{"title":"A Computational Effective Document Semantic Representation","authors":"Robert Williams","doi":"10.1109/DEST.2007.372007","DOIUrl":"https://doi.org/10.1109/DEST.2007.372007","url":null,"abstract":"A technique based on noun phrase and verb clause slot structures Is described for representing the semantics of the sentences making up a text document. Thesaurus head word index numbers are placed in the appropriate document sentence clause slots to represent the meta level meaning of the sentences. Many different expressions of the same document content can thus be represented by one semantic representation. An implementation of such a technique is described, and sample output is presented. The document summarisation thus produced is suitable for manipulation by computers for a variety of document processing tasks. The technique has primarily been developed for an automated essay grading system, where a robust context free representation of documents is required.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134043188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taking Digital Ecosystems to SMEs A European case study","authors":"N. Rathbone","doi":"10.1109/DEST.2007.372031","DOIUrl":"https://doi.org/10.1109/DEST.2007.372031","url":null,"abstract":"The digital business ecosystem (DBE) project experimented with new ways of bringing small and medium-sized enterprises (SMEs) into a major R&D project. Such involvement is an important factor in projects where the R&D performers are not the exploiters. The project utilised the social capital of regional actors, and conceptualised a certain kind of SME, known as driver SMEs. The strategy adopted has worked for this project and has provided a basis for self-sustained post-project expansion. In doing so it has created a model that could easily be adopted by other projects, both in Digital Ecosystems and beyond.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"98 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131067623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Technique of Anti Key-Logging using Key-Logging Mechanism","authors":"M. M. Baig, Waqar Mahmood","doi":"10.1109/DEST.2007.371990","DOIUrl":"https://doi.org/10.1109/DEST.2007.371990","url":null,"abstract":"System security and privacy always have to face new confronts. Continuous updates in the operating systems and anti-virus applications strive to amplify the system security level. In recent years 'key-loggers' have proved to be one of the prevalent intimidations to security and privacy. Key-logger is a surreptitious surveillance application, which is used to keep record of user's activities on the computer in various ways like keyboard logging, screen logging, mouse logging and voice logging, completely in imperceptible mode. Although key-loggers can also be used for prolific purposes but due to the tremendous increase in the Internet usage, the caustic use of key-loggers simply surmounts its advantages. Key-loggers have gained so much supremacy in their execution that they have become a serious intimidation to the privacy and security of a computer. The fact which makes the key-loggers more perilous is their undetectable nature against anti-virus and spy-where applications. This paper discusses some existing techniques of fortification against key-loggers and also exemplifies a new technique along with its proved advantages.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"474 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116391913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agents and People Activities in Web-services based Business processes","authors":"A. Sasa, M. B. Juric, M. Krisper","doi":"10.1109/DEST.2007.371976","DOIUrl":"https://doi.org/10.1109/DEST.2007.371976","url":null,"abstract":"Business Processes Execution Language (BPEL) is primarily designed to support automated business processes based on Web services. The lack of support for human-performed activities led to specification of a BPEL extension called BPEL4People which tries to answer this problem. In this paper we propose an implementation of Web services with regard to this extension using the agent technology. We show not only how agents can implement such activities but also how they can improve their execution with acting on behalf of the users they are representing. Moreover the fact that agents' behaviour is based on their knowledge this is a promising approach to knowledge management in organisations.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116424395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Pappas, F. Kazasis, G. Anestis, N. Gioldasis, S. Christodoulakis
{"title":"A Knowledge Management Platform for Supporting Digital Business Ecosystems based on P2P and SOA technologies","authors":"N. Pappas, F. Kazasis, G. Anestis, N. Gioldasis, S. Christodoulakis","doi":"10.1109/DEST.2007.371970","DOIUrl":"https://doi.org/10.1109/DEST.2007.371970","url":null,"abstract":"We consider a digital business ecosystem environment where SMEs cooperate and compete. We aim to provide to each SME and the ecosystem with knowledge management mechanisms to support their needs for information, service findings and recommendations. We present the design and implementation of a platform that supports the knowledge management needs in this environment. We describe the business related knowledge managed by the knowledge base (KB), as well as the architectural components and the core services supported by the KB infrastructure. Since the SMEs are independent and their KB contents are evolving we adopted a P2P framework for the cooperation of SMEs. We present the P2P framework and we outline the knowledge discovery and replication mechanisms supported by the implementation. The knowledge management mechanisms described in this paper form the infrastructure for knowledge management of the Digital Business Ecosystem IP project of EU.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Fractal Breakdowns by the Holder Filter in the Novel Real-Time Traffic Pattern Detector for the Internet Applications","authors":"Wwk Lin, Allan K. Y. Wong, T. Dillon","doi":"10.1109/DEST.2007.372021","DOIUrl":"https://doi.org/10.1109/DEST.2007.372021","url":null,"abstract":"The novel real-time traffic pattern detector (RTPD) proposed identifies the Internet traffic pattern on the fly. Firstly it determines if a time series aggregate is stationary. Secondly it confirms if the aggregate exhibits short-range dependence (SRD) or long-range dependence (LRD). Thirdly it detects if the smooth system operation has suddenly become irregular and chaotic. This detection is achieved by computing the instantaneous value of the Holder exponent that has a (0,1) range to accommodate different degrees fractality. A smooth performance distribution such as a time series may embed a varying fractality at different times due to the system dynamics. If the Holder exponent has wandered outside the (0,1) region, fractal breakdown has occurred. The capability of detecting such breakdowns by a real-time application enables it to avoid sudden failure. This feature is of importance to the reliability of digital ecosystems, which reside on the Internet.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Online Learning Support: Progress on Research to Date","authors":"S. Quinton","doi":"10.1109/DEST.2007.372046","DOIUrl":"https://doi.org/10.1109/DEST.2007.372046","url":null,"abstract":"This paper reports on progress to date in relation to a long term research project underway at Curtin University of Technology. The project aims to devise tools that interactively support the cognitive learning processes of today's knowledge workers as exemplified by researchers, managers and students. The empowering tools alluded to here are not simply intended to manage, calculate, search, order and arrange search results as is often the case with current search systems. Instead, the project is concerned with applying semantic analysis techniques, specifically the normalised word vector (NWV) technology developed at Curtin to the construction of a range of 'intelligent' online cognitive support tools. The goal is to devise a system that enhances learners' cognitive functioning by augmenting the human intellect to achieve greater capacity to conceptualise and ultimately, construct new knowledge.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127611595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Realistic Approach on Password-Based Mutual Remote Authentication Schemes with Smart-Cards","authors":"J. Torres, J. M. Sierra, A. Izquierdo","doi":"10.1109/DEST.2007.371994","DOIUrl":"https://doi.org/10.1109/DEST.2007.371994","url":null,"abstract":"One-way authentication methods and techniques have provided the authentication service in ubiquitous environments with nomadic users almost exclusively. However, research in smart cards has allowed the implementation of solutions based on mutual remote authentication. There have been many works based on solutions that used lightweight password-based authentication, but these works have been continuously rejected due to the weaknesses of those proposals. This work carries out a review on advances on password-based remote mutual authentication with smart cards and identifies design deficiencies in these authentication protocols. To conclude, we propose a novel and realistic approach that permits the definition of a set of requirements for the password-based remote mutual authentication schemes in order to improve the effectiveness of the resulting schemes.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Client Privacy Policy Enforcement for Small-Medium Enterprises","authors":"A. Khurat, J. Abendroth, S. Bracher, P. Krishnan","doi":"10.1109/DEST.2007.371991","DOIUrl":"https://doi.org/10.1109/DEST.2007.371991","url":null,"abstract":"As information and communication technologies move towards service orientation, many small-medium enterprises (SMEs) are unlikely to consider possible security implications (such as privacy) due to their limited expertise with technology. Policies are commonly used in existing service oriented environments to secure sensitive data. However, failures such as human error, software malfunction, policy contradiction, etc. can result in privacy breaches. In this paper, we propose a privacy device based on the Fail-Safe concept to show how privacy breaches can be avoided. This device uses client-defined policies to protect data released by the service provider.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Modelling Language: a framework supporting interoperability in cluster of SMEs","authors":"A. Corallo, E. Caputo, V. Cisternino","doi":"10.1109/DEST.2007.371954","DOIUrl":"https://doi.org/10.1109/DEST.2007.371954","url":null,"abstract":"This paper aims at describing the effort realised by ISUFI in defining the business modelling language (BML), in the widest context of the digital business ecosystem (DBE) Project. One of the main obstacles in the adoption of e-business technologies from organisations and communities depends on the divide between technologies, which have reached a quite high level of maturity, and methodologies enabling business knowledge modelling. These methodologies are, on one side, not enough connected with software development and management processes and, on the other, poorly usable and understandable from business users. BML has as main purpose to allows a more simple communication among business people involved in e-business scenario, granting at the same time a strong expressivity and formal logic mapping.","PeriodicalId":448012,"journal":{"name":"2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133103893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}