2008 Third International Conference on Digital Information Management最新文献

筛选
英文 中文
Design and test of Application-Specific Integrated Circuits by use of mobile clients 利用移动客户端设计和测试专用集成电路
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746848
D. Zutin, M. Auer
{"title":"Design and test of Application-Specific Integrated Circuits by use of mobile clients","authors":"D. Zutin, M. Auer","doi":"10.1109/ICDIM.2008.4746848","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746848","url":null,"abstract":"The aim of this work is to develop a simultaneous multi user access system - READ (Remote ASIC Design and Test) that allows users to perform test and measurements remotely via clients running on mobile devices as well as on standard PCs. The system also facilitates the remote design of circuits with the PAC-Designer. The system is controlled by LabVIEW and was implemented using a Data Acquisition Card from National instruments. Such systems are specially suited for manufacturing process monitoring and control. The performance of the simultaneous access was tested under load with a variable number of users. The server implements a queue that processes userpsilas commands upon request.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An empirical study of e-Government formulation in Kingdom of Saudi Arabia & United Arab Emirates 沙特阿拉伯王国和阿联酋电子政务制定的实证研究
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746841
A. Al-Tameem
{"title":"An empirical study of e-Government formulation in Kingdom of Saudi Arabia & United Arab Emirates","authors":"A. Al-Tameem","doi":"10.1109/ICDIM.2008.4746841","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746841","url":null,"abstract":"This paper empirically examines whether Kingdom of Saudi Arabia and United Arab Emirates are initiating and implementing e-government technologies. The main question guiding this research was: what are the main motives shaping the initiatives in the e-government context. There perspectives were combined in a framework for this research: institutional, functional and strategic. Hypotheses were developed and tested in the contest of these perspectives. The finding indicates a combination of multiple motives. At the national comparison level, United Arab Emirates initiatives are influenced by functional purpose, and the Kingdompsilas initiatives are influenced by strategic motives. Institutional motives influence initiations in both countries.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"55 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123255785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A ranking algorithm for user-generated video contents based on social activities 基于社交活动的用户生成视频内容排序算法
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746721
Lisa Wiyartanti, Yo-Sub Han, Laehyun Kim
{"title":"A ranking algorithm for user-generated video contents based on social activities","authors":"Lisa Wiyartanti, Yo-Sub Han, Laehyun Kim","doi":"10.1109/ICDIM.2008.4746721","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746721","url":null,"abstract":"People upload extremely large number of user-generated contents everyday and participate in various social activities regarding with contents on the Web. Thus, researchers develop efficient user-generated content management systems. Typical social activities are to add favorite list, give rating, subscribe, and give comments. We observe that we can use these activities for evaluating the value of contents. Based on this observation, we introduce a ranking algorithm for user-generated video contents. We make use of collective intelligence from social activities and the algorithm finds influential users, calculates the value of contents, and orders the contents by statistical method.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122542692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A data model for versioned XML documents using XQuery 使用XQuery的版本化XML文档的数据模型
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746718
Luis Arévalo Rosado, Antonio Polo Márquez, Miryam Salas Sánchez
{"title":"A data model for versioned XML documents using XQuery","authors":"Luis Arévalo Rosado, Antonio Polo Márquez, Miryam Salas Sánchez","doi":"10.1109/ICDIM.2008.4746718","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746718","url":null,"abstract":"Due to the linear nature of time, XML timestamped solutions for the management of XML versions have difficulty in supporting non-lineal versioning, and their implementations are few and portableless. This paper proposes a version data model for XML documents developed using the branch version technique for XML documents shown in [9, 10]. We have built a system following this model based on XQuery modules, so that it ensures us a high portability and it allows its use not only in XQuery engine but also in XQuery-support XML native databases. In order to verify it, the modules have been integrated in the eXist XML native database, a difference tool has been used to obtain the changes made between versions, and the eXist Web interface has been extended to make easy the management of XML versions.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
English sentence retrieval system based on dependency structure and its evaluation 基于依存结构的英语句子检索系统及其评价
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746762
Yoshihide Kato, Seiji Egawa, S. Matsubara, Y. Inagaki
{"title":"English sentence retrieval system based on dependency structure and its evaluation","authors":"Yoshihide Kato, Seiji Egawa, S. Matsubara, Y. Inagaki","doi":"10.1109/ICDIM.2008.4746762","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746762","url":null,"abstract":"This paper proposes a system of retrieving English sentences by utilizing linguistically structural information. The userpsilas query consists of a sequence of keywords. The system automatically identifies dependency relations between occurrences of the keywords in sentences and classifies the sentences according to those dependency relations. The system provides a simple and intuitive keyword-based interface and realizes linguistically sophisticated sentence retrieval. We conducted an experiment to evaluate the accuracy of the system. The results demonstrate that the system provides high accuracy.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126441907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy in context: Privacy issues in Ubiquitous Computing applications 上下文中的隐私:普适计算应用中的隐私问题
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746842
C. O'Driscoll
{"title":"Privacy in context: Privacy issues in Ubiquitous Computing applications","authors":"C. O'Driscoll","doi":"10.1109/ICDIM.2008.4746842","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746842","url":null,"abstract":"This paper presents a review of privacy issues and guidelines for developing and assessing privacy-sensitive ubiquitous computing applications. Privacy is discussed to determine factors that affect peoples own privacy preferences in public and private environments. Ubiquitous environments based on invisible computers provide a particular challenge where limited user interfaces exist to inform users of the level of data collection and its usage. There is acceptance by designers of privacy-sensitive applications for a balance between control and feedback that is essential for systems to meet legal requirements for deployment to be successful. A survey of principles and design guidelines has been completed and these are used in the assessment of a context aware smart classroom environment. This paper aims to provide a foundation for developing and assessing privacy-sensitive applications.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"208-209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Classification of personal names with application to DBLP 人名分类及其在DBLP中的应用
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746754
M. Biryukov, Yafang Wang
{"title":"Classification of personal names with application to DBLP","authors":"M. Biryukov, Yafang Wang","doi":"10.1109/ICDIM.2008.4746754","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746754","url":null,"abstract":"In this paper we propose a new perspective for the data analysis in digital libraries, bibliographic and other databases containing personal names. Knowing language/cultural background of a person can be beneficial in many applications, however this information is often not present explicitly in the databases. We present here a statistical tool for the automatic language detection of personal names. Our system does not require a dictionary of names for training and handles 14 different languages so far. General purpose corpora for all Western European, Chinese, Japanese and Turkish languages are used in order to build simple statistical models of the languages. The tool is fine tuned to achieve precision and recall above 90% for many languages which proves better performance than some other systems aiming at the language identification of personal names. On an example of a bibliographical database DBLP we show how our tool can be used in tasks such as data cleaning and discovery of trends.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledge 利用领域和语言知识从科学论文中提取无监督关键短语
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746749
M. Krapivin, M. Marchese, Andrei Yadrantsau, Yanchun Liang
{"title":"Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledge","authors":"M. Krapivin, M. Marchese, Andrei Yadrantsau, Yanchun Liang","doi":"10.1109/ICDIM.2008.4746749","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746749","url":null,"abstract":"The domain of Digital Libraries presents specific challenges for unsupervised information extraction to support both the automatic classification of documents and the enhancement of userspsila navigation in the digital content. In this paper, we propose a combined use of machine learning techniques (i.e. Support Vector Machines) and Natural Language Processing techniques (i.e. Stanford NLP parser) to tackle the problem of unsupervised key-phrases extraction from scientific papers. The proposed method strongly depends on the robust structural properties of a scientific paper as well as on the lexical knowledge that we are able to mine from its text. For the experimental assessment we have use a subset of ACM papers in the Computer Science domain containing 400 documents. Preliminary evaluation of the approach shows promising result that improves - on the same data-set - on state-of-the-art Bayesian learning system KEA from a minimum 27% to a maximum 77% depending on KEA parameters tuning and specific evaluation set. Our assessment is performed by comparison with key-phrases assigned by human experts in the specific domain and freely available through ACM portal.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Chain ontology based: A model for protecting personal information privacy 基于链本体的个人信息隐私保护模型
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746767
Esraa Omran, A. Bokma, S. Al-Maati
{"title":"Chain ontology based: A model for protecting personal information privacy","authors":"Esraa Omran, A. Bokma, S. Al-Maati","doi":"10.1109/ICDIM.2008.4746767","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746767","url":null,"abstract":"Privacy and personal information have penetrated all forms of todaypsilas business transactions such as banking and e-commerce to new forms of socializing online such as Facebook, to ones own health records. In protecting such sensitive & private data several initiatives have been created in various forms from legislation, PIPEDA to policies such as P3P. Unfortunately, none of these enforce protection of data. Recent solutions have emerged to enforce data privacy & protection such as the Hippocratic database. But this solution has proved complex in purpose wide range decision making. In this paper wer bring forth a new idea that integrates personal information ontology with the concept of chains[1], in order to overcome the Hippocratic deficiencies. We demonstrate the idea with a prototype in the context of healthcare data management, a sector in which maintaining the privacy of individual information is of essential importance.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131246428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Anomaly detection and visualization using Fisher Discriminant clustering of network entropy 基于Fisher网络熵判别聚类的异常检测与可视化
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746810
M. Celenk, T. Conley, John Willis, James Graham
{"title":"Anomaly detection and visualization using Fisher Discriminant clustering of network entropy","authors":"M. Celenk, T. Conley, John Willis, James Graham","doi":"10.1109/ICDIM.2008.4746810","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746810","url":null,"abstract":"Entropy has been widely used to quantify information for display and examination in determining network status and in detecting anomalies. Although entropy-based methods are effective, they rely on long-term network statistics. Here, we propose an approach that deduces short term observations of network features and their respective time averaged entropies. Acute changes are detected in network feature space and depicted in a visually compact information graph. First, average entropy for each feature is calculated for every second of observation. Then, the resultant short-term information measurement is subjected to first- and second-order time averaging statistics. These time-varying statistics are used as the basis of a novel approach to anomaly estimation based on the well-known Fisher linear discriminant (FLD). This process then initiates stochastic clustering to identify the exact time of the security incident or attack on the network. The proposed method is tested on real-time network traffic data collected from Ohio Universitypsilas main Internet connection. Experimentation has shown that the presented FLD based method is accurate in identifying anomalies in network feature space. Furthermore, itpsilas performance is highly robust in the presence of bursty network traffic and it is able to detect network anomalies such as BotNet, worm outbreaks, and denial of service attacks.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126878879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信