2008 Third International Conference on Digital Information Management最新文献

筛选
英文 中文
Reshaping email relationships 重塑电子邮件关系
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746796
E. El-Qawasmeh, V. Snás̃el, P. Pichappan
{"title":"Reshaping email relationships","authors":"E. El-Qawasmeh, V. Snás̃el, P. Pichappan","doi":"10.1109/ICDIM.2008.4746796","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746796","url":null,"abstract":"This paper suggests splitting the existing email handlers into more than one group. The existing group can be considered as a group that has one-to-one relationship. However, this paper suggests that the email handlers should give the user the choice to select the relation that he would like to implement in the email handler. Three types of relationships can be identified. They are: one-to-one, one-to-many, and many-to-many relationship. Enforcing a certain type of relationship saves the time of the emailer. The paper will describe the prototype for each relationship with the advantages of each one.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The role of interoperability in eGovernment applications: An investigation of obstacles and implementation decisions 互操作性在电子政务应用中的作用:对障碍和实施决策的调查
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746798
E. Tambouris, Nikos Loutas, Vassilios Peristeras, K. Tarabanis
{"title":"The role of interoperability in eGovernment applications: An investigation of obstacles and implementation decisions","authors":"E. Tambouris, Nikos Loutas, Vassilios Peristeras, K. Tarabanis","doi":"10.1109/ICDIM.2008.4746798","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746798","url":null,"abstract":"The aim of this paper is to provide a better understanding on the role of interoperability in eGovernment applications. The focus of interest is on eGovernment applications involving more than one agency or heterogeneous technical infrastructures. The main research objective is to reveal contemporary, interoperability-related, obstacles and implementation decisions and trends in eGovernment applications. To fulfil this objective we started by identifying patterns of interoperability problems. We thereafter constructed a number of interoperability models that can be used to overcome the identified interoperability problems. We finally surveyed more than 100 European eGovernment applications where interoperability has a significant role. This enabled us to identify the current interoperability obstacles and the use of the interoperability models as well as to discuss discrepancies between researchers praise and practitioners' approaches. Practitioners may use the results as guidance when developing their own applications, while researchers can further extend these results.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Context management for response to traffic accident in smart environment 智能环境下交通事故响应的情境管理
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746834
S. Alexander, L. Tatiana, S. Nikolay, K. Alexey
{"title":"Context management for response to traffic accident in smart environment","authors":"S. Alexander, L. Tatiana, S. Nikolay, K. Alexey","doi":"10.1109/ICDIM.2008.4746834","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746834","url":null,"abstract":"A decision support system intended to operate in a smart environment is proposed. The system enables context-sensitive self-organisation of resources to support needs of the environment occupants. The system implements technologies of context management, Web-services, and software agents. An example of action planning for responding to a traffic accident happened in a smart environment is used for illustration of the system proposed.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards e-Government: The security SOA approach of the University of Murcia 迈向电子政务:穆尔西亚大学的安全SOA方法
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746840
Daniel Sánchez-Martínez, C. I. Marín-López, A. Gómez-Skarmeta, Tomas Jimenez-Garcia
{"title":"Towards e-Government: The security SOA approach of the University of Murcia","authors":"Daniel Sánchez-Martínez, C. I. Marín-López, A. Gómez-Skarmeta, Tomas Jimenez-Garcia","doi":"10.1109/ICDIM.2008.4746840","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746840","url":null,"abstract":"This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university community with secure and interoperable services.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The importance of biometric sensor continuous secure monitoring 生物特征传感器持续安全监测的重要性
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746706
A. Papanikolaou, C. Ilioudis, C. Georgiadis, E. Pimenidis
{"title":"The importance of biometric sensor continuous secure monitoring","authors":"A. Papanikolaou, C. Ilioudis, C. Georgiadis, E. Pimenidis","doi":"10.1109/ICDIM.2008.4746706","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746706","url":null,"abstract":"The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the securely transmitted biometric data has not been constructed by an attacker. The biometric sensors of a biometric information system are often physically exposed to potential adversaries who may manipulate them and therefore compromise the security of the system. Such attacks can be detected by continuous and secure sensor monitoring. The proposed scheme is based on the Kerberos protocol for dealing with sensor authentication issues. Using authenticated control/data packets its functionality has been extended to provide secure sensor monitoring, which can help in detecting physical attacks on the sensor itself.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131418117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A fast approximate algorithm for large-scale Latent Semantic Indexing 大规模潜在语义索引的快速近似算法
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746764
Dell Zhang, Zheng Zhu
{"title":"A fast approximate algorithm for large-scale Latent Semantic Indexing","authors":"Dell Zhang, Zheng Zhu","doi":"10.1109/ICDIM.2008.4746764","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746764","url":null,"abstract":"Latent semantic indexing (LSI) is an effective method to discover the underlying semantic structure of data. It has numerous applications in information retrieval and data mining. However, the computational complexity of LSI may be prohibitively high when applied to very large datasets. In this paper, we present a fast approximate algorithm for large-scale LSI that is conceptually simple and theoretically justified. Our main contribution is to show that the proposed algorithm has provable error bound and linear computational complexity.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Adaptive mean shift-based image segmentation using multiple instance learning 基于多实例学习的自适应均值漂移图像分割
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746716
I. Gondra, Tao Xu
{"title":"Adaptive mean shift-based image segmentation using multiple instance learning","authors":"I. Gondra, Tao Xu","doi":"10.1109/ICDIM.2008.4746716","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746716","url":null,"abstract":"Mean shift clustering tends to generate accurate segmentations of color images, but choosing the scale parameters remains a difficult problem which has a strong impact on its performance. We present an adaptive image segmentation framework that achieves a task-dependent top-down adaption of the scale parameters. The proposed method can be used under the context of a relevance feedback-based content-based image retrieval system. Standard mean shift clustering is used to generate an initial segmentation of the images in the database. After processing a query, the user gives the usual relevance feedback by labeling each of the images in the corresponding retrieval set as positive or negative, based on whether or not it contains a particular object of interest. In our approach, this feedback obtained as a by-product of user interaction with the system is then used in conjunction with multiple instance learning to induce a mapping from the object of interest to the scale parameters. The initial segmentation of the object of interest in each of the positive images in the database is then revised. This is done offline and is completely transparent to the user. Preliminary results indicate that the proposed method is capable of learning more informed segmentation parameters.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enabling smooth integration between HL7 CDA and medical guidelines on the web with an initial focus on women’s health in general practice 实现HL7 CDA与网上医疗指南之间的顺利整合,最初侧重于一般实践中的妇女健康
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746784
Mercedes Argüello Casteleiro, J. D. Diz, A. Thompson, H. Paniagua, Maria Jesus Fernandez Prieto, Rogelio Perez
{"title":"Enabling smooth integration between HL7 CDA and medical guidelines on the web with an initial focus on women’s health in general practice","authors":"Mercedes Argüello Casteleiro, J. D. Diz, A. Thompson, H. Paniagua, Maria Jesus Fernandez Prieto, Rogelio Perez","doi":"10.1109/ICDIM.2008.4746784","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746784","url":null,"abstract":"Since the 1990s many researchers have proposed frameworks for modelling clinical guidelines and protocols in a computer-interpretable and computer-executable format. Nowadays, the various guideline representation languages and related frameworks also need to address compatibility with healthcare information systems that aim to be interoperable on nation-wide and even international-levels. This paper presents a simulation framework and computational test-bed, called V.A.F. Framework, that makes use of health level seven (HL7) and takes advantages of both CommonKADS methodology and Semantic Web technologies (OWL, SWRL, and OWL-S) to express a wide-spectrum of medical guidelines in an executable form compatible with HL7 clinical document architecture (CDA). To validate the proposal, which goes beyond interoperability of eHealth services and explores how to open up new capabilities in areas such as decision support and patient safety alerts, the research has focused on medical guidelines related to womenpsilas health in general practice.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching multiple elements in grid databases: A practical approach 匹配网格数据库中的多个元素:一种实用的方法
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746820
E. Ahmed, N. Bessis, Yong Yue, M. Sarfraz
{"title":"Matching multiple elements in grid databases: A practical approach","authors":"E. Ahmed, N. Bessis, Yong Yue, M. Sarfraz","doi":"10.1109/ICDIM.2008.4746820","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746820","url":null,"abstract":"Accessing integrated databases leads to the performance of searching and matching of data. Data can be redundant and found with different business contexts in different integrated databases. Usually, accessing data from integrated databases is accomplished by using each databasepsilas own catalogue or metadata schema. A generic strategy is adopted to consolidate distinct catalogue schemas of federated databases to access information seamlessly. This strategy involves matching of structure objects and data values across federated databases in a grid environment. In this paper, the concept of grid services is introduced to manage the importance of data search and matching within an OGSA-DAI (open grid services architecture - data access integration) environment.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A participant testing strategy for service orchestrations 服务编排的参与者测试策略
2008 Third International Conference on Digital Information Management Pub Date : 2008-11-01 DOI: 10.1109/ICDIM.2008.4746778
F. Corradini, F. D. Angelis, A. Polini, A. Polzonetti
{"title":"A participant testing strategy for service orchestrations","authors":"F. Corradini, F. D. Angelis, A. Polini, A. Polzonetti","doi":"10.1109/ICDIM.2008.4746778","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746778","url":null,"abstract":"Service oriented computing is an emerging discipline that promotes and make easier inter-organization integration of software systems. In such a context interoperability issues are considered a primary threat for a correct integration. Testing can be a fruitful approach helping to reduce interoperability mismatches. In this paper, considering the case of services to be integrated within an orchestration, we propose a testing derivation strategy based on a counter-example based technique. The state explosion phenomenon, caused by the presence of complex data sets, is handled by applying genetic algorithm strategies.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123015666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信