2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops最新文献

筛选
英文 中文
Formal Models in Web Based Contracting 基于Web的合同中的正式模型
J. Machado, F. Andrade, J. Neves, P. Novais, Cesar Analide
{"title":"Formal Models in Web Based Contracting","authors":"J. Machado, F. Andrade, J. Neves, P. Novais, Cesar Analide","doi":"10.1109/WI-IATW.2006.74","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.74","url":null,"abstract":"Legal principles have some difficulty to deal with software agents celebrating contracts and operating in e-commerce environments without direct human intervention. Autonomous intelligent agents have a control on their own actions and states, supporting or taking effective decisions. Therefore, some qualitative parameters such as trust, reputation and quality of information have to be taken under consideration to evaluate, certify and justify such decisions. Indeed, this paper shows how to construct a dynamic virtual world of complex and interacting entities or agents, organized in terms of multi-agent systems (MAS), that compete against one another in order to solve a particular problem, according to a rigorous selection regime in which its fitness is judged by one criterion alone, a measure of the quality of information of the agent or agents, here understood as evolutionary logic theories. This virtual world could witness the emergence of our first learning, thinking machines, that may cater for some issues on the evolution of formal models of the world in general, and on what is concerned with the objectives set to this work, in contracting, and foray into a vast, untapped technological market","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116684455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semantic Labeling of Data by Using the Web 利用Web对数据进行语义标注
Leonardo Rigutini, E. Iorio, M. Ernandes, Marco Maggini
{"title":"Semantic Labeling of Data by Using the Web","authors":"Leonardo Rigutini, E. Iorio, M. Ernandes, Marco Maggini","doi":"10.1109/WI-IATW.2006.118","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.118","url":null,"abstract":"This paper proposes a system for automatically categorizing terms or lexical entities into a predefined set of semantic domains. We present an approach that exploits the knowledge available in the Web to create a model of each term or entity (entity context lexicons - ECLs). Each profile is simply a list of terms (similar to the bag-of-words representation in text categorization) and it is composed primarily by the words often appearing in the same contexts of the entity. These profiles model the contexts in which the entity usually appears and they can be subsequently processed by an automatic classifier. Moreover, we propose and validate a profile-based categorization model developed for this particular task which uses the ECLs of the training entities to build a profile for each class (class context lexicon - CCL). Finally, we propose a technique for dealing with multi-label classification based on a decision module that exploits a neural network. We show the effectiveness of the proposed approach on a term categorization task using a standard benchmark composed of a set of domain-specific lexicons (WordNetDomains)","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures 增加用户级空间:智能多媒体信息架构的安全性、隐私性和上下文
D. Jutla, D. Kanevsky
{"title":"Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures","authors":"D. Jutla, D. Kanevsky","doi":"10.1109/WI-IATW.2006.28","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.28","url":null,"abstract":"We provide a unified architecture, called SPACe, for secure, privacy-aware, and contextual multimedia systems in organizations. Many key and important architectural components already exist which contribute to a unified platform, including the classic data mining, security, and privacy-preserving components in conventional intelligent systems. After presenting an overview of our unified architecture, we focus on the state-of-the-art architectural components for user interaction in future systems - particularly multimedia voice interaction with intelligent systems. This paper shows how user-level conversational data mining (CDM) methods, coupled with biometric security, and enhanced with privacy-awareness, may be used with any Web information system architecture. Finally, we provide an example of our unified architecture through integrating a knowledge architecture for an e-finance application in the financial services domain. The resulting architectures benefit from added security, privacy-awareness, and contextual filtering at the user-level","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"128 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128397195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web-Service Based Information Integration for e-Financial Planning System Matchmaking Decision Support 基于Web-Service的电子理财系统信息集成及配对决策支持
Kelvin K. K. Lee, Dickson K. W. Chiu, P. Hung
{"title":"Web-Service Based Information Integration for e-Financial Planning System Matchmaking Decision Support","authors":"Kelvin K. K. Lee, Dickson K. W. Chiu, P. Hung","doi":"10.1109/WI-IATW.2006.149","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.149","url":null,"abstract":"Gathering and using information extracted and integrated from heterogeneous source for decision making is not an easy task, especially for the decisions of investment or selection of insurance, which are the two main components of financial planning. Well organized financial planning is significant to achieve their various life goals and quality after retiring. However, most people have inadequate investment knowledge to choose suitable investment tools for them. In this paper, we present a conceptual model to formalize such financial requirements and solutions under risk as well as our implementation based on Web services, which are essential for an effective electronic financial planning system (EFPS). This helps increase the quality of the consultation and decision support and lower the service costs due to process improvements","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Dual-Method Model for Copy Detection 一种双方法复制检测模型
Yunyi Liu, L. Liang
{"title":"A Dual-Method Model for Copy Detection","authors":"Yunyi Liu, L. Liang","doi":"10.1109/WI-IATW.2006.11","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.11","url":null,"abstract":"Web technological advances have rendered readily accessible resources making the task of plagiarizing research work of others easier. A dual-method model for copy detection of copyrights violation is presented. One method is ranking while the other is fingerprinting. A prototype system was developed to test the applicability of the model for detecting duplicates on a collection of technical articles and research papers. Experiments were run to determine the effects of combining the two methods in various detecting strategies. Results reveal that combination of the two methods yields better results than employing each method individually","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128563853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks 无线传感器网络中入侵检测系统的能量效率
Piya Techateerawat, A. Jennings
{"title":"Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks","authors":"Piya Techateerawat, A. Jennings","doi":"10.1109/WI-IATW.2006.65","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.65","url":null,"abstract":"Security is a significant concern for many sensor network applications. Intrusion detection is one method of defending against attacks. However, standard intrusion detection is not suitable for sensor networks with limited battery power, memory and processing resources. This paper compares several approaches to intrusion detection in sensor networks. We investigate accuracy of detecting attacks, versus energy efficiency","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124261008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Extracting Topic Maps from Web Histories by Clustering with Web Structure and Contents 基于Web结构和内容聚类的Web历史主题图提取方法
M. Mase, S. Yamada
{"title":"Extracting Topic Maps from Web Histories by Clustering with Web Structure and Contents","authors":"M. Mase, S. Yamada","doi":"10.1109/WI-IATW.2006.71","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.71","url":null,"abstract":"In this paper, we propose a clustering method to extract topic maps from the Web browsing history. We improve the structure-based hierarchical clustering method using the contents similarity of the pages and the weight by the types of links and the hierarchical difference of the directories in which the pages are located. The topic maps show the topics that user has seen or not in Web browsing and the relationships between the topics. Using the Web browsing history, we experimentally extract the topic map and evaluate it","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133969943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards the Diversity of Sensitive Attributes in k-Anonymity 论k-匿名中敏感属性的多样性
Min Wu, Xiaojun Ye
{"title":"Towards the Diversity of Sensitive Attributes in k-Anonymity","authors":"Min Wu, Xiaojun Ye","doi":"10.1109/WI-IATW.2006.135","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.135","url":null,"abstract":"Privacy preservation is an important and challenging problem in microdata release. As a de-identification model, k-anonymity has gained much attention recently. While focusing on identity disclosures, k-anonymity does not well resolve attribute disclosures. In this paper we focus on the sensitive attribute disclosures in k-anonymity and propose an ordinal distance based sensitivity aware diversity metric. We assume the more diversity the sensitive attribute assumes in an equivalence class in a k-anonymized table, the less inference channel there is in the equivalence class","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generic Natural Language Command Interpretation in Ontology-Based Dialogue Systems 基于本体的对话系统中的通用自然语言命令解释
Laurent Mazuel, N. Sabouret
{"title":"Generic Natural Language Command Interpretation in Ontology-Based Dialogue Systems","authors":"Laurent Mazuel, N. Sabouret","doi":"10.1109/WI-IATW.2006.75","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.75","url":null,"abstract":"This paper presents a general architecture towards a more generic approach to conversational agents. Our architecture contains generic (in sense of application independent) natural language (NL) modules that are based on ontologies for command interpretation. We focus on the presentation of the event generator and dialogue manager modules which rely on a bottom-up approach for matching the user's command with the set of currently possible actions","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protocol and Connectivity Based Overlay Level Capacity Calculation of P2P Networks 基于协议和连通性的P2P网络覆盖层容量计算
Kasim Oztoprak, H. Kiliç
{"title":"Protocol and Connectivity Based Overlay Level Capacity Calculation of P2P Networks","authors":"Kasim Oztoprak, H. Kiliç","doi":"10.1109/WI-IATW.2006.108","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.108","url":null,"abstract":"In this paper, we proposed a metric for P2P networks based on Shannon's L-channel capacity calculation idea. The metric calculates the maximum rate of information (in bits per second) that can be transmitted over P2P network (a.k.a. combinatorial capacity) caused by protocol and overlay-level connectivity. We suggest P2P systems to be modeled as a discrete noiseless channel on which the protocol together with dynamically changing overlay-level instant connectivity topology defines a Shannon language. In experimental works, we applied the metric first to the Gnutella 0.6 protocol for which message traffic explosion is a known problem and then to its time-based clustering version. The obtained results are compared with other two known metrics' namely, number of query hits and unit query-hit response time, results and potential correlations among them are discussed","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信