{"title":"Discernibility Matrix Based Algorithm for Reduction of Attributes","authors":"Ruizhi Wang, D. Miao, Guirong Hu","doi":"10.1109/WI-IATW.2006.58","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.58","url":null,"abstract":"In rough set theory, it has been proved that finding the minimal reduct of information systems or decision tables is a NP-complete problem. Therefore, it is hard to obtain the set of the most concise rules by existing algorithms for reduction of knowledge. In this paper, the method of finding sub-optimal reduct based on discernibility matrix is proposed. In general, our method is better than existing methods with respect to the minimal reduct. However, we find that existing minimal reduct searching algorithms are incomplete for reduction of attributes in information systems or decision tables. Through analysis, we present a conjecture about the completeness of the minimal reduct algorithm","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128863464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating Processes of Logistics Outsourcing Risk Management in e-Business","authors":"Juan Xu, Zhixue Liu, Yan Li","doi":"10.1109/WI-IATW.2006.81","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.81","url":null,"abstract":"Logistics outsourcing has been recognized to have important potential benefits, including reduced costs, improved quality, the ability to focus on core competencies and access to new technologies. Most prior studies have articulated the advantages of logistics outsourcing and paid little attention to the risks in e-business environments. The main purpose of this study is to present how the current logistics outsourcing risk management process can be integrated and improved through the use of new e-business applications","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122405217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CCML: A Novel Service Composition Language","authors":"Xiuguo Zhang, Weishi Zhang","doi":"10.1109/WI-IATW.2006.52","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.52","url":null,"abstract":"This paper presents a novel service composition language called CCML. Its distinct advantage from conventional composition languages is its ability to describe behaviors of interacting services and the composition of these behaviors. Interaction rules among services rely on a cooperative computation model, i.e. KPN (Kahn process network), which adopts dataflow and channel based asynchronous communication pattern among process nodes. The employment of dataflow based computation model of KPN enables CCML to avoid complicated control flow mechanisms. Formal model for behavioral semantics of CCML is based on CCS process algebra which presents a high expressive power, capable of capturing CCML behavioral semantics. We give an operational semantics to CCML in the form of a labeled transition system (LTS). Finally, we introduce an application case to show how to describe service composition using CCML","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Çelebi, Huseyin Ellezer, Cem Baylam, I. Cereci, H. Kiliç
{"title":"Process Matchmaking on a P2P Environment","authors":"R. Çelebi, Huseyin Ellezer, Cem Baylam, I. Cereci, H. Kiliç","doi":"10.1109/WI-IATW.2006.106","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.106","url":null,"abstract":"A process matchmaking environment based on P2P architecture and Gnutella protocol is established. Java agent development framework (JADE) is used as middleware. The processes are modeled as one-input transition systems augmented by goal state descriptions. A polynomial-time algorithm for handling matchmaking of peer process encounters is developed. The environment can easily be customized to a specific application domain by simple user-interface modifications and through the development of related state ontologies","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Data Mining Techniques for Improving the Efficiency of a Supply Chain Management Agent","authors":"A. Symeonidis, V. Nikolaidou, P. Mitkas","doi":"10.1109/WI-IATW.2006.69","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.69","url":null,"abstract":"Supply chain management (SCM) environments are often dynamic markets providing a plethora of information, either complete or incomplete. It is, therefore, evident that such environments demand intelligent solutions, which can perceive variations and act in order to achieve maximum revenue. To do so, they must also provide some sophisticated mechanism for exploiting the full potential of the environments they inhabit. Advancing on the way autonomous solutions usually deal with the SCM process, we have built a robust and highly-adaptable mechanism for efficiently dealing with all SCM facets, while at the same time incorporating a module that exploits data mining technology in order to forecast the price of the winning bid in a given order and, thus, adjust its bidding strategy. The paper presents our agent, Mertacor, and focuses on the forecasting mechanism it incorporates, aiming to optimal agent efficiency","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116300127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Squicciarini, Abhilasha Bhargav-Spantzel, E. Bertino, E. Ferrari, I. Ray
{"title":"Trust Negotiations with Customizable Anonymity","authors":"A. Squicciarini, Abhilasha Bhargav-Spantzel, E. Bertino, E. Ferrari, I. Ray","doi":"10.1109/WI-IATW.2006.138","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.138","url":null,"abstract":"Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosing digital credentials and policies. Credentials, exchanged during trust negotiations, often contain sensitive attributes that attest to the properties of the credential owner. Uncontrolled disclosure of such sensitive attributes may cause grave damage to the credential owner. Research has shown that disclosing non-sensitive attributes only can cause identity to be revealed as well. Consequently, we impose a stronger requirement: our negotiations should have the k-anonymity property the set of credentials submitted by a subject during a negotiation should be equal to k other such sets received by the counterpart during earlier negotiations. In this paper we propose a protocol that ensures k-anonymity. Our protocol has a number of important features. First, a credential submitter before submitting its set of credentials has the assurance that its set will be identical to k other sets already stored with the counterpart. Second, we provide a cryptographic protocol ensuring that the credentials submitted by the submitter during different negotiations cannot be linked to each other. Third, we ensure that the critical data exchanged during the protocol is valid. Fourth, the major part of the protocol involves the negotiating parties only; the protocol invokes the validator only when some critical information needs to be validated","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126730746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"leK, Dge-Interleaving Structuring Technique for Peer-Peer Overlay Network","authors":"K. Ragab, A. Yonezawa","doi":"10.1109/WI-IATW.2006.1","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.1","url":null,"abstract":"Rendezvous overlay network (RvON) enables the smaller/medium service providers (SP) to publish their services' advertisements. Moreover, it allows end-users to discover the services associated with these advertisements. An autonomic K-interleaving step-step construction scheme is proposed (K. Ragab and A. Yonezawa, 2006) that autonomously organizes RvON into RvON-Clusters, where (K+1) is the physical number of hops between any two rendezvous nodes stored the same advertisement in RvON. Thus, end-users accessing from different areas are able to discover services' advertisements within a constant K physical number of hops. However in dense networks, increasing the size of RvON-Clusters induces a long diameter that manifests high stress per physical links and high delay to discover service's advertisement. This paper limits the expansion of RvON-Cluster within a specific diameter D. Each RvON-Cluster is organized with at most D logical hops over K physical hops. Thus, doubtless end-users are able to efficiently discover services' advertisements within D logical hops over K physical hops with reasonable storage and bandwidth consumption","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantics Recognition in Service Composition Using Conceptual Graph","authors":"Xiaofeng Du, William W. Song, M. Munro","doi":"10.1109/WI-IATW.2006.120","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.120","url":null,"abstract":"This paper addresses the issues of semantic representation of composite services and the relationships among the atomic services used to build the composite service, which have not been addressed sufficiently in current service description frameworks. Clear semantics and relationships among internal atomic services can enhance a composite service's reusability and comprehensibility. In this paper conceptual graph is used to address the issues. A composite service can be represented by merging atomic services' conceptual graphs into a larger and more specialized conceptual graph. The semantics and relations of this composite service can be clearly represented in the graph. Service requirements can be converted into conceptual graph too, and thus graph matching methods could be used to search for required services","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic-Based Approach to Interoperability of UML Schemas","authors":"N. Y. Ayadi, Y. Pollet, M. Ahmed","doi":"10.1109/WI-IATW.2006.19","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.19","url":null,"abstract":"We address in this paper the issue of a semantic interoperability between systems relying on semantically heterogeneous models, having been designed for the purpose of independent specific goals and activities. Examples of models include ER-schema, ontologies and taxonomies. In our approach, we make explicit the semantics embedded in UML class diagrams. Towards the high expressiveness of UML constructs, we formalize their semantics in terms of a logic belonging to description logics. However, in our opinion, description logics's constructors are not sufficient to express contextual knowledge, we propose a reference metamodel that offers contextual primitives","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-Based Clustered P2P Search Model Depending on Set Distance","authors":"Jing Wang, Shoubao Yang","doi":"10.1109/WI-IATW.2006.53","DOIUrl":"https://doi.org/10.1109/WI-IATW.2006.53","url":null,"abstract":"The main issues that affect query efficiency and search cost in content-based unstructured P2P search system are the complexity of computing the similarity of the documents brought by high dimensions and the great deal of redundant messages coming with flooding. This paper defines the documents similarity by the way of set distance. This method restrains the complexity of computing the document similarity in linear time. Also, this paper clusters the peers based on content by their set distance to reduce the query time and redundant messages. Simulations show that the content-based search model constructed by set distance not only has higher recall, but also reduce the search cost and query time to the rate of 40% and 30% of Gnutella","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}