2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops最新文献

筛选
英文 中文
Discernibility Matrix Based Algorithm for Reduction of Attributes 基于差别矩阵的属性约简算法
Ruizhi Wang, D. Miao, Guirong Hu
{"title":"Discernibility Matrix Based Algorithm for Reduction of Attributes","authors":"Ruizhi Wang, D. Miao, Guirong Hu","doi":"10.1109/WI-IATW.2006.58","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.58","url":null,"abstract":"In rough set theory, it has been proved that finding the minimal reduct of information systems or decision tables is a NP-complete problem. Therefore, it is hard to obtain the set of the most concise rules by existing algorithms for reduction of knowledge. In this paper, the method of finding sub-optimal reduct based on discernibility matrix is proposed. In general, our method is better than existing methods with respect to the minimal reduct. However, we find that existing minimal reduct searching algorithms are incomplete for reduction of attributes in information systems or decision tables. Through analysis, we present a conjecture about the completeness of the minimal reduct algorithm","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128863464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Integrating Processes of Logistics Outsourcing Risk Management in e-Business 电子商务环境下物流外包风险管理的集成流程
Juan Xu, Zhixue Liu, Yan Li
{"title":"Integrating Processes of Logistics Outsourcing Risk Management in e-Business","authors":"Juan Xu, Zhixue Liu, Yan Li","doi":"10.1109/WI-IATW.2006.81","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.81","url":null,"abstract":"Logistics outsourcing has been recognized to have important potential benefits, including reduced costs, improved quality, the ability to focus on core competencies and access to new technologies. Most prior studies have articulated the advantages of logistics outsourcing and paid little attention to the risks in e-business environments. The main purpose of this study is to present how the current logistics outsourcing risk management process can be integrated and improved through the use of new e-business applications","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122405217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CCML: A Novel Service Composition Language 一种新颖的服务组合语言
Xiuguo Zhang, Weishi Zhang
{"title":"CCML: A Novel Service Composition Language","authors":"Xiuguo Zhang, Weishi Zhang","doi":"10.1109/WI-IATW.2006.52","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.52","url":null,"abstract":"This paper presents a novel service composition language called CCML. Its distinct advantage from conventional composition languages is its ability to describe behaviors of interacting services and the composition of these behaviors. Interaction rules among services rely on a cooperative computation model, i.e. KPN (Kahn process network), which adopts dataflow and channel based asynchronous communication pattern among process nodes. The employment of dataflow based computation model of KPN enables CCML to avoid complicated control flow mechanisms. Formal model for behavioral semantics of CCML is based on CCS process algebra which presents a high expressive power, capable of capturing CCML behavioral semantics. We give an operational semantics to CCML in the form of a labeled transition system (LTS). Finally, we introduce an application case to show how to describe service composition using CCML","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Process Matchmaking on a P2P Environment P2P环境下的进程配对
R. Çelebi, Huseyin Ellezer, Cem Baylam, I. Cereci, H. Kiliç
{"title":"Process Matchmaking on a P2P Environment","authors":"R. Çelebi, Huseyin Ellezer, Cem Baylam, I. Cereci, H. Kiliç","doi":"10.1109/WI-IATW.2006.106","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.106","url":null,"abstract":"A process matchmaking environment based on P2P architecture and Gnutella protocol is established. Java agent development framework (JADE) is used as middleware. The processes are modeled as one-input transition systems augmented by goal state descriptions. A polynomial-time algorithm for handling matchmaking of peer process encounters is developed. The environment can easily be customized to a specific application domain by simple user-interface modifications and through the development of related state ontologies","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Exploiting Data Mining Techniques for Improving the Efficiency of a Supply Chain Management Agent 利用数据挖掘技术提高供应链管理代理的效率
A. Symeonidis, V. Nikolaidou, P. Mitkas
{"title":"Exploiting Data Mining Techniques for Improving the Efficiency of a Supply Chain Management Agent","authors":"A. Symeonidis, V. Nikolaidou, P. Mitkas","doi":"10.1109/WI-IATW.2006.69","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.69","url":null,"abstract":"Supply chain management (SCM) environments are often dynamic markets providing a plethora of information, either complete or incomplete. It is, therefore, evident that such environments demand intelligent solutions, which can perceive variations and act in order to achieve maximum revenue. To do so, they must also provide some sophisticated mechanism for exploiting the full potential of the environments they inhabit. Advancing on the way autonomous solutions usually deal with the SCM process, we have built a robust and highly-adaptable mechanism for efficiently dealing with all SCM facets, while at the same time incorporating a module that exploits data mining technology in order to forecast the price of the winning bid in a given order and, thus, adjust its bidding strategy. The paper presents our agent, Mertacor, and focuses on the forecasting mechanism it incorporates, aiming to optimal agent efficiency","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116300127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trust Negotiations with Customizable Anonymity 可自定义匿名的信任协商
A. Squicciarini, Abhilasha Bhargav-Spantzel, E. Bertino, E. Ferrari, I. Ray
{"title":"Trust Negotiations with Customizable Anonymity","authors":"A. Squicciarini, Abhilasha Bhargav-Spantzel, E. Bertino, E. Ferrari, I. Ray","doi":"10.1109/WI-IATW.2006.138","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.138","url":null,"abstract":"Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosing digital credentials and policies. Credentials, exchanged during trust negotiations, often contain sensitive attributes that attest to the properties of the credential owner. Uncontrolled disclosure of such sensitive attributes may cause grave damage to the credential owner. Research has shown that disclosing non-sensitive attributes only can cause identity to be revealed as well. Consequently, we impose a stronger requirement: our negotiations should have the k-anonymity property the set of credentials submitted by a subject during a negotiation should be equal to k other such sets received by the counterpart during earlier negotiations. In this paper we propose a protocol that ensures k-anonymity. Our protocol has a number of important features. First, a credential submitter before submitting its set of credentials has the assurance that its set will be identical to k other sets already stored with the counterpart. Second, we provide a cryptographic protocol ensuring that the credentials submitted by the submitter during different negotiations cannot be linked to each other. Third, we ensure that the critical data exchanged during the protocol is valid. Fourth, the major part of the protocol involves the negotiating parties only; the protocol invokes the validator only when some critical information needs to be validated","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126730746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
leK, Dge-Interleaving Structuring Technique for Peer-Peer Overlay Network leK, D ge -对等覆盖网络的交错结构技术
K. Ragab, A. Yonezawa
{"title":"leK, Dge-Interleaving Structuring Technique for Peer-Peer Overlay Network","authors":"K. Ragab, A. Yonezawa","doi":"10.1109/WI-IATW.2006.1","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.1","url":null,"abstract":"Rendezvous overlay network (RvON) enables the smaller/medium service providers (SP) to publish their services' advertisements. Moreover, it allows end-users to discover the services associated with these advertisements. An autonomic K-interleaving step-step construction scheme is proposed (K. Ragab and A. Yonezawa, 2006) that autonomously organizes RvON into RvON-Clusters, where (K+1) is the physical number of hops between any two rendezvous nodes stored the same advertisement in RvON. Thus, end-users accessing from different areas are able to discover services' advertisements within a constant K physical number of hops. However in dense networks, increasing the size of RvON-Clusters induces a long diameter that manifests high stress per physical links and high delay to discover service's advertisement. This paper limits the expansion of RvON-Cluster within a specific diameter D. Each RvON-Cluster is organized with at most D logical hops over K physical hops. Thus, doubtless end-users are able to efficiently discover services' advertisements within D logical hops over K physical hops with reasonable storage and bandwidth consumption","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantics Recognition in Service Composition Using Conceptual Graph 基于概念图的服务组合语义识别
Xiaofeng Du, William W. Song, M. Munro
{"title":"Semantics Recognition in Service Composition Using Conceptual Graph","authors":"Xiaofeng Du, William W. Song, M. Munro","doi":"10.1109/WI-IATW.2006.120","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.120","url":null,"abstract":"This paper addresses the issues of semantic representation of composite services and the relationships among the atomic services used to build the composite service, which have not been addressed sufficiently in current service description frameworks. Clear semantics and relationships among internal atomic services can enhance a composite service's reusability and comprehensibility. In this paper conceptual graph is used to address the issues. A composite service can be represented by merging atomic services' conceptual graphs into a larger and more specialized conceptual graph. The semantics and relations of this composite service can be clearly represented in the graph. Service requirements can be converted into conceptual graph too, and thus graph matching methods could be used to search for required services","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Semantic-Based Approach to Interoperability of UML Schemas 基于语义的UML模式互操作性方法
N. Y. Ayadi, Y. Pollet, M. Ahmed
{"title":"A Semantic-Based Approach to Interoperability of UML Schemas","authors":"N. Y. Ayadi, Y. Pollet, M. Ahmed","doi":"10.1109/WI-IATW.2006.19","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.19","url":null,"abstract":"We address in this paper the issue of a semantic interoperability between systems relying on semantically heterogeneous models, having been designed for the purpose of independent specific goals and activities. Examples of models include ER-schema, ontologies and taxonomies. In our approach, we make explicit the semantics embedded in UML class diagrams. Towards the high expressiveness of UML constructs, we formalize their semantics in terms of a logic belonging to description logics. However, in our opinion, description logics's constructors are not sufficient to express contextual knowledge, we propose a reference metamodel that offers contextual primitives","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Content-Based Clustered P2P Search Model Depending on Set Distance 基于内容的集距聚类P2P搜索模型
Jing Wang, Shoubao Yang
{"title":"Content-Based Clustered P2P Search Model Depending on Set Distance","authors":"Jing Wang, Shoubao Yang","doi":"10.1109/WI-IATW.2006.53","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.53","url":null,"abstract":"The main issues that affect query efficiency and search cost in content-based unstructured P2P search system are the complexity of computing the similarity of the documents brought by high dimensions and the great deal of redundant messages coming with flooding. This paper defines the documents similarity by the way of set distance. This method restrains the complexity of computing the document similarity in linear time. Also, this paper clusters the peers based on content by their set distance to reduce the query time and redundant messages. Simulations show that the content-based search model constructed by set distance not only has higher recall, but also reduce the search cost and query time to the rate of 40% and 30% of Gnutella","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信