{"title":"Towards holistic Web-based information retrieval: an agent-based approach","authors":"K. Sim","doi":"10.1109/WI.2003.1241171","DOIUrl":"https://doi.org/10.1109/WI.2003.1241171","url":null,"abstract":"We present an agent-based system for bolstering holistic information retrieval via the WWW. In Ellis' holistic model of information seeking behaviors, the information seeking activities include: selection of sources, browsing and differentiating, monitoring as well as extraction. Through the use of a query processing agent (QPA), information filtering agents (IFAs) and information monitoring agents (IMAs), these activities can be automated. By establishing subclass relations among (key)words the query processing agent (QPA) expands a query with a list of subqueries to select appropriate URLs. Using three relevance metrics: word relations, frequency and nearness of keywords, the IFA is used to determine the relevance of a page. Additionally, IMAs can be used to track changes in the content of selected pages, paragraphs or tables in Web sites. Empirical results demonstrated that the QPA can find appropriate number of Web sites, and IFAs are effective in filtering relevant information. As part of an on-going work, an Information Extraction Agent is currently being designed and developed.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123048181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dorothée Rasseneur-Coffinet, Pierre Jacoboni, P. Tchounikine
{"title":"Enhancing a Web-based distance-learning curriculum with dedicated tools","authors":"Dorothée Rasseneur-Coffinet, Pierre Jacoboni, P. Tchounikine","doi":"10.1109/WI.2003.1241206","DOIUrl":"https://doi.org/10.1109/WI.2003.1241206","url":null,"abstract":"We aim at supporting students involved in a Web-based distance-learning curriculum. For such a purpose, the Saafir system proposes students with different tools that support them in their appropriation of this curriculum, e.g. visualization of the curriculum from different points of view or construction of individual projects by putting different items of the curriculum into relation. In order to allow using Saafir with already existing distance-learning Web sites, the system is designed as an epiphyte system, that can be associated to an existing Web site without modifying it. It is founded on an ontology-based model of the curriculum. We present the importance of supporting students in their definition of individual projects, the epiphyte approach we use, the modeling of the curriculum and the different support tools proposed by Saafir.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel Web security evaluation model for a one-time-password system","authors":"B. Soh, Aaron Joy","doi":"10.1109/WI.2003.1241228","DOIUrl":"https://doi.org/10.1109/WI.2003.1241228","url":null,"abstract":"One-time passwords (OTPs) have the advantage over regular passwords in that they protect legitimate users from replay attacks by generating a different password for each time of authentication. There are two variables that play a major role in creating a secure OTP; they are the passphrase length and the number of times the one-time password should be hashed. It is already a known fact that the larger the passphrase length the better is the security an OTP can offer. However, there is still a lack of quantitative analysis carried out to study how optimal Web security can be achieved. We propose a novel Web security evaluation model that can be used to measure the strength of a one-time password.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community-based model and access control for information grid","authors":"Xiaolin Li, Zhiwei Xu, Xingwu Liu, Ning Yang","doi":"10.1109/WI.2003.1241240","DOIUrl":"https://doi.org/10.1109/WI.2003.1241240","url":null,"abstract":"It is a challenge to integrate and share resources securely across multiple autonomous administrative domains environment. We introduce the community-based model of vega enterprise information grid and its operation mechanism. The individuals and/or institutes forming different communities can not only implement diverse policies and autonomous management of resource sharing without any impact on the other communities, but also achieve a globally shared goal. Based on the model, the access control technique, including framework and uniform formalizing, is presented in detail. The static or dynamic role binding is used for entitling user's request for accessing resources within or across communities, which ensures a globally unified view for user. A prototype describes how these techniques are useful in building an enterprise information grid. The evaluation and future continuing works are presented in the conclusion.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Web site's clusters from link topology and site hierarchy","authors":"K. Cheung, Yuxiang Sun","doi":"10.1109/WI.2003.1241204","DOIUrl":"https://doi.org/10.1109/WI.2003.1241204","url":null,"abstract":"Foraging information in large and complex Web sites simply using keyword search usually results in unpleasant experience due to the overloaded search results. To support more effective information search, some descriptive abstractions of the Web sites (e.g., sitemaps) are mostly needed. However, their creation and maintenance normally requires recurrent manual effort due to the fast-changing Web contents. We extend the HITS algorithm and integrate hyperlink topology and Web site hierarchy to identify a hierarchy of Web page clusters as the abstraction of a Web site. As the algorithm is based on HITS, each identified cluster follows the bipartite graph structure, with an authority and hub pair as the cluster summary. The effectiveness of the algorithm has been evaluated using three different Web sites (containing /spl sim/6000-14000 Web pages) with promising results. Detailed interpretation of the experimental results as well as qualitative comparison with other related works are also included.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130512042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web agents for requirements consistency management","authors":"Zerong Chen, A. Ghose","doi":"10.1109/WI.2003.1241302","DOIUrl":"https://doi.org/10.1109/WI.2003.1241302","url":null,"abstract":"Inconsistency handling is an aspect of requirements engineering that has attracted considerable research attention. We explore novel ways to applying semantic Web technologies to this problem, in the context of a Web-based agent-mediated environment for distributed requirements engineering.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123364600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Querying spatiotemporal XML using DataFoX","authors":"Yi Chen, P. Revesz","doi":"10.1109/WI.2003.1241208","DOIUrl":"https://doi.org/10.1109/WI.2003.1241208","url":null,"abstract":"We describe DataFoX, which is a new query language for XML documents and extends Datalog with support for trees as the domain of the variables. We also introduce for DataFoX a layer algebra, which supports data heterogeneity at the language level, and several algebra-based evaluation techniques.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114350867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive intelligent environment for remote experimentation","authors":"M. Callaghan, J. Harkin, T. McGinnity, L. Maguire","doi":"10.1109/WI.2003.1241295","DOIUrl":"https://doi.org/10.1109/WI.2003.1241295","url":null,"abstract":"The use of laboratory experiments is a critically important aspect of engineering education where experience has shown that a complementary approach combining theoretical and practical exercises is vital for effective learning. Increasingly, teaching institutions are offering Web based remote access to distant laboratories as part of an overall e-learning strategy. The design and implementation of effective and usable remote experimentation facilities poses unique challenges given the inherent complexities of the learning environment and the constraints imposed by the delivery medium. Developments in recent years have addressed many of these issues. However autonomous learning environments by their very nature offer minimal educator assistance and from a students perspective it is inevitable that at some stage of the experimental process, context specific help will be required. We address this issue in the context of remote experimentation for embedded systems and present an adaptive intelligent learning environment with intelligent user help.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ernestina Menasalvas Ruiz, B. Pardo, S. Millán, Esther Hochsztain, J. Peña
{"title":"Expected value of user sessions: limitations to the non-semantic approach","authors":"Ernestina Menasalvas Ruiz, B. Pardo, S. Millán, Esther Hochsztain, J. Peña","doi":"10.1109/WI.2003.1241268","DOIUrl":"https://doi.org/10.1109/WI.2003.1241268","url":null,"abstract":"The amazing evolution of e-commerce and the fierce competitive environment it has produced have encouraged commercial firms to apply intelligent methods to take advantage of competitors by gathering and analyzing information collected from consumer Web sessions. Knowledge about user objectives and session goals can be discovered from the information collected regarding user activities, as tracked by Web clicks. Most current approaches to customer behaviour analysis study the user session by examining only Web page accesses. To find out about navigators behaviour is crucial to Web sites sponsors attempting to evaluate the performance of their sites. Nevertheless, knowing the current navigation patterns is not always enough. Very often it is also necessary to measure sessions value according to business goals perspectives. We present two different measures to include business goals inside click stream analysis. Each of the alternatives is discussed and evaluated in terms of how company's objectives and expectations are taken into account as well as how this approach could be achieved.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132359081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Matrix dimensionality reduction for mining Web logs","authors":"Jianjiang Lu, Baowen Xu, Hongji Yang","doi":"10.1109/WI.2003.1241222","DOIUrl":"https://doi.org/10.1109/WI.2003.1241222","url":null,"abstract":"Web-based logs contain potentially useful data with which designers can assess the usability and effectiveness of their choices. Clustering techniques have been used to automatically discover typical user profiles from Web access logs recently. But it is a challenging problem to design effective similarity measure between the session vectors, which are usually high dimensional and sparse. Nonnegative matrix factorisation approaches are applied to dimensionality reduction of the session-URL matrix, and the spherical k-means algorithm is used to partition the projecting vectors of the user session vectors into several clusters. Two methods for discovering typical user session profiles from the clusters are presented last. The results of experiment show that our algorithms can mine interesting user profiles effectively.","PeriodicalId":403574,"journal":{"name":"Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)","volume":"66-69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131046163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}