Benjamin J. Ford, Haiping Xu, Christopher K. Bates, S. Shatz
{"title":"Model-Based Specification of Flexible and Complex Bidding Strategies in Agent-Based Online Auctions","authors":"Benjamin J. Ford, Haiping Xu, Christopher K. Bates, S. Shatz","doi":"10.1109/ITNG.2009.29","DOIUrl":"https://doi.org/10.1109/ITNG.2009.29","url":null,"abstract":"Current implementations of agent-based online auction systems only support simple predefined bidding strategies for bidding agents. In this paper, we introduce a formal bidding strategy model for specification of flexible and complex bidding strategies. The formal model is defined as a layered bidding strategy model (LBSM), which can be represented using notations borrowed from UML activity diagrams. To support real-time and efficient reasoning, the formal model is converted into a rule-based bidding strategy model (RBSM) specified in bidding strategy language (BSL) that can be directly executed by a reasoning module of a bidding agent. We present an algorithm for converting an LBSM to an RBSM, and an algorithm to drive the reasoning engine. Finally, we develop a prototype agent-based online auction system using JADE, and illustrate how flexible and complex bidding strategies can be precisely specified and efficiently executed.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Flexible Notification System for Stocks Investors","authors":"J. Al-Jaroodi, N. Mohamed","doi":"10.1109/ITNG.2009.279","DOIUrl":"https://doi.org/10.1109/ITNG.2009.279","url":null,"abstract":"This paper discusses a new flexible system to monitor stocks information available from web services or dynamic HTML documents. This system allows users to use any public information available on the Internet for defining notification criteria. This opens up a huge repository of dynamic information related to stock investments such as current stock prices, daily trading volumes, current offer prices and volumes, current bid prices and volumes, n-day trading averages, interest rates, currency exchange rates, etc. All this public information can be used to define the stocks monitoring criteria based on the specific investor requirements. Based on the defined criteria, notification messages are generated and sent to the investor notifying him/her whenever the criteria are met. A number of applications related to stocks investment can benefit from this system.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joseph D'Alessandro, Cynthia D. Tanner, Bonnie W. Morris, T. Menzies
{"title":"Is Continuous Compliance Assurance Possible?","authors":"Joseph D'Alessandro, Cynthia D. Tanner, Bonnie W. Morris, T. Menzies","doi":"10.1109/ITNG.2009.270","DOIUrl":"https://doi.org/10.1109/ITNG.2009.270","url":null,"abstract":"The increased threat of legal sanctions or fines for failure to comply with laws and regulations make it imperative that auditors assess the level of compliance with information sharing policies and regulations in a timely manner. Embedding a monitoring mechanism, such as our Continuous Compliance Assurance (CCA) module, into a technology solution for inter-organizational information sharing, if not too costly in processing, would ensure appropriately timed compliance enforcement. A test-bed, which incorporated our CCA module, was built to capture realistic processing statistics. Through this test-bed, we have observed a limiting factor imposed by XML based processing. The feasibility of CCA rests on the reduction of these limiting factors. Accordingly we present two approaches to mitigate these issues.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology to Extract Emotions and add Expressions in Speech Synthesis","authors":"M. Chandak, R. Dharaskar","doi":"10.1109/ITNG.2009.337","DOIUrl":"https://doi.org/10.1109/ITNG.2009.337","url":null,"abstract":"This paper presents the methodology to extract emotion from the text at real time and add the expression to the documents contents during speech synthesis. To understand the existence of emotions self assessment test was carried out on set of documents and preliminary rules were formulated for three basic emotions: Pleasure, Arousal and Dominance. These rules are used in an automated procedure that assigns emotional state values to document contents. These values are then used by speech synthesizer to add emotions to speech. The system is language independent and content free.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"35 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120901436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Access and Semantic Integration Based on OGSA-DQP","authors":"Wenzheng Li, Xiaoxia Hu","doi":"10.1109/ITNG.2009.71","DOIUrl":"https://doi.org/10.1109/ITNG.2009.71","url":null,"abstract":"OGSA-DQP provides distributed query processing functionalities on top of OGSA-DAI, presenting the multiple databases as a single one, but it does not address heterogeneous data semantic integration requirements. This paper show the query reformulation based on rules on top of OGSA-DAI and OGSA-DQP, which can implement heterogeneous data semantic integration, and users can submit queries over a single database and receive the results from multiple databases that semantically correlated with the former on by it.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121038885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inference of Online Auction Shills Using Dempster-Shafer Theory","authors":"Fei Dong, S. Shatz, Haiping Xu","doi":"10.1109/ITNG.2009.28","DOIUrl":"https://doi.org/10.1109/ITNG.2009.28","url":null,"abstract":"We present a shilling behavior detection and verification approach for online auction systems. Assuming a model checking technique to detect shill suspects in real-time, we focus on how to verify shill suspects using Dempster-Shafer theory of evidence. To demonstrate the feasibility of our approach, we provide a case study using real eBay auction data. The analysis results show that our approach can detect shills and that using Dempster-Shafer theory to combine multiple sources of evidence of shilling behavior can reduce the number of false positive results that would be generated from a single source of evidence.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Peer-to-Peer Federated Authentication System","authors":"Myong H. Kang, Amitabh Khashnobish","doi":"10.1109/ITNG.2009.159","DOIUrl":"https://doi.org/10.1109/ITNG.2009.159","url":null,"abstract":"A Federated identity management system extends identity information across multiple security domains. It is an enabler for sharing information and services among organizations while respecting the authorization decisions of each organization. Federation can be realized in two ways: 1) Conventional federation that is based on a multilateral agreement among participants and 2) Peer-to-peer (P2P) federation that is based on bilateral agreements. In this paper, we introduce a P2P federated authentication system based on the OASIS security assertion markup language (SAML) version 2.0 standard. The P2P federation model is simpler and more flexible than the conventional federation model even though managing peer relationships becomes a burden if the number of peers gets unmanageably large. The conventional federation model and P2P federation model are not mutually exclusive. The two models can co-exist and interoperate.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125929317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling Techniques for Multi-Core Architectures","authors":"Akira Hatanaka, N. Bagherzadeh","doi":"10.1109/ITNG.2009.219","DOIUrl":"https://doi.org/10.1109/ITNG.2009.219","url":null,"abstract":"In this paper we propose a template of architectures that comprise of multiple autonomous processors interconnected via FIFO links. We extend conventional list scheduling algorithm to schedule applications on the proposed distributed architecture template. We explain how a graph representation of an architecture can be used to route operands and how edge weights are assigned to find the shortest legal path an operand can take. We also propose a technique to shorten the path an operand takes by exploiting the copies of the operand distributed over the architecture. Finally, we show the effectiveness of the proposed techniques in reducing execution times of selected benchmarks.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125307764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rodel Balingit, Jarrod Trevathan, Yong Jin Lee, W. Read
{"title":"A Software Tool for Collecting Data from Online Auctions","authors":"Rodel Balingit, Jarrod Trevathan, Yong Jin Lee, W. Read","doi":"10.1109/ITNG.2009.147","DOIUrl":"https://doi.org/10.1109/ITNG.2009.147","url":null,"abstract":"Online auctions are increasingly becoming the platform of choice for dubious sellers to engage anonymously in fraudulent behaviour. While researchers are noble in their efforts to devise mechanisms to counter auction fraud, they are often frustrated by the lack of available auction data. Such data is an invaluable tool to gain insight about fraudulent traits and for testing proposed security remedies. This is compounded by online auction sources being non-cooperative in providing auction data, usually citing \"security and privacy'' as reasons for not wanting to help. This paper presents a software tool that can extract data from various online auction sources. The system is able to collect all the data for a given search criteria on auctions that have completed, and also returns later to collect the data from ongoing auctions once they have completed (without user intervention). We share our experiences from the development process and describe the challenges that must be overcome to successfully set up such a system. The data collected is used to analyse the behaviour and bidding patterns of sellers and buyers that are engaged in online auctions. The work presented in this paper represents the first serious attempt at creating an openly available software tool and establishing a repository of online auction data that will be free for use by other researchers.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126772013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subhash Uppalapati, John C. Femiani, A. Razdan, K. Gary
{"title":"3D VQI: 3D Visual Query Interface","authors":"Subhash Uppalapati, John C. Femiani, A. Razdan, K. Gary","doi":"10.1109/ITNG.2009.331","DOIUrl":"https://doi.org/10.1109/ITNG.2009.331","url":null,"abstract":"The 3D Visual Query Interface (3D VQI) is a web-based database application that allows for shape-based searches in addition to more traditional text-based queries of the 3D vessel dataset. This interface allows researchers remote access to vessel collection that can be analyzed from anywhere in the world. The interface is divided into two sections with right half supporting the ability to draw profile curve both symmetric and asymmetric. This query can be further refined using the left half which provides contextual based information. Using a curve-matching algorithm the software then searches the database and returns a series of potential matches sorted by the percentage of similarity between the curves. Each match can then be selected for more detailed viewing of the 3D model and data or for further analysis.","PeriodicalId":347761,"journal":{"name":"2009 Sixth International Conference on Information Technology: New Generations","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}