J. Machado, F. Andrade, J. Neves, P. Novais, Cesar Analide
{"title":"Formal Models in Web Based Contracting","authors":"J. Machado, F. Andrade, J. Neves, P. Novais, Cesar Analide","doi":"10.1109/WI-IATW.2006.74","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.74","url":null,"abstract":"Legal principles have some difficulty to deal with software agents celebrating contracts and operating in e-commerce environments without direct human intervention. Autonomous intelligent agents have a control on their own actions and states, supporting or taking effective decisions. Therefore, some qualitative parameters such as trust, reputation and quality of information have to be taken under consideration to evaluate, certify and justify such decisions. Indeed, this paper shows how to construct a dynamic virtual world of complex and interacting entities or agents, organized in terms of multi-agent systems (MAS), that compete against one another in order to solve a particular problem, according to a rigorous selection regime in which its fitness is judged by one criterion alone, a measure of the quality of information of the agent or agents, here understood as evolutionary logic theories. This virtual world could witness the emergence of our first learning, thinking machines, that may cater for some issues on the evolution of formal models of the world in general, and on what is concerned with the objectives set to this work, in contracting, and foray into a vast, untapped technological market","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leonardo Rigutini, E. Iorio, M. Ernandes, Marco Maggini
{"title":"Semantic Labeling of Data by Using the Web","authors":"Leonardo Rigutini, E. Iorio, M. Ernandes, Marco Maggini","doi":"10.1109/WI-IATW.2006.118","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.118","url":null,"abstract":"This paper proposes a system for automatically categorizing terms or lexical entities into a predefined set of semantic domains. We present an approach that exploits the knowledge available in the Web to create a model of each term or entity (entity context lexicons - ECLs). Each profile is simply a list of terms (similar to the bag-of-words representation in text categorization) and it is composed primarily by the words often appearing in the same contexts of the entity. These profiles model the contexts in which the entity usually appears and they can be subsequently processed by an automatic classifier. Moreover, we propose and validate a profile-based categorization model developed for this particular task which uses the ECLs of the training entities to build a profile for each class (class context lexicon - CCL). Finally, we propose a technique for dealing with multi-label classification based on a decision module that exploits a neural network. We show the effectiveness of the proposed approach on a term categorization task using a standard benchmark composed of a set of domain-specific lexicons (WordNetDomains)","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures","authors":"D. Jutla, D. Kanevsky","doi":"10.1109/WI-IATW.2006.28","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.28","url":null,"abstract":"We provide a unified architecture, called SPACe, for secure, privacy-aware, and contextual multimedia systems in organizations. Many key and important architectural components already exist which contribute to a unified platform, including the classic data mining, security, and privacy-preserving components in conventional intelligent systems. After presenting an overview of our unified architecture, we focus on the state-of-the-art architectural components for user interaction in future systems - particularly multimedia voice interaction with intelligent systems. This paper shows how user-level conversational data mining (CDM) methods, coupled with biometric security, and enhanced with privacy-awareness, may be used with any Web information system architecture. Finally, we provide an example of our unified architecture through integrating a knowledge architecture for an e-finance application in the financial services domain. The resulting architectures benefit from added security, privacy-awareness, and contextual filtering at the user-level","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"128 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128397195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-Service Based Information Integration for e-Financial Planning System Matchmaking Decision Support","authors":"Kelvin K. K. Lee, Dickson K. W. Chiu, P. Hung","doi":"10.1109/WI-IATW.2006.149","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.149","url":null,"abstract":"Gathering and using information extracted and integrated from heterogeneous source for decision making is not an easy task, especially for the decisions of investment or selection of insurance, which are the two main components of financial planning. Well organized financial planning is significant to achieve their various life goals and quality after retiring. However, most people have inadequate investment knowledge to choose suitable investment tools for them. In this paper, we present a conceptual model to formalize such financial requirements and solutions under risk as well as our implementation based on Web services, which are essential for an effective electronic financial planning system (EFPS). This helps increase the quality of the consultation and decision support and lower the service costs due to process improvements","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dual-Method Model for Copy Detection","authors":"Yunyi Liu, L. Liang","doi":"10.1109/WI-IATW.2006.11","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.11","url":null,"abstract":"Web technological advances have rendered readily accessible resources making the task of plagiarizing research work of others easier. A dual-method model for copy detection of copyrights violation is presented. One method is ranking while the other is fingerprinting. A prototype system was developed to test the applicability of the model for detecting duplicates on a collection of technical articles and research papers. Experiments were run to determine the effects of combining the two methods in various detecting strategies. Results reveal that combination of the two methods yields better results than employing each method individually","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128563853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks","authors":"Piya Techateerawat, A. Jennings","doi":"10.1109/WI-IATW.2006.65","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.65","url":null,"abstract":"Security is a significant concern for many sensor network applications. Intrusion detection is one method of defending against attacks. However, standard intrusion detection is not suitable for sensor networks with limited battery power, memory and processing resources. This paper compares several approaches to intrusion detection in sensor networks. We investigate accuracy of detecting attacks, versus energy efficiency","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124261008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extracting Topic Maps from Web Histories by Clustering with Web Structure and Contents","authors":"M. Mase, S. Yamada","doi":"10.1109/WI-IATW.2006.71","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.71","url":null,"abstract":"In this paper, we propose a clustering method to extract topic maps from the Web browsing history. We improve the structure-based hierarchical clustering method using the contents similarity of the pages and the weight by the types of links and the hierarchical difference of the directories in which the pages are located. The topic maps show the topics that user has seen or not in Web browsing and the relationships between the topics. Using the Web browsing history, we experimentally extract the topic map and evaluate it","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133969943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the Diversity of Sensitive Attributes in k-Anonymity","authors":"Min Wu, Xiaojun Ye","doi":"10.1109/WI-IATW.2006.135","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.135","url":null,"abstract":"Privacy preservation is an important and challenging problem in microdata release. As a de-identification model, k-anonymity has gained much attention recently. While focusing on identity disclosures, k-anonymity does not well resolve attribute disclosures. In this paper we focus on the sensitive attribute disclosures in k-anonymity and propose an ordinal distance based sensitivity aware diversity metric. We assume the more diversity the sensitive attribute assumes in an equivalence class in a k-anonymized table, the less inference channel there is in the equivalence class","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generic Natural Language Command Interpretation in Ontology-Based Dialogue Systems","authors":"Laurent Mazuel, N. Sabouret","doi":"10.1109/WI-IATW.2006.75","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.75","url":null,"abstract":"This paper presents a general architecture towards a more generic approach to conversational agents. Our architecture contains generic (in sense of application independent) natural language (NL) modules that are based on ontologies for command interpretation. We focus on the presentation of the event generator and dialogue manager modules which rely on a bottom-up approach for matching the user's command with the set of currently possible actions","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocol and Connectivity Based Overlay Level Capacity Calculation of P2P Networks","authors":"Kasim Oztoprak, H. Kiliç","doi":"10.1109/WI-IATW.2006.108","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.108","url":null,"abstract":"In this paper, we proposed a metric for P2P networks based on Shannon's L-channel capacity calculation idea. The metric calculates the maximum rate of information (in bits per second) that can be transmitted over P2P network (a.k.a. combinatorial capacity) caused by protocol and overlay-level connectivity. We suggest P2P systems to be modeled as a discrete noiseless channel on which the protocol together with dynamically changing overlay-level instant connectivity topology defines a Shannon language. In experimental works, we applied the metric first to the Gnutella 0.6 protocol for which message traffic explosion is a known problem and then to its time-based clustering version. The obtained results are compared with other two known metrics' namely, number of query hits and unit query-hit response time, results and potential correlations among them are discussed","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}