2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering最新文献

筛选
英文 中文
Meta Web Service based Distributed Model Management and Composition Approach 基于元Web服务的分布式模型管理与组合方法
Xianglan Han, Yangguang Liu, Bin Xu, Gang Zhang
{"title":"Meta Web Service based Distributed Model Management and Composition Approach","authors":"Xianglan Han, Yangguang Liu, Bin Xu, Gang Zhang","doi":"10.1109/ISKE.2010.5680808","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680808","url":null,"abstract":"To satisfy the requirement of making scientific decision quickly and correctly in distributed network environment, a Meta Web Service based Distributed Model Management and Composition Approach is proposed. The Overall framework of Meta web service is designed, and each component is analyzed. An improved model service matching algorithm is given. Utilizing backward reasoning technique to compose model services dynamically and automatically, a process is then given which uses several model services to compose to make a single service. Compared with traditional model management approach, the approach provided here has the functions of model remote calling and running, automatic composing and executing etc., which provide a new approach to build model system for decision support system solving complex problems.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"59 1","pages":"117-122"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77806428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TreoStream: A peer-to-peer streaming media system prototype TreoStream:一个点对点流媒体系统原型
Hui Xiao, Wei Gong
{"title":"TreoStream: A peer-to-peer streaming media system prototype","authors":"Hui Xiao, Wei Gong","doi":"10.1109/ISKE.2010.5680743","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680743","url":null,"abstract":"A core issue that confronts peer-to-peer streaming media application is to efficiently schedule the propagation of data segment. This paper presents a peer-to-peer scheme based on principal-agent model (PAM) that some peers play the role of agent, to gather the information of principal peers in its local physical network, which can be used to optimizing of data scheduling. We designs and implements a peer-to-peer streaming media system prototype based PAM, which called TreoStream. Experiments show that TreoStream can improve the efficiency of data scheduling, without increasing the traffic overhead of system.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"88 1","pages":"524-527"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73205665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new methodology to measure consensus 一种衡量共识的新方法
J. Alcantud, R. D. A. Calle
{"title":"A new methodology to measure consensus","authors":"J. Alcantud, R. D. A. Calle","doi":"10.1109/ISKE.2010.5680853","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680853","url":null,"abstract":"In some group decision making problems of real life not only is significant to rank the alternatives but it also is important to measure how much consensus this solution conveys to the group. Due to this fact, in this work we propose a new methodology to measure the degree of consensus obtained by a group decision making process. To develop that approach, we define a class of consensus measures based on particular social rules. Some of their basic properties are proved too.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"87 1","pages":"365-370"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74535581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting rich features for Chinese named entity recognition 开发中文命名实体识别的丰富特征
Jianping Shen, Xuan Wang, S. Li, Lin Yao
{"title":"Exploiting rich features for Chinese named entity recognition","authors":"Jianping Shen, Xuan Wang, S. Li, Lin Yao","doi":"10.1109/ISKE.2010.5680864","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680864","url":null,"abstract":"In this paper we design a multiple features template includes basic features, prefixes and suffixed features, dictionary features and combined features for Chinese named entity recognizer CRF model-based. We do a pre-processing procedure such as pos tag, chunk dictionary-based first. Then for dictionary features, different proportion of dictionaries are used in training and testing, which is different from the work reported in the literature, especially to person name dictionary, location name dictionary and organization name dictionary. For these three named entity dictionaries, the training dictionaries are just a part of the testing dictionaries. Empirical results show that the multiple features template is comprehensive and different proportion of some dictionaries used in training and testing improve performance significantly. Our final system achieved the F-measure of 91.27% at MSRA testing corpus, which is even better than the SIGHAN 2006 at the same testing corpus.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"33 1","pages":"278-282"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73129380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive optimization of injection parts quality using numerical simulation and hybrid intelligence technology 基于数值模拟和混合智能技术的注塑件质量综合优化
Wei Yang, Guang Jin, Jun Zheng, Xianliang Jiang
{"title":"Comprehensive optimization of injection parts quality using numerical simulation and hybrid intelligence technology","authors":"Wei Yang, Guang Jin, Jun Zheng, Xianliang Jiang","doi":"10.1109/ISKE.2010.5680796","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680796","url":null,"abstract":"Due to the coupling and nonlinear relationship between processing variables, it is difficult to achieve the comprehensive optimization of injection part quality effectively only by conventional methods. To solve the problem above, firstly some quality indices were extracted according to the quality requirements of the product and a fuzzy comprehensive evaluation formula including the pertinent indices was used as a mathematical description of injection parts quality. Then an approximate calculation and optimization model was obtained by combining numerical simulation with hybrid intelligence technology. Finally the method discussed above is proved to be feasible and effective by the study of a deep-cavity and shell-shape part.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"21 1","pages":"67-72"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76301672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A clustering-based approach on sentiment analysis 基于聚类的情感分析方法
Gang Li, Fei Liu
{"title":"A clustering-based approach on sentiment analysis","authors":"Gang Li, Fei Liu","doi":"10.1109/ISKE.2010.5680859","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680859","url":null,"abstract":"This paper introduces the clustering-based sentiment analysis approach which is a new approach to sentiment analysis. By applying a TF-IDF weighting method, voting mechanism and importing term scores, an acceptable and stable clustering result can be obtained. It has competitive advantages over the two existing kinds of approaches: symbolic techniques and supervised learning methods. It is a well performed, efficient, and non-human participating approach on solving sentiment analysis problems.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"91 1","pages":"331-337"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85829894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
Research on the effects of information technology on knowledge work productivity 信息技术对知识工作生产率的影响研究
Kejing Zhang, Huilin Chen, Changjun Dai
{"title":"Research on the effects of information technology on knowledge work productivity","authors":"Kejing Zhang, Huilin Chen, Changjun Dai","doi":"10.1109/ISKE.2010.5680833","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680833","url":null,"abstract":"This paper seeks to explore the influencing mechanism of IT on the productivity of knowledge work. Firstly, based on the analysis of the existing research, the key characteristics of IT, knowledge work and its productivity are defined. Secondly, a three layer conceptual model is proposed. With a questionnaire designed for the empirical study and the data collected, a mathematical model for the analysis of the effects of IT on knowledge work productivity is built by applying structural equation modeling. LISREL8.70 is used to do the path analysis. For the questionnaire, reliability and validity analysis have been provided. The mathematical model consisting of measurement model and structure model are obtained, which explains the relationship among the dimensions of IT, knowledge work and its productivity.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"2 1","pages":"464-469"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84991136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation and comparison of business process modeling methodologies for small and midsized enterprises 中小型企业业务流程建模方法的评估和比较
Fatma Aksu, K. Vanhoof, L. Munck
{"title":"Evaluation and comparison of business process modeling methodologies for small and midsized enterprises","authors":"Fatma Aksu, K. Vanhoof, L. Munck","doi":"10.1109/ISKE.2010.5680772","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680772","url":null,"abstract":"This paper focuses on small and midsized enterprises (SME's) and investigates which business process modeling (BPM) methodology is the most adequate and appropriate for these type of companies. Therefore, it selects and applies a general framework along with the evaluation and comparison of BPM-methodologies rather than isolated frameworks. More specific, this paper emphasizes the intention towards a foundation of such a framework based on a method ranking approach combined with a case based approach.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"13 1","pages":"664-667"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83172137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A social approach to security: Using social networks to help detect malicious web content 社会性的安全方法:使用社会性网络来帮助检测恶意web内容
Michael Robertson, Yin Pan, Bo Yuan
{"title":"A social approach to security: Using social networks to help detect malicious web content","authors":"Michael Robertson, Yin Pan, Bo Yuan","doi":"10.1109/ISKE.2010.5680839","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680839","url":null,"abstract":"In the midst of a social networking revolution, social media has become the new vehicle for effective business marketing and transactions. As social aspects to the Internet continue to expand in both quantity and scope, so has the security threat towards enterprise networks and systems. Many social networking users also become main targets of spams, phishing, stalking, and other malware attacks that exploit the trust among social network “friends”. This paper presents a comprehensive method combining traditional security heuristics with social networking data to aid in the detection of malicious web content as it propagates through the user's network. A Facebook application is implemented to automatically evaluate and detect malicious link content. The results of testing this application against known phishing and malware sites with real-world user profiles have shown encouraging results.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"61 1","pages":"436-441"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89703207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
LDA-based user interests discovery in collaborative tagging system 协同标记系统中基于lda的用户兴趣发现
Shuang Song, Li Yu, Xiaoping Yang
{"title":"LDA-based user interests discovery in collaborative tagging system","authors":"Shuang Song, Li Yu, Xiaoping Yang","doi":"10.1109/ISKE.2010.5680852","DOIUrl":"https://doi.org/10.1109/ISKE.2010.5680852","url":null,"abstract":"The success and popularity of collaborative tagging systems, such as delicious1, Flickr2, Last.fm3, has increasingly centered on. Users of these websites can easily tag their interested WebPages, photos and music with their preferred words. Subsequently, the extensive tagging data attract many researchers to mine useful information from these. In this paper, we propose a novel user interests quantified approach based on user-generated tags. Moreover, by means of the generative probabilistic model Latent Dirichlet Allocation (LDA), we acquire the interests for each user. Experimenting with the dataset provided within the ECML PKDD Discovery Challenge 2009, our method makes better performance.","PeriodicalId":6417,"journal":{"name":"2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering","volume":"1 1","pages":"338-343"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89819840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信