://doi.org/10.1109/ICIS.2010.104","url":null,"abstract":"A Current design of a system-on-chip (SoC) technology is constructing under increasing demand for high performance, small size and energy-efficient design. To fulfill these demands, it is required to consider a suitable design for on chip interconnection network. In this paper, we design a prototype of communications unit (CU) for a network-on-chip (NoC) architecture based on ring processors interconnection whose structure is simple to provide a SoC model with small size, low-cost and low energy consumption solutions for designing SoC system. Three types of packet flow control methods, such as, store-and-forward (SF), virtual cut-through (VCT) and wormhole routing (WH) have been implemented and compared in view of designing a hardware-efficient SoC architecture. Furthermore, computer based simulations with a clock cycle level of a CPU in the CU were preformed and transmission latency, throughput, and capability for load balancing were analyzed and compared. From the results that have been obtained show that VCT gives better performances, while SF and WH are more economical in memory consumption for short and long packet length, respectively.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}