Rolling back to previously visited Web pages and opening multiple browser windows or tabs at the same time are common activities in a Web browsing session on a PC. When using a mobile device for Web browsing, these usage patterns have to be supported seamlessly in the mobile environment under the additional constraint of limited screen real estate. In this paper, we introduce a solution called rolling history, a user interface targeted for mobile devices with 4-way navigation control and graphics acceleration hardware. We tested the usefulness of a rolling history prototype in two small-scale user studies and the results indicate that rolling history is a useful feature for Web history navigation and browser windows management. The rolling history case demonstrates how to design a unique user interface for a mobile device without displacing the deep-seated use patterns that people have found useful on a PC.
{"title":"Graphical History List with Multi-window Support on a Mobile Web Browser","authors":"E. Vartiainen, Virpi Roto, Janne Kaasalainen","doi":"10.1109/ICIW.2008.13","DOIUrl":"https://doi.org/10.1109/ICIW.2008.13","url":null,"abstract":"Rolling back to previously visited Web pages and opening multiple browser windows or tabs at the same time are common activities in a Web browsing session on a PC. When using a mobile device for Web browsing, these usage patterns have to be supported seamlessly in the mobile environment under the additional constraint of limited screen real estate. In this paper, we introduce a solution called rolling history, a user interface targeted for mobile devices with 4-way navigation control and graphics acceleration hardware. We tested the usefulness of a rolling history prototype in two small-scale user studies and the results indicate that rolling history is a useful feature for Web history navigation and browser windows management. The rolling history case demonstrates how to design a unique user interface for a mobile device without displacing the deep-seated use patterns that people have found useful on a PC.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of the semantic Web and of semantic Web services an explosion in the number of ontologies employed is to be expected. How to match the concepts in different ontologies is quite an important research topic. A weighted rough ontology mapping method based on rough set theory and formal concept analysis is proposed: the two source ontologies are first transformed into formal contexts with linguistic processing techniques; then, the two formal contexts are merged to obtain a complete concept lattice; finally, a rough similarity measure is introduced to produce the ontology mapping results. The proposed similarity model is structural with a specific rough lower measure and a boundary measure, and is expected to be accurate with the help of the weights for adjusting the degree of the two obtained similarity measures' importance.
{"title":"A Rough Similarity Measure for Ontology Mapping","authors":"Yi Zhao, W. Halang, Xia Wang","doi":"10.1109/ICIW.2008.51","DOIUrl":"https://doi.org/10.1109/ICIW.2008.51","url":null,"abstract":"With the development of the semantic Web and of semantic Web services an explosion in the number of ontologies employed is to be expected. How to match the concepts in different ontologies is quite an important research topic. A weighted rough ontology mapping method based on rough set theory and formal concept analysis is proposed: the two source ontologies are first transformed into formal contexts with linguistic processing techniques; then, the two formal contexts are merged to obtain a complete concept lattice; finally, a rough similarity measure is introduced to produce the ontology mapping results. The proposed similarity model is structural with a specific rough lower measure and a boundary measure, and is expected to be accurate with the help of the weights for adjusting the degree of the two obtained similarity measures' importance.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pastore, C. Boccato, M. Galliani, L. Nobili, E. Lazzaretto
The Web 2.0 phenomenon comprises a set of techniques and applications design principles for personalizing the Web. It is different to classic Web technologies as it refers to a class of Web-based applications that have been recognized to share certain design patterns. Today, the term encompasses Web-based applications like mashups, blogs, wikis, feeds, tagging systems, user-created publication systems, and social networking applications implemented by a range of techniques from programming languages to algorithms. The paper briefly describes some implementations of such new trends applied in science outreach, and information areas, which address different categories of users. The web-based feature of such applications imposes some constraints on the underlying network infrastructure, and inevitably creates security challenges.
Web 2.0现象包括一组用于个性化Web的技术和应用程序设计原则。它与经典Web技术不同,因为它指的是一类基于Web的应用程序,这些应用程序已被认为共享某些设计模式。今天,这个术语涵盖了基于web的应用程序,如mashup、博客、wiki、提要、标签系统、用户创建的发布系统,以及通过从编程语言到算法等一系列技术实现的社交网络应用程序。本文简要描述了这些新趋势在科学推广和信息领域应用的一些实现,这些领域针对不同类别的用户。此类应用程序的基于web的特性对底层网络基础设施施加了一些限制,并且不可避免地产生了安全挑战。
{"title":"Implementations of the Web 2.0 Phenomenon and Its Technologies for Science Outreach and Communication in the Research Network","authors":"S. Pastore, C. Boccato, M. Galliani, L. Nobili, E. Lazzaretto","doi":"10.1109/ICIW.2008.38","DOIUrl":"https://doi.org/10.1109/ICIW.2008.38","url":null,"abstract":"The Web 2.0 phenomenon comprises a set of techniques and applications design principles for personalizing the Web. It is different to classic Web technologies as it refers to a class of Web-based applications that have been recognized to share certain design patterns. Today, the term encompasses Web-based applications like mashups, blogs, wikis, feeds, tagging systems, user-created publication systems, and social networking applications implemented by a range of techniques from programming languages to algorithms. The paper briefly describes some implementations of such new trends applied in science outreach, and information areas, which address different categories of users. The web-based feature of such applications imposes some constraints on the underlying network infrastructure, and inevitably creates security challenges.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefanie N. Lindstaedt, Viktoria Pammer-Schindler, R. Mörzinger, Roman Kern, Helmut Mülner, Claudia Wagner
Imagine you are member of an online social system and want to upload a picture into the community pool. In current social software systems, you can probably tag your photo, share it or send it to a photo printing service and multiple other stuff. The system creates around you a space full of pictures, other interesting content (descriptions, comments) and full of users as well. The one thing current systems do not do, is understand what your pictures are about. We present here a collection of functionalities that make a step in that direction when put together to be consumed by a tag recommendation system for pictures. We use the data richness inherent in social online environments for recommending tags by analysing different aspects of the same data (text, visual content and user context). We also give an assessment of the quality of thus recommended tags.
{"title":"Recommending Tags for Pictures Based on Text, Visual Content and User Context","authors":"Stefanie N. Lindstaedt, Viktoria Pammer-Schindler, R. Mörzinger, Roman Kern, Helmut Mülner, Claudia Wagner","doi":"10.1109/ICIW.2008.26","DOIUrl":"https://doi.org/10.1109/ICIW.2008.26","url":null,"abstract":"Imagine you are member of an online social system and want to upload a picture into the community pool. In current social software systems, you can probably tag your photo, share it or send it to a photo printing service and multiple other stuff. The system creates around you a space full of pictures, other interesting content (descriptions, comments) and full of users as well. The one thing current systems do not do, is understand what your pictures are about. We present here a collection of functionalities that make a step in that direction when put together to be consumed by a tag recommendation system for pictures. We use the data richness inherent in social online environments for recommending tags by analysing different aspects of the same data (text, visual content and user context). We also give an assessment of the quality of thus recommended tags.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125146701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Stanescu, Victor Groza, M. Stratulat, D. Borca, Ioana Ghergulescu
Digital watermarking is a technique used against illicit distribution of copyrighted material. In this paper we present steganographic techniques for watermarking, with an emphasis on robustness and bit-rate. Robustness is achieved using an optimal transform, and bit-rate is achieved by properly preprocessing the watermark signal.
{"title":"Robust Watermarking with High Bit Rate","authors":"D. Stanescu, Victor Groza, M. Stratulat, D. Borca, Ioana Ghergulescu","doi":"10.1109/ICIW.2008.106","DOIUrl":"https://doi.org/10.1109/ICIW.2008.106","url":null,"abstract":"Digital watermarking is a technique used against illicit distribution of copyrighted material. In this paper we present steganographic techniques for watermarking, with an emphasis on robustness and bit-rate. Robustness is achieved using an optimal transform, and bit-rate is achieved by properly preprocessing the watermark signal.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Norbisrath, K. Kraaner, E. Vainikko, Oleg Batrashev
Nowadays, grids are very heavyweight and complex. They need huge administrative capacities, just to keep the grid infrastructure running. If only a small job should be submitted, this administrative overhead is not justified. The initial metaphor for the computational grid being as easy as a power grid is still unfulfilled. To facilitate a public usage of Grids, we simplify grid computing using peer-to-peer computing and instant messaging. Instant messaging is used by the vast majority of computer users. We assume that using instant messaging techniques for the administrative part of setting up the grid will open grid capabilities to the public and thereby enable a desktop grid. We call the here applied paradigm friend-to-friend computing (F2F Computing). F2F computing offers the opportunity to spontaneously setup desktop grids with friends or colleagues via instant messaging. There is no server installation or maintenance needed. We describe the F2F computing framework, its implementation, future steps, and present the first results of running applications on top of it.
{"title":"Friend-to-Friend Computing - Instant Messaging Based Spontaneous Desktop Grid","authors":"U. Norbisrath, K. Kraaner, E. Vainikko, Oleg Batrashev","doi":"10.1109/ICIW.2008.87","DOIUrl":"https://doi.org/10.1109/ICIW.2008.87","url":null,"abstract":"Nowadays, grids are very heavyweight and complex. They need huge administrative capacities, just to keep the grid infrastructure running. If only a small job should be submitted, this administrative overhead is not justified. The initial metaphor for the computational grid being as easy as a power grid is still unfulfilled. To facilitate a public usage of Grids, we simplify grid computing using peer-to-peer computing and instant messaging. Instant messaging is used by the vast majority of computer users. We assume that using instant messaging techniques for the administrative part of setting up the grid will open grid capabilities to the public and thereby enable a desktop grid. We call the here applied paradigm friend-to-friend computing (F2F Computing). F2F computing offers the opportunity to spontaneously setup desktop grids with friends or colleagues via instant messaging. There is no server installation or maintenance needed. We describe the F2F computing framework, its implementation, future steps, and present the first results of running applications on top of it.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present a system for predicting the examination result, called automatic score prediction system (ASPS). ASPS builds on the lecture structure created by a teacher or a particular pedagogy a course content tree. Each examination sheet is then derived from this course content tree. Besides, each of the question items in an examination sheet belongs to either a section, a chapter, or a unit The difficulty and authority of the question items are determined by the weighted score. The main task of the system is in the classification of the testing results and in the provision of the learning curves and the remedial courses. The learning achievement and testing results can be summarized as a learning curve to the students. By analyzing the learning accomplishments, not only can ASPS predict the probabilistic result of the next examination, but it can also provide reviews or remedial lessons to the students. The main contributions of the ASPS system described herein are twofold: (1) the system can produce the learning curve based on the examination result, which would make it easy for the students and teachers to understand the learning results. (2) The system can provide the course contents to the students to help them review after the examination. Moreover, it provides suggestions for teaching on the not yet acquainted and confused contents.
{"title":"A Remedial Supporting Based Learning Management System","authors":"P. Chuang, Chu-Sing Yang, Ming-Chao Chiang","doi":"10.1109/ICIW.2008.110","DOIUrl":"https://doi.org/10.1109/ICIW.2008.110","url":null,"abstract":"In this paper, we present a system for predicting the examination result, called automatic score prediction system (ASPS). ASPS builds on the lecture structure created by a teacher or a particular pedagogy a course content tree. Each examination sheet is then derived from this course content tree. Besides, each of the question items in an examination sheet belongs to either a section, a chapter, or a unit The difficulty and authority of the question items are determined by the weighted score. The main task of the system is in the classification of the testing results and in the provision of the learning curves and the remedial courses. The learning achievement and testing results can be summarized as a learning curve to the students. By analyzing the learning accomplishments, not only can ASPS predict the probabilistic result of the next examination, but it can also provide reviews or remedial lessons to the students. The main contributions of the ASPS system described herein are twofold: (1) the system can produce the learning curve based on the examination result, which would make it easy for the students and teachers to understand the learning results. (2) The system can provide the course contents to the students to help them review after the examination. Moreover, it provides suggestions for teaching on the not yet acquainted and confused contents.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"90 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114047493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web service is a standardization effort to interoperate loosely-coupled applications. A Web service interaction benefits and sometimes requires additive functionalities, called as handlers. They contribute to build rich, modular and efficient Web services. However, the way of utilizing them is very crucial for the Web service architecture and its overall performance. Using distributed approach for the handler execution facilitates significantly to obtain full benefit from them. In this paper we describe an orchestration structure for the handlers to attain richer, more modular and efficient Web services.
{"title":"An Orchestration for Distributed Web Service Handlers","authors":"Beytullah Yildiz, G. Fox, S. Pallickara","doi":"10.1109/ICIW.2008.55","DOIUrl":"https://doi.org/10.1109/ICIW.2008.55","url":null,"abstract":"Web service is a standardization effort to interoperate loosely-coupled applications. A Web service interaction benefits and sometimes requires additive functionalities, called as handlers. They contribute to build rich, modular and efficient Web services. However, the way of utilizing them is very crucial for the Web service architecture and its overall performance. Using distributed approach for the handler execution facilitates significantly to obtain full benefit from them. In this paper we describe an orchestration structure for the handlers to attain richer, more modular and efficient Web services.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to the astonishing development in memory and processing capabilities of hand held devices such as smart phones, it is not a dream anymore to enable mobile devices not only as conventional web service requesters but even as providers. The willingness and enthusiasm of service providers place abundant services at the disposal. But this abundance makes the efficiency of service discovery a critical issue. Centralized registries have severe drawbacks in such a scenario due to the dynamic and spontaneous nature of mobile peers. In the quest for a more appropriate approach for mobile web service discovery, we observed P2P to share very similar characteristics with behaviors of peers in mobile network. Hence we tried to find alternate mobile web service discovery mechanisms by using the features of the P2P networks like JXTA modules. The scalability analysis of the approach proves that the discovery can scale to the needs of large cellular networks.
{"title":"Scalable Mobile Web Service Discovery in Peer to Peer Networks","authors":"S. Srirama, M. Jarke, Hong-cheng Zhu, W. Prinz","doi":"10.1109/ICIW.2008.52","DOIUrl":"https://doi.org/10.1109/ICIW.2008.52","url":null,"abstract":"Due to the astonishing development in memory and processing capabilities of hand held devices such as smart phones, it is not a dream anymore to enable mobile devices not only as conventional web service requesters but even as providers. The willingness and enthusiasm of service providers place abundant services at the disposal. But this abundance makes the efficiency of service discovery a critical issue. Centralized registries have severe drawbacks in such a scenario due to the dynamic and spontaneous nature of mobile peers. In the quest for a more appropriate approach for mobile web service discovery, we observed P2P to share very similar characteristics with behaviors of peers in mobile network. Hence we tried to find alternate mobile web service discovery mechanisms by using the features of the P2P networks like JXTA modules. The scalability analysis of the approach proves that the discovery can scale to the needs of large cellular networks.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116308710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines how two small to medium sized enterprises (SMEs) implemented Web portals as part of a new e-business strategy to underpin future corporate expansion. The first company (Unified Office Products Limited) transformed itself from a traditional office supplies company into an intermediary trading over the Web with a range of business partners in the office supplies supply chain. In the second case study, a small consultancy and training organisation (C&G Services Europe Ltd) saw the opportunity to develop a Web portal to improve its on-line service to key customers, including some of the major utilities companies in the UK. Both these projects were implemented via the knowledge transfer partnership scheme that provides UK government funding to support university employed project managers working in industry to lead projects of key value to the partner companies. The progress of both companies across the duration of these projects is gauged against two mainstream models of IT and e-business development.
本文研究了两家中小型企业(sme)如何将Web门户作为新的电子商务战略的一部分来实施,以支持未来的公司扩张。第一家公司(统一办公产品有限公司)从一家传统的办公用品公司转变为一家通过网络与办公用品供应链中的一系列业务伙伴进行贸易的中介公司。在第二个案例研究中,一家小型咨询和培训机构(C&G Services Europe Ltd)看到了开发门户网站以改善其对主要客户(包括英国的一些主要公用事业公司)的在线服务的机会。这两个项目都是通过知识转移合作伙伴计划实施的,该计划为英国政府提供资金,支持大学雇用在工业界工作的项目经理,领导对合作伙伴公司具有关键价值的项目。这两个公司在这些项目期间的进展是根据IT和电子商务开发的两种主流模型来衡量的。
{"title":"Web Portals in SMEs – Two Case Studies","authors":"M. Wynn, Shujun Zhang","doi":"10.1109/ICIW.2008.85","DOIUrl":"https://doi.org/10.1109/ICIW.2008.85","url":null,"abstract":"This paper examines how two small to medium sized enterprises (SMEs) implemented Web portals as part of a new e-business strategy to underpin future corporate expansion. The first company (Unified Office Products Limited) transformed itself from a traditional office supplies company into an intermediary trading over the Web with a range of business partners in the office supplies supply chain. In the second case study, a small consultancy and training organisation (C&G Services Europe Ltd) saw the opportunity to develop a Web portal to improve its on-line service to key customers, including some of the major utilities companies in the UK. Both these projects were implemented via the knowledge transfer partnership scheme that provides UK government funding to support university employed project managers working in industry to lead projects of key value to the partner companies. The progress of both companies across the duration of these projects is gauged against two mainstream models of IT and e-business development.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125709398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}