Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746774
José Bringel Filho, H. Martin
With the growing advancement of ubiquitous computing (UbiComp), we are moving towards an era where access control and security policies will be based on context information. As context information represents real-world situations, it is associated with certain quality indicators that can directly influence the access control decisions. In this paper, we propose a quality-aware context-based access control model that takes into account the context information and its QoC indicators to grant and to adapt access permissions to resources.
{"title":"A Quality-Aware Context-Based Access Control model for ubiquitous applications","authors":"José Bringel Filho, H. Martin","doi":"10.1109/ICDIM.2008.4746774","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746774","url":null,"abstract":"With the growing advancement of ubiquitous computing (UbiComp), we are moving towards an era where access control and security policies will be based on context information. As context information represents real-world situations, it is associated with certain quality indicators that can directly influence the access control decisions. In this paper, we propose a quality-aware context-based access control model that takes into account the context information and its QoC indicators to grant and to adapt access permissions to resources.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116366425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746819
Josef Makolm, S. Weiß, Doris Ipsmiller
Efficient and effective knowledge management plays an increasingly important role in knowledge intensive organizations. The research project DYONIPOS focuses on detecting the knowledge needs of knowledge workers and automatically providing this required knowledge just in time. The prototype DYONIPOS generates new knowledge out of artefacts, while avoiding additional work and violations of the knowledge workerpsilas privacy. The knowledge is made available through semantic linkage of the relevant information from existing repositories. In addition DYONIPOS creates an individual and an organizational knowledge data base to achieve the knowledge. This article is structured as follows: section 1 addresses the relation between the applied approach and the challenge in e-government and summarizes the aims of the research project DYONIPOS. In section 2 the semantic and knowledge discovery technologies used are presented. The paper concludes with the presentation of the use-case project, showing the results of the first and the second test and screenshots of the updated DYONIPOS application.
{"title":"DYONIPOS: Proactive support of knowledge workers","authors":"Josef Makolm, S. Weiß, Doris Ipsmiller","doi":"10.1109/ICDIM.2008.4746819","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746819","url":null,"abstract":"Efficient and effective knowledge management plays an increasingly important role in knowledge intensive organizations. The research project DYONIPOS focuses on detecting the knowledge needs of knowledge workers and automatically providing this required knowledge just in time. The prototype DYONIPOS generates new knowledge out of artefacts, while avoiding additional work and violations of the knowledge workerpsilas privacy. The knowledge is made available through semantic linkage of the relevant information from existing repositories. In addition DYONIPOS creates an individual and an organizational knowledge data base to achieve the knowledge. This article is structured as follows: section 1 addresses the relation between the applied approach and the challenge in e-government and summarizes the aims of the research project DYONIPOS. In section 2 the semantic and knowledge discovery technologies used are presented. The paper concludes with the presentation of the use-case project, showing the results of the first and the second test and screenshots of the updated DYONIPOS application.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122112193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746815
Indong Yeo, Jonghyune Kim, Sunshin An
The low rate wireless personal network (LR-WPAN) is a new standard uniquely designed for low data rates and low energy consumption. LR-WPAN researchers are focusing extensively on the wireless technology and energy consumption, but many papers do not cover channel characterization and link quality assessment in LR-WPANs, even though we could reasonably surmise that the network performance will be optimized only when the channel and link information are provided. In this paper, we will suggest a new mechanism for performance enhancement in the presence of a time-varying channel response. First, we will regard the link quality indicator (LQI) as a channel state indicator. Second, we will modify the pure CSMA-CA procedure by reflecting the LQI measurement. Finally, we roughly observe the time-varying channel, and then we assign a weight to the L2 scheduling parameter known as the backoff exponent (BE). This mechanism upgrades the network performance when there is a time-varying channel. This paper addresses the problem by creating an efficient scheduling scheme that is based on the channel memory. The result of an NS-2 simulation indicates an overall improvement in the effective throughput, energy consumption, and end-to-end delay.
{"title":"Performance optimization over channel model for a Low Rate Wireless Personal Area Network","authors":"Indong Yeo, Jonghyune Kim, Sunshin An","doi":"10.1109/ICDIM.2008.4746815","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746815","url":null,"abstract":"The low rate wireless personal network (LR-WPAN) is a new standard uniquely designed for low data rates and low energy consumption. LR-WPAN researchers are focusing extensively on the wireless technology and energy consumption, but many papers do not cover channel characterization and link quality assessment in LR-WPANs, even though we could reasonably surmise that the network performance will be optimized only when the channel and link information are provided. In this paper, we will suggest a new mechanism for performance enhancement in the presence of a time-varying channel response. First, we will regard the link quality indicator (LQI) as a channel state indicator. Second, we will modify the pure CSMA-CA procedure by reflecting the LQI measurement. Finally, we roughly observe the time-varying channel, and then we assign a weight to the L2 scheduling parameter known as the backoff exponent (BE). This mechanism upgrades the network performance when there is a time-varying channel. This paper addresses the problem by creating an efficient scheduling scheme that is based on the channel memory. The result of an NS-2 simulation indicates an overall improvement in the effective throughput, energy consumption, and end-to-end delay.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746805
A. Kundu, A. R. Pal, Tanay Sarkar, M. Banerjee, S. Guha, Debajyoti Mukhopadhyay
This paper reports a generic analysis on null boundary and periodic boundary 3-neighborhood multiple attractor cellular automata (MACA) for showing the comparative study in classification technique. Cellular automata (CA) is now-a-days an essential tool for researchers in the area of pattern recognition, pattern generation, testing field, fault diagnosis and so on. So, general knowledge on CA up to some extent is a must for researchers in these areas. A CA may be linear or non-linear in behavior. A linear/additive CA employs XOR/XNOR logic, while a non-linear CA employs AND/OR/NOT logic. This paper shows a graph analysis along with state transition behavior of CA cells. A rule vector graph (RVG) is generated from the rule vector (RV) of a CA. Linear time algorithms are reported for generation of RVG. MACA provides an implicit memory to store the patterns. Search operation to identify the class of a pattern out of several classes boils down to running a CA for one time step. This demands storage of RV and seed values. MACA is based on sound theoretical foundation of CA technology. This paper only concentrates on MACA since it is responsible for classifying the various types of patterns.
{"title":"Comparative study on Null Boundary and Periodic Boundary 3-neighborhood Multiple Attractor Cellular Automata for classification","authors":"A. Kundu, A. R. Pal, Tanay Sarkar, M. Banerjee, S. Guha, Debajyoti Mukhopadhyay","doi":"10.1109/ICDIM.2008.4746805","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746805","url":null,"abstract":"This paper reports a generic analysis on null boundary and periodic boundary 3-neighborhood multiple attractor cellular automata (MACA) for showing the comparative study in classification technique. Cellular automata (CA) is now-a-days an essential tool for researchers in the area of pattern recognition, pattern generation, testing field, fault diagnosis and so on. So, general knowledge on CA up to some extent is a must for researchers in these areas. A CA may be linear or non-linear in behavior. A linear/additive CA employs XOR/XNOR logic, while a non-linear CA employs AND/OR/NOT logic. This paper shows a graph analysis along with state transition behavior of CA cells. A rule vector graph (RVG) is generated from the rule vector (RV) of a CA. Linear time algorithms are reported for generation of RVG. MACA provides an implicit memory to store the patterns. Search operation to identify the class of a pattern out of several classes boils down to running a CA for one time step. This demands storage of RV and seed values. MACA is based on sound theoretical foundation of CA technology. This paper only concentrates on MACA since it is responsible for classifying the various types of patterns.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129991781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746711
Amani A. Al-Ajlan, Hend Suliman Al-Khalifa, A. Al-Salman
Currently, there are more than 200 readability formulas developed since the 1920s. Only a handful of these formulas are reliable to determine the reading-level of a sample text. Ascertaining the readability of curricula is an important step toward optimizing the effectiveness of the educational progress. Readability measurements are done using manual computation. This is a tedious and time-consuming task. However, nowadays, automatic readability computation has gained much popularity than ever before. This can be attributed to the advancement in the field of natural language processing. Languages such as English and Spanish have benefited from the formation of automatic readability systems. Absence of automated readability measurement of Arabic texts and the large amount of information which are written in Arabic encouraged us to work on finding an automatic readability system for our language; the mother language for millions of Arabs. In this paper we will review the different readability research and then propose a system for automating the readability measurement of Arabic text. Within the paper we also report the results of our pilot experiment carried out on the different well-known Arabic, Swedish and English readability formulas.
{"title":"Towards the development of an automatic readability measurements for arabic language","authors":"Amani A. Al-Ajlan, Hend Suliman Al-Khalifa, A. Al-Salman","doi":"10.1109/ICDIM.2008.4746711","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746711","url":null,"abstract":"Currently, there are more than 200 readability formulas developed since the 1920s. Only a handful of these formulas are reliable to determine the reading-level of a sample text. Ascertaining the readability of curricula is an important step toward optimizing the effectiveness of the educational progress. Readability measurements are done using manual computation. This is a tedious and time-consuming task. However, nowadays, automatic readability computation has gained much popularity than ever before. This can be attributed to the advancement in the field of natural language processing. Languages such as English and Spanish have benefited from the formation of automatic readability systems. Absence of automated readability measurement of Arabic texts and the large amount of information which are written in Arabic encouraged us to work on finding an automatic readability system for our language; the mother language for millions of Arabs. In this paper we will review the different readability research and then propose a system for automating the readability measurement of Arabic text. Within the paper we also report the results of our pilot experiment carried out on the different well-known Arabic, Swedish and English readability formulas.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746812
K. Denecke
The main focus of this paper is to introduce an approach to sentiment classification for documents in different languages. The method is based on language-specific resources available for English. First, documents are translated to English using standard translation software. For polarity detection, sentiment-bearing terms are identified by means of SentiWordNet. Polarity scores calculated for words of three word classes are exploited by a machine learning classifier for determining the document polarity. The introduced method is tested and evaluated on movie reviews in six different languages. The results show that polarity can be correctly determined even if language specific resources are unavailable.
{"title":"How to assess customer opinions beyond language barriers?","authors":"K. Denecke","doi":"10.1109/ICDIM.2008.4746812","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746812","url":null,"abstract":"The main focus of this paper is to introduce an approach to sentiment classification for documents in different languages. The method is based on language-specific resources available for English. First, documents are translated to English using standard translation software. For polarity detection, sentiment-bearing terms are identified by means of SentiWordNet. Polarity scores calculated for words of three word classes are exploited by a machine learning classifier for determining the document polarity. The introduced method is tested and evaluated on movie reviews in six different languages. The results show that polarity can be correctly determined even if language specific resources are unavailable.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132394223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746803
A. Bahuguna
In the past, proprietary mainframe technology platforms provided a well defined architecture and environment, to build enterprise batch processing solutions. The businesses imperative today, is to develop similar solutions, using investments made in a varied mix of open systems technologies. Many of these technologies provide only a generic platform, not specifically targeted at enterprise batch processing requirements. This poses new challenges, in defining the architecture of enterprise batch processing solutions, which use such technologies. To address these challenges, we have identified an architecture, which combines concepts of intelligent agents and service orientation, to serve as a reference for building enterprise batch processing solutions.
{"title":"Reference architecture for enterprise batch processing of unformation","authors":"A. Bahuguna","doi":"10.1109/ICDIM.2008.4746803","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746803","url":null,"abstract":"In the past, proprietary mainframe technology platforms provided a well defined architecture and environment, to build enterprise batch processing solutions. The businesses imperative today, is to develop similar solutions, using investments made in a varied mix of open systems technologies. Many of these technologies provide only a generic platform, not specifically targeted at enterprise batch processing requirements. This poses new challenges, in defining the architecture of enterprise batch processing solutions, which use such technologies. To address these challenges, we have identified an architecture, which combines concepts of intelligent agents and service orientation, to serve as a reference for building enterprise batch processing solutions.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"213 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746836
E. Sánchez-Nielsen, F. Chávez-Gutiérrez
MyLegislative approach aims to narrow the gap between the people and their elected representatives in parliaments by means of being a personalized channel of information to citizens and canvas their views to their elected representatives. MyLegislative solution is a production support system focused on a personalized podcasting production infrastructure with feedback functionalities to enable: (i) on-demand legislative information of plenary sessions and (ii) people interaction. Real-time information is computed using semantic technologies based on MPEG-7 standard. People interaction is computed by means of feedback processes using a rating mechanism. As a result, the functionalities of the system are twofold. First, people are kept informed about their explicit needs with the potential of anywhere and anytime environments. Second, elected representatives receive a report which has been automated created from people interaction. This feedback allows parliaments to become more sensitive to the needs and preferences of citizens because the audiences are clearly identifying their preferences, and at the same time evaluating the role and outcomes of their elected representatives.
{"title":"MyLegislative information service: Closing the gap between the citizens and the democracy","authors":"E. Sánchez-Nielsen, F. Chávez-Gutiérrez","doi":"10.1109/ICDIM.2008.4746836","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746836","url":null,"abstract":"MyLegislative approach aims to narrow the gap between the people and their elected representatives in parliaments by means of being a personalized channel of information to citizens and canvas their views to their elected representatives. MyLegislative solution is a production support system focused on a personalized podcasting production infrastructure with feedback functionalities to enable: (i) on-demand legislative information of plenary sessions and (ii) people interaction. Real-time information is computed using semantic technologies based on MPEG-7 standard. People interaction is computed by means of feedback processes using a rating mechanism. As a result, the functionalities of the system are twofold. First, people are kept informed about their explicit needs with the potential of anywhere and anytime environments. Second, elected representatives receive a report which has been automated created from people interaction. This feedback allows parliaments to become more sensitive to the needs and preferences of citizens because the audiences are clearly identifying their preferences, and at the same time evaluating the role and outcomes of their elected representatives.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125322854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746699
A. Smirnov, N. Shilov, Andrew Krizhanovsky, Antti Lappeteläinen, I. Oliver, S. Boldyrev
Development of new technologies brings people new possibilities such as smart spaces. Smart spaces can provide better user experience by allowing a user to connect new devices flexibly and to access all the information in the multi device system from any of the devices. However, this also raises new challenges. The paper considers the problem of efficient distributed information sharing in smart spaces. Models for information distribution are presented together with a simulation framework.
{"title":"Efficient distributed information management in smart spaces","authors":"A. Smirnov, N. Shilov, Andrew Krizhanovsky, Antti Lappeteläinen, I. Oliver, S. Boldyrev","doi":"10.1109/ICDIM.2008.4746699","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746699","url":null,"abstract":"Development of new technologies brings people new possibilities such as smart spaces. Smart spaces can provide better user experience by allowing a user to connect new devices flexibly and to access all the information in the multi device system from any of the devices. However, this also raises new challenges. The paper considers the problem of efficient distributed information sharing in smart spaces. Models for information distribution are presented together with a simulation framework.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746709
Q. Althebyan, B. Panda
In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.
{"title":"Performance analysis of an insider threat mitigation model","authors":"Q. Althebyan, B. Panda","doi":"10.1109/ICDIM.2008.4746709","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746709","url":null,"abstract":"In this work, we presented an approach to extract knowledge out of an object. A graph theory approach to represent and manage the knowledge is explained. We then presented a performance analysis for an insider threat mitigation model proposed earlier. We relied on some characteristics of the insiders and the decomposition of objects in the underlying system in developing our method and conducting our simulation. Our modelpsilas results showed great resistance against such attacks.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}