2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)最新文献

筛选
英文 中文
Research on measuring semantic correlation based on the Wikipedia hyperlink network 基于维基百科超链接网络的语义相关性度量研究
Fei-yue Ye, Feng Zhang
{"title":"Research on measuring semantic correlation based on the Wikipedia hyperlink network","authors":"Fei-yue Ye, Feng Zhang","doi":"10.1109/ICIS.2013.6607859","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607859","url":null,"abstract":"As a free online encyclopedia with a large-scale of knowledge coverage, rich semantic information and quick update speed, Wikipedia brings new ideas to measure semantic correlation. In this paper, we present a new method for measuring the semantic correlation between words by mining rich semantic information that exists in Wikipedia. Unlike the previous methods that calculate semantic relatedness merely based on the page network or the category network, our method not only takes into account the semantic information of the page network, also combines the semantic information of the category network, and it improve the accuracy of the results. Besides, we analyze and evaluate the algorithm by comparing the calculation results with famous knowledge base (e.g., Hownet) and traditional methods based on Wikipedia on the same test set, and prove its superiority.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design & deployment of an Enterprise Grade Real-time Multi Agent System for supply chain synchronization 面向供应链同步的企业级实时多主体系统的设计与部署
Bjorn Madsen
{"title":"Design & deployment of an Enterprise Grade Real-time Multi Agent System for supply chain synchronization","authors":"Bjorn Madsen","doi":"10.1109/ICIS.2013.6607820","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607820","url":null,"abstract":"To respond to customer demand businesses invest in capacities and supply. Any mismatch results in obsolescent stock, wasted resources and lost sales. In this paper the considerations for design & deployment of an Enterprise Grade Real-time Multi Agent System for supply chain synchronization is presented, so that each and every business involved in the supply chain can adjust their activities to minimize the wasted resources.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128951187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of tax e-filing acceptance model: A structural equation modeling approach 税务电子申报受理模型研究:一种结构方程建模方法
C. Lu, Chun-Tai Ting
{"title":"A study of tax e-filing acceptance model: A structural equation modeling approach","authors":"C. Lu, Chun-Tai Ting","doi":"10.1109/ICIS.2013.6607854","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607854","url":null,"abstract":"This study integrated theory of planning behavior (TPB) and technology acceptance model (TAM) to investigate the determinants affecting taxpayers' on-line tax filing. According to the Global e-Government Study of Brown University in the United States, Taiwan's ranking was the world's first in 2010. Hence, this study sampled 422 online taxpayers in Taiwan and questionnaire-based empirical study was used to collect data. The empirical results showed that: (1) Attitude was the primary factor affecting on-line tax filing, but “attitude” was also affected by “perceived usefulness”, “perceived ease of use”, “tax equity”, “social norm”, and “moral norm”. (2) Both TAM and TPB could be successfully integrated to explain online tax filing behaviors, and correlations were found between TAM factors and TPB factors. (3) Finally, we built a best-fitted model for on-line tax filing. This model would be the reference for establishing e-government.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining rare association rules in a distributed environment using multiple minimum supports 使用多个最小支持挖掘分布式环境中的稀有关联规则
Jutamas Tempaiboolkul
{"title":"Mining rare association rules in a distributed environment using multiple minimum supports","authors":"Jutamas Tempaiboolkul","doi":"10.1109/ICIS.2013.6607857","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607857","url":null,"abstract":"Distributed data mining of association rules is an area of data mining which intends to find association rules over items geographically across the network. Several researches have been performed in this field as applications have started to exploit distributed databases. Discovering rare association rules is a new area of distributed mining research. In this paper, an algorithm for discovering rare association rules in distributed environment is proposed. It utilized the idea of using statistic percentile to produce multiple minimum supports to mine rare association rules. Finally, the proposed algorithm has been implemented and evaluated by comparing with the Optimized Distributed Association rule Mining (ODAM) algorithm and the Apriori with Multiple Support Generating by statistic Percentile threshold (Apriori MSG-P) algorithm. The result shows that the proposed algorithm can discover more rare association rules with an optimized communication cost.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114185882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An approach to the generalization of firewall rules 防火墙规则泛化的一种方法
Wei Li, H. Wan, Sheng Li
{"title":"An approach to the generalization of firewall rules","authors":"Wei Li, H. Wan, Sheng Li","doi":"10.1109/ICIS.2013.6607841","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607841","url":null,"abstract":"Modern firewalls are becoming complex and anomalies may exist in their rule sets. Security log data, such as firewall logs and logs generated by intrusion detection systems, could provide useful information for the update and addition of existing firewall rule sets. In this paper, we focus on the development of an effective mechanism for firewall rule generation, and proposed an algorithm called Domain-Specific Rule Generation (DSRG) algorithm. The algorithm integrates domain-specific network configuration information to help with the generalization of firewall rules based on security log data. These generalized rules could help with the anomaly check or used as an addition for existing rule sets.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service value broker patterns: Towards the foundation 服务价值代理模式:走向基础
Yucong Duan, A. Kattepur, Hui Zhou, Ying Chang, Mengxing Huang, Wencai Du
{"title":"Service value broker patterns: Towards the foundation","authors":"Yucong Duan, A. Kattepur, Hui Zhou, Ying Chang, Mengxing Huang, Wencai Du","doi":"10.1109/ICIS.2013.6607832","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607832","url":null,"abstract":"We identify that to improve the reusability of implementation in service engineering, we need to collect and modulate reusable strategy, knowledge and experience crossing business modeling, knowledge management and economic analysis simultaneously from an interdisciplinary perspective. Strategically to ease the complexity, we adopt the existing experience from design patterns by forming a service design pattern called service value broker(SVB). SVB can efficiently integrate the three domains with relieved complexity, enhanced reusability and efficiency, etc, catering different abstraction levels. In this paper, we focus on modeling the foundational aspects of SVB presentation and value transaction, etc.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A study on the continuous using intention of traveling website 旅游网站持续使用意向研究
Dauw-Song Zhu, R. Lee, Min-Jon Kuo, Tsu-Sheng Lin
{"title":"A study on the continuous using intention of traveling website","authors":"Dauw-Song Zhu, R. Lee, Min-Jon Kuo, Tsu-Sheng Lin","doi":"10.1109/ICIS.2013.6607851","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607851","url":null,"abstract":"This study utilized information system (IS) success model and technology acceptance model (TAM) as foundation and adopted theories of service quality and customer satisfaction to discuss the intention of continuous using traveling websites. Owing to the advantages of comparing prices and itineraries through Internet with ease, how to hold potential customers' eyes on their own websites is always the top topic for firms in relevant traveling industries. This study proposed a framework, containing constructs of information quality, system quality, service quality, perceived playfulness, perceived ease of use, perceived usefulness, customer satisfaction, and continuance intention, and inferred that this framework could effectively elucidate the mechanism of potential customers' continuous intention of usage.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptation of Region Growing thresholds using Memetic Programming algorithm 基于模因规划算法的区域生长阈值自适应
A. Ayman, Emad Hamdy, Zanaty Elnomery
{"title":"Adaptation of Region Growing thresholds using Memetic Programming algorithm","authors":"A. Ayman, Emad Hamdy, Zanaty Elnomery","doi":"10.1109/ICIS.2013.6607812","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607812","url":null,"abstract":"This paper presents a new strategy for the segmentation of brain images from the volumetric Magnetic Resonance Imaging (MRI). We propose a new segmentation technique that hybridize an evolutionary algorithm, called the Memetic Programming (MP) algorithm, with the Region Growing (RG) technique. The MP algorithm generates new threshold functions and then the RG uses these thresholds to perform an efficient segmentation of MRI images. The proposed segmentation technique are tested through a set of medical images with different noise and Radio Frequency (RF) levels. The experimental results show that the proposed technique produces more accurate and promising results.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126898683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of offense tactics of basketball games using link prediction 篮球赛进攻战术的链球预测分析
Zhang Tao, Gongzhu Hu, Qi Liao
{"title":"Analysis of offense tactics of basketball games using link prediction","authors":"Zhang Tao, Gongzhu Hu, Qi Liao","doi":"10.1109/ICIS.2013.6607842","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607842","url":null,"abstract":"Every basketball game has a lot of game records, also called match data. All the data are not only statistical but also logical and spatial. People normally use these kind of data to obtain statistical or summarized information of the games, but few have used these data to analyze the teams' tactics. In this paper, we present an approach to analyze the match data for detecting basketball teams' tactic using link prediction method. The main idea is to create a measure for the team offense tactics based on the Basketball Analysis Graph (BA graph) and use link prediction to extract the information about the cooperation between teammates and offense priority. The information may be used for basketball game strategy assistance.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124854884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Universal Words relationship question-answering from UNL Ontology 基于UNL本体的通用词关系问答
Md. Anwarus Salam Khan, H. Uchida, Setsuo Yamada, T. Nishino
{"title":"Universal Words relationship question-answering from UNL Ontology","authors":"Md. Anwarus Salam Khan, H. Uchida, Setsuo Yamada, T. Nishino","doi":"10.1109/ICIS.2013.6607877","DOIUrl":"https://doi.org/10.1109/ICIS.2013.6607877","url":null,"abstract":"Universal Networking Language (UNL) represents natural language sentences as a semantic network of Universal Words (UWs). UNL Ontology provides the semantic background using relations for each UWs. However UWs are formal and all information provided by the UNL Ontology may not be understandable for human without the UNL specification. Especially we need to ensure the UW dictionary editors can understand the UWs information stored in UNL Ontology. To understand the UWs information, this research propose a question-answering system to provide the relationship information by explaining UWs relations with natural language. Using this system, the editors can easily understand the relationship information stored in UNL ontology.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信