2008 Third International Conference on Digital Information Management最新文献

筛选
英文 中文
A Quality-Aware Context-Based Access Control model for ubiquitous applications 面向泛在应用的基于上下文的质量感知访问控制模型
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746774
José Bringel Filho, H. Martin
{"title":"A Quality-Aware Context-Based Access Control model for ubiquitous applications","authors":"José Bringel Filho, H. Martin","doi":"10.1109/ICDIM.2008.4746774","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746774","url":null,"abstract":"With the growing advancement of ubiquitous computing (UbiComp), we are moving towards an era where access control and security policies will be based on context information. As context information represents real-world situations, it is associated with certain quality indicators that can directly influence the access control decisions. In this paper, we propose a quality-aware context-based access control model that takes into account the context information and its QoC indicators to grant and to adapt access permissions to resources.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
DYONIPOS: Proactive support of knowledge workers DYONIPOS:对知识工作者的主动支持
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746819
Josef Makolm, S. Weiß, Doris Ipsmiller
{"title":"DYONIPOS: Proactive support of knowledge workers","authors":"Josef Makolm, S. Weiß, Doris Ipsmiller","doi":"10.1109/ICDIM.2008.4746819","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746819","url":null,"abstract":"Efficient and effective knowledge management plays an increasingly important role in knowledge intensive organizations. The research project DYONIPOS focuses on detecting the knowledge needs of knowledge workers and automatically providing this required knowledge just in time. The prototype DYONIPOS generates new knowledge out of artefacts, while avoiding additional work and violations of the knowledge workerpsilas privacy. The knowledge is made available through semantic linkage of the relevant information from existing repositories. In addition DYONIPOS creates an individual and an organizational knowledge data base to achieve the knowledge. This article is structured as follows: section 1 addresses the relation between the applied approach and the challenge in e-government and summarizes the aims of the research project DYONIPOS. In section 2 the semantic and knowledge discovery technologies used are presented. The paper concludes with the presentation of the use-case project, showing the results of the first and the second test and screenshots of the updated DYONIPOS application.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance optimization over channel model for a Low Rate Wireless Personal Area Network 基于信道模型的低速率无线个人区域网络性能优化
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746815
Indong Yeo, Jonghyune Kim, Sunshin An
{"title":"Performance optimization over channel model for a Low Rate Wireless Personal Area Network","authors":"Indong Yeo, Jonghyune Kim, Sunshin An","doi":"10.1109/ICDIM.2008.4746815","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746815","url":null,"abstract":"The low rate wireless personal network (LR-WPAN) is a new standard uniquely designed for low data rates and low energy consumption. LR-WPAN researchers are focusing extensively on the wireless technology and energy consumption, but many papers do not cover channel characterization and link quality assessment in LR-WPANs, even though we could reasonably surmise that the network performance will be optimized only when the channel and link information are provided. In this paper, we will suggest a new mechanism for performance enhancement in the presence of a time-varying channel response. First, we will regard the link quality indicator (LQI) as a channel state indicator. Second, we will modify the pure CSMA-CA procedure by reflecting the LQI measurement. Finally, we roughly observe the time-varying channel, and then we assign a weight to the L2 scheduling parameter known as the backoff exponent (BE). This mechanism upgrades the network performance when there is a time-varying channel. This paper addresses the problem by creating an efficient scheduling scheme that is based on the channel memory. The result of an NS-2 simulation indicates an overall improvement in the effective throughput, energy consumption, and end-to-end delay.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative study on Null Boundary and Periodic Boundary 3-neighborhood Multiple Attractor Cellular Automata for classification 零边界与周期边界三邻域多吸引元自动机分类的比较研究
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746805
A. Kundu, A. R. Pal, Tanay Sarkar, M. Banerjee, S. Guha, Debajyoti Mukhopadhyay
{"title":"Comparative study on Null Boundary and Periodic Boundary 3-neighborhood Multiple Attractor Cellular Automata for classification","authors":"A. Kundu, A. R. Pal, Tanay Sarkar, M. Banerjee, S. Guha, Debajyoti Mukhopadhyay","doi":"10.1109/ICDIM.2008.4746805","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746805","url":null,"abstract":"This paper reports a generic analysis on null boundary and periodic boundary 3-neighborhood multiple attractor cellular automata (MACA) for showing the comparative study in classification technique. Cellular automata (CA) is now-a-days an essential tool for researchers in the area of pattern recognition, pattern generation, testing field, fault diagnosis and so on. So, general knowledge on CA up to some extent is a must for researchers in these areas. A CA may be linear or non-linear in behavior. A linear/additive CA employs XOR/XNOR logic, while a non-linear CA employs AND/OR/NOT logic. This paper shows a graph analysis along with state transition behavior of CA cells. A rule vector graph (RVG) is generated from the rule vector (RV) of a CA. Linear time algorithms are reported for generation of RVG. MACA provides an implicit memory to store the patterns. Search operation to identify the class of a pattern out of several classes boils down to running a CA for one time step. This demands storage of RV and seed values. MACA is based on sound theoretical foundation of CA technology. This paper only concentrates on MACA since it is responsible for classifying the various types of patterns.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129991781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards the development of an automatic readability measurements for arabic language 阿拉伯文可读性自动测量系统的研制
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746711
Amani A. Al-Ajlan, Hend Suliman Al-Khalifa, A. Al-Salman
{"title":"Towards the development of an automatic readability measurements for arabic language","authors":"Amani A. Al-Ajlan, Hend Suliman Al-Khalifa, A. Al-Salman","doi":"10.1109/ICDIM.2008.4746711","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746711","url":null,"abstract":"Currently, there are more than 200 readability formulas developed since the 1920s. Only a handful of these formulas are reliable to determine the reading-level of a sample text. Ascertaining the readability of curricula is an important step toward optimizing the effectiveness of the educational progress. Readability measurements are done using manual computation. This is a tedious and time-consuming task. However, nowadays, automatic readability computation has gained much popularity than ever before. This can be attributed to the advancement in the field of natural language processing. Languages such as English and Spanish have benefited from the formation of automatic readability systems. Absence of automated readability measurement of Arabic texts and the large amount of information which are written in Arabic encouraged us to work on finding an automatic readability system for our language; the mother language for millions of Arabs. In this paper we will review the different readability research and then propose a system for automating the readability measurement of Arabic text. Within the paper we also report the results of our pilot experiment carried out on the different well-known Arabic, Swedish and English readability formulas.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
How to assess customer opinions beyond language barriers? 如何超越语言障碍评估客户意见?
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746812
K. Denecke
{"title":"How to assess customer opinions beyond language barriers?","authors":"K. Denecke","doi":"10.1109/ICDIM.2008.4746812","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746812","url":null,"abstract":"The main focus of this paper is to introduce an approach to sentiment classification for documents in different languages. The method is based on language-specific resources available for English. First, documents are translated to English using standard translation software. For polarity detection, sentiment-bearing terms are identified by means of SentiWordNet. Polarity scores calculated for words of three word classes are exploited by a machine learning classifier for determining the document polarity. The introduced method is tested and evaluated on movie reviews in six different languages. The results show that polarity can be correctly determined even if language specific resources are unavailable.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132394223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Reference architecture for enterprise batch processing of unformation 企业批量处理信息的参考体系结构
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746803
A. Bahuguna
{"title":"Reference architecture for enterprise batch processing of unformation","authors":"A. Bahuguna","doi":"10.1109/ICDIM.2008.4746803","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746803","url":null,"abstract":"In the past, proprietary mainframe technology platforms provided a well defined architecture and environment, to build enterprise batch processing solutions. The businesses imperative today, is to develop similar solutions, using investments made in a varied mix of open systems technologies. Many of these technologies provide only a generic platform, not specifically targeted at enterprise batch processing requirements. This poses new challenges, in defining the architecture of enterprise batch processing solutions, which use such technologies. To address these challenges, we have identified an architecture, which combines concepts of intelligent agents and service orientation, to serve as a reference for building enterprise batch processing solutions.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"213 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MyLegislative information service: Closing the gap between the citizens and the democracy MyLegislative信息服务:拉近公民与民主之间的距离
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746836
E. Sánchez-Nielsen, F. Chávez-Gutiérrez
{"title":"MyLegislative information service: Closing the gap between the citizens and the democracy","authors":"E. Sánchez-Nielsen, F. Chávez-Gutiérrez","doi":"10.1109/ICDIM.2008.4746836","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746836","url":null,"abstract":"MyLegislative approach aims to narrow the gap between the people and their elected representatives in parliaments by means of being a personalized channel of information to citizens and canvas their views to their elected representatives. MyLegislative solution is a production support system focused on a personalized podcasting production infrastructure with feedback functionalities to enable: (i) on-demand legislative information of plenary sessions and (ii) people interaction. Real-time information is computed using semantic technologies based on MPEG-7 standard. People interaction is computed by means of feedback processes using a rating mechanism. As a result, the functionalities of the system are twofold. First, people are kept informed about their explicit needs with the potential of anywhere and anytime environments. Second, elected representatives receive a report which has been automated created from people interaction. This feedback allows parliaments to become more sensitive to the needs and preferences of citizens because the audiences are clearly identifying their preferences, and at the same time evaluating the role and outcomes of their elected representatives.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125322854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient distributed information management in smart spaces 智能空间的高效分布式信息管理
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746699
A. Smirnov, N. Shilov, Andrew Krizhanovsky, Antti Lappeteläinen, I. Oliver, S. Boldyrev
{"title":"Efficient distributed information management in smart spaces","authors":"A. Smirnov, N. Shilov, Andrew Krizhanovsky, Antti Lappeteläinen, I. Oliver, S. Boldyrev","doi":"10.1109/ICDIM.2008.4746699","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746699","url":null,"abstract":"Development of new technologies brings people new possibilities such as smart spaces. Smart spaces can provide better user experience by allowing a user to connect new devices flexibly and to access all the information in the multi device system from any of the devices. However, this also raises new challenges. The paper considers the problem of efficient distributed information sharing in smart spaces. Models for information distribution are presented together with a simulation framework.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Performance analysis of an insider threat mitigation model 内部威胁缓解模型的性能分析
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746709
Q. Althebyan, B. Panda
{"title":"Performance analysis of an insider threat mitigation model","authors":"Q. Althebyan, B. Panda","doi":"10.1109/ICDIM.2008.4746709","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746709","url":null,"abstract":"In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信