{"title":"Behavior-Based Web Page Evaluation","authors":"Ganesan Velayathan, S. Yamada","doi":"10.1109/WI-IATW.2006.51","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.51","url":null,"abstract":"This paper describes our efforts to investigate factors in a user's browsing behavior to help automatically evaluate Web pages that the user shows interest in. To evaluate a Web page automatically, we have developed a client-side logging/analyzing tool: the GINIS framework. We do not focus on clicking, scrolling, navigation, or duration of visit alone, but we propose integrating these patterns of interaction to recognize and evaluate a user's response to a given Web page. Unlike most previous Web studies that have analyzed access seen at proxies or server, this work focuses primarily on client site user behavior using a customized Web browser. First, GINIS unobtrusively gathers logs of user behavior through the user's natural interaction with the Web browser. Then it analyses the logs and extracts effective rules to evaluate Web pages using a machine-learning method. Eventually, GINIS is able to automatically evaluate Web pages using these learned rules, after which the evaluation can be utilized in a variety of user profiling","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126724537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metasynthetic Decision Support System for Water Resource Management","authors":"Zhang Yongjin, Su Yiming, Zhou Wei, Xie Jian-cang","doi":"10.1109/WI-IATW.2006.89","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.89","url":null,"abstract":"Developing water resource management decision support system is generally complex task. The most important gap between theories and practice has not been processed. In this paper, the authors propose water resource management DSS based on metasynthetic wisdom (WRM-MDSS), which is based on the understanding of that the DSS of water resource management is an open complex giant system and knowledge visualization. With the applying of metasynthetic wisdom theory, WRM-MDSS is built as a technology way to implement the theory of metasynthetic wisdom","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defeasible Protocols in Persuasion Dialogues","authors":"I. A. Letia, Raluca Vartic","doi":"10.1109/WI-IATW.2006.56","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.56","url":null,"abstract":"Defeasible protocols lead to a more refined and accurate handling of persuasion dialogues, important in human-artificial agent communication, a step forward to effective practical argumentation support systems","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bayesian Network Approach to Detecting Privacy Intrusion","authors":"X. An, D. Jutla, N. Cercone","doi":"10.1109/WI-IATW.2006.6","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.6","url":null,"abstract":"Personal information privacy could be compromised during information collection, transmission, and handling. In information handling, privacy could be violated by both the inside and the outside intruders. Though, within an organization, private data are generally protected by the organization's privacy policies and the corresponding platforms for privacy practices, private data could still be misused intentionally or unintentionally by individuals who have legitimate access to them in the organization. In this paper, we propose a Bayesian network-based method for insider privacy intrusion detection in database systems","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the Detection of Breaking News from Online Web Search Keywords","authors":"T. Murata","doi":"10.1109/WI-IATW.2006.134","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.134","url":null,"abstract":"People perform keyword search on search engines in order to find information from the Web. Keywords given to search engines can be regarded as the resources for detecting people's information needs. It is often reported that many people perform search intensively after worldwide disasters or accidents. This paper describes a method for detecting breaking news from search keywords that are available online. In our method, real time search keywords are obtained and matched with news words extracted from a news site. Experimental results show that our method has abilities of detecting search keywords related to worldwide news","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiangnan Qiu, Yongxiang Yao, Yanzhang Wang, Xuehua Wang
{"title":"Research on E-Government Knowledge Navigation System Based on XTM","authors":"Jiangnan Qiu, Yongxiang Yao, Yanzhang Wang, Xuehua Wang","doi":"10.1109/WI-IATW.2006.111","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.111","url":null,"abstract":"Against problem on current government portal navigation system is mostly based on keyword. An XTM-based e-government knowledge navigation system model was proposed, and a XTM based association and occurrences measurement mechanism is imported to the system. Especially based on analyses of topic relative semantic structure, a tree-structure semantic architecture is extracted from XTM by dividing the type of topic association. Semantics relatedness is introduced in the article to expand the second level association and calculate the degree of topic relative. The results show that the system has a good effectiveness and efficiency of navigation","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125763754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agent Coordination Based on Semantic Approximation","authors":"Yinglong Ma, Kehe Wu, Yi-Lin Zheng, Wei Li","doi":"10.1109/WI-IATW.2006.93","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.93","url":null,"abstract":"Within multi-agent systems, it is almost impossible for multiple Web agents to completely share a same semantic vocabulary. Because of incomplete information and ontological heterogeneity, an agent can partially understand the contents of other ontologies. This makes multi-agent communication rather difficult. In this paper, we utilize semantic approximation for implementing better multi-agent communication based on partial shared distributed ontologies, and hence achieve coordination query among multiple agents. We also developed a multi-agent coordination system based on semantic approximation","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125684842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-Based Support System for Flood Response Operation","authors":"N. Katuk, K. Ku-Mahamud, N. Norwawi, S. Deris","doi":"10.1109/WI-IATW.2006.147","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.147","url":null,"abstract":"In most countries in the world, flood had caused damages to properties and it involved a large amount of loss to individuals and governments. During the flood, it is important to have efficient flood response operation system to manage all activities among different related agencies. In Malaysia, flood response operations are divided according to the jurisdiction of flood area. If the flood covers only one district, then it will be under the supervision of the respective district office, otherwise, when it covers multiple districts, the State Government Secretary Department will be responsible to monitor the situation. The related agencies applied manual flood data compilation and report generation. During emergency circumstances, fast and accurate electronic information system is highly desired to ensure that the appropriate support and assistance have been provided. This article focuses on Web-based support system for flood response operations which offers fast and accurate information during flood emergency situation","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115536471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Semantic Exchange Method and Architecture on the Heterogeneous Product Information in the Virtual Organization","authors":"Chengfeng Jian, Meiyu Zhang","doi":"10.1109/WI-IATW.2006.131","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.131","url":null,"abstract":"Aimed at the uniform classification of product information including STEP and SGML, the exchange method and architecture on the OWL/XML-based product information are put forward at first. And then build the semantic association by the two description layers: the XML template for syntax layer and the OWL template for semantic layer. At last, with the process of the system realization method, it can solve the question of the heterogeneous workspace, system and information, and meet the requirement of dynamic and agility","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116436038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Informed Recommender Agent: Utilizing Consumer Product Reviews through Text Mining","authors":"S. Aciar, Debbie Zhang, S. Simoff, J. Debenham","doi":"10.1109/WI-IATW.2006.79","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.79","url":null,"abstract":"Consumer reviews, opinions and shared experiences in the use of a product form a powerful source of information about consumer preferences that can be used for making recommendations. A novel framework, which utilizes this valuable information sources first time to create recommendations in recommender agents was recently developed by the authors. In this recommender agent, the most critical issue is how to convert the review comments into ontology instances that can be understood and utilized by computers. This problem was not addressed in our previous work. This paper presents an automatic mapping process using text mining techniques. The ontology contains a controlled vocabulary and their relationships. The attributes of the ontology are learnt from the semantic features in the review comments using supervised learning techniques. The proposed approach is demonstrated using a case study of digital camera reviews","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124220931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}