Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746796
E. El-Qawasmeh, V. Snás̃el, P. Pichappan
This paper suggests splitting the existing email handlers into more than one group. The existing group can be considered as a group that has one-to-one relationship. However, this paper suggests that the email handlers should give the user the choice to select the relation that he would like to implement in the email handler. Three types of relationships can be identified. They are: one-to-one, one-to-many, and many-to-many relationship. Enforcing a certain type of relationship saves the time of the emailer. The paper will describe the prototype for each relationship with the advantages of each one.
{"title":"Reshaping email relationships","authors":"E. El-Qawasmeh, V. Snás̃el, P. Pichappan","doi":"10.1109/ICDIM.2008.4746796","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746796","url":null,"abstract":"This paper suggests splitting the existing email handlers into more than one group. The existing group can be considered as a group that has one-to-one relationship. However, this paper suggests that the email handlers should give the user the choice to select the relation that he would like to implement in the email handler. Three types of relationships can be identified. They are: one-to-one, one-to-many, and many-to-many relationship. Enforcing a certain type of relationship saves the time of the emailer. The paper will describe the prototype for each relationship with the advantages of each one.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746798
E. Tambouris, Nikos Loutas, Vassilios Peristeras, K. Tarabanis
The aim of this paper is to provide a better understanding on the role of interoperability in eGovernment applications. The focus of interest is on eGovernment applications involving more than one agency or heterogeneous technical infrastructures. The main research objective is to reveal contemporary, interoperability-related, obstacles and implementation decisions and trends in eGovernment applications. To fulfil this objective we started by identifying patterns of interoperability problems. We thereafter constructed a number of interoperability models that can be used to overcome the identified interoperability problems. We finally surveyed more than 100 European eGovernment applications where interoperability has a significant role. This enabled us to identify the current interoperability obstacles and the use of the interoperability models as well as to discuss discrepancies between researchers praise and practitioners' approaches. Practitioners may use the results as guidance when developing their own applications, while researchers can further extend these results.
{"title":"The role of interoperability in eGovernment applications: An investigation of obstacles and implementation decisions","authors":"E. Tambouris, Nikos Loutas, Vassilios Peristeras, K. Tarabanis","doi":"10.1109/ICDIM.2008.4746798","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746798","url":null,"abstract":"The aim of this paper is to provide a better understanding on the role of interoperability in eGovernment applications. The focus of interest is on eGovernment applications involving more than one agency or heterogeneous technical infrastructures. The main research objective is to reveal contemporary, interoperability-related, obstacles and implementation decisions and trends in eGovernment applications. To fulfil this objective we started by identifying patterns of interoperability problems. We thereafter constructed a number of interoperability models that can be used to overcome the identified interoperability problems. We finally surveyed more than 100 European eGovernment applications where interoperability has a significant role. This enabled us to identify the current interoperability obstacles and the use of the interoperability models as well as to discuss discrepancies between researchers praise and practitioners' approaches. Practitioners may use the results as guidance when developing their own applications, while researchers can further extend these results.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746834
S. Alexander, L. Tatiana, S. Nikolay, K. Alexey
A decision support system intended to operate in a smart environment is proposed. The system enables context-sensitive self-organisation of resources to support needs of the environment occupants. The system implements technologies of context management, Web-services, and software agents. An example of action planning for responding to a traffic accident happened in a smart environment is used for illustration of the system proposed.
{"title":"Context management for response to traffic accident in smart environment","authors":"S. Alexander, L. Tatiana, S. Nikolay, K. Alexey","doi":"10.1109/ICDIM.2008.4746834","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746834","url":null,"abstract":"A decision support system intended to operate in a smart environment is proposed. The system enables context-sensitive self-organisation of resources to support needs of the environment occupants. The system implements technologies of context management, Web-services, and software agents. An example of action planning for responding to a traffic accident happened in a smart environment is used for illustration of the system proposed.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746840
Daniel Sánchez-Martínez, C. I. Marín-López, A. Gómez-Skarmeta, Tomas Jimenez-Garcia
This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university community with secure and interoperable services.
{"title":"Towards e-Government: The security SOA approach of the University of Murcia","authors":"Daniel Sánchez-Martínez, C. I. Marín-López, A. Gómez-Skarmeta, Tomas Jimenez-Garcia","doi":"10.1109/ICDIM.2008.4746840","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746840","url":null,"abstract":"This paper describes the experience of the University of Murcia in the design and development of security SOA infrastructures for electronic government, which provide university community with secure and interoperable services.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746706
A. Papanikolaou, C. Ilioudis, C. Georgiadis, E. Pimenidis
The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the securely transmitted biometric data has not been constructed by an attacker. The biometric sensors of a biometric information system are often physically exposed to potential adversaries who may manipulate them and therefore compromise the security of the system. Such attacks can be detected by continuous and secure sensor monitoring. The proposed scheme is based on the Kerberos protocol for dealing with sensor authentication issues. Using authenticated control/data packets its functionality has been extended to provide secure sensor monitoring, which can help in detecting physical attacks on the sensor itself.
{"title":"The importance of biometric sensor continuous secure monitoring","authors":"A. Papanikolaou, C. Ilioudis, C. Georgiadis, E. Pimenidis","doi":"10.1109/ICDIM.2008.4746706","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746706","url":null,"abstract":"The security of a biometric information system depends partially on the ability of the biometric information sensor to authenticate itself securely to the processing centre it usually interacts with, thus ensuring that the securely transmitted biometric data has not been constructed by an attacker. The biometric sensors of a biometric information system are often physically exposed to potential adversaries who may manipulate them and therefore compromise the security of the system. Such attacks can be detected by continuous and secure sensor monitoring. The proposed scheme is based on the Kerberos protocol for dealing with sensor authentication issues. Using authenticated control/data packets its functionality has been extended to provide secure sensor monitoring, which can help in detecting physical attacks on the sensor itself.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131418117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746764
Dell Zhang, Zheng Zhu
Latent semantic indexing (LSI) is an effective method to discover the underlying semantic structure of data. It has numerous applications in information retrieval and data mining. However, the computational complexity of LSI may be prohibitively high when applied to very large datasets. In this paper, we present a fast approximate algorithm for large-scale LSI that is conceptually simple and theoretically justified. Our main contribution is to show that the proposed algorithm has provable error bound and linear computational complexity.
{"title":"A fast approximate algorithm for large-scale Latent Semantic Indexing","authors":"Dell Zhang, Zheng Zhu","doi":"10.1109/ICDIM.2008.4746764","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746764","url":null,"abstract":"Latent semantic indexing (LSI) is an effective method to discover the underlying semantic structure of data. It has numerous applications in information retrieval and data mining. However, the computational complexity of LSI may be prohibitively high when applied to very large datasets. In this paper, we present a fast approximate algorithm for large-scale LSI that is conceptually simple and theoretically justified. Our main contribution is to show that the proposed algorithm has provable error bound and linear computational complexity.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131565777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746716
I. Gondra, Tao Xu
Mean shift clustering tends to generate accurate segmentations of color images, but choosing the scale parameters remains a difficult problem which has a strong impact on its performance. We present an adaptive image segmentation framework that achieves a task-dependent top-down adaption of the scale parameters. The proposed method can be used under the context of a relevance feedback-based content-based image retrieval system. Standard mean shift clustering is used to generate an initial segmentation of the images in the database. After processing a query, the user gives the usual relevance feedback by labeling each of the images in the corresponding retrieval set as positive or negative, based on whether or not it contains a particular object of interest. In our approach, this feedback obtained as a by-product of user interaction with the system is then used in conjunction with multiple instance learning to induce a mapping from the object of interest to the scale parameters. The initial segmentation of the object of interest in each of the positive images in the database is then revised. This is done offline and is completely transparent to the user. Preliminary results indicate that the proposed method is capable of learning more informed segmentation parameters.
{"title":"Adaptive mean shift-based image segmentation using multiple instance learning","authors":"I. Gondra, Tao Xu","doi":"10.1109/ICDIM.2008.4746716","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746716","url":null,"abstract":"Mean shift clustering tends to generate accurate segmentations of color images, but choosing the scale parameters remains a difficult problem which has a strong impact on its performance. We present an adaptive image segmentation framework that achieves a task-dependent top-down adaption of the scale parameters. The proposed method can be used under the context of a relevance feedback-based content-based image retrieval system. Standard mean shift clustering is used to generate an initial segmentation of the images in the database. After processing a query, the user gives the usual relevance feedback by labeling each of the images in the corresponding retrieval set as positive or negative, based on whether or not it contains a particular object of interest. In our approach, this feedback obtained as a by-product of user interaction with the system is then used in conjunction with multiple instance learning to induce a mapping from the object of interest to the scale parameters. The initial segmentation of the object of interest in each of the positive images in the database is then revised. This is done offline and is completely transparent to the user. Preliminary results indicate that the proposed method is capable of learning more informed segmentation parameters.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746784
Mercedes Argüello Casteleiro, J. D. Diz, A. Thompson, H. Paniagua, Maria Jesus Fernandez Prieto, Rogelio Perez
Since the 1990s many researchers have proposed frameworks for modelling clinical guidelines and protocols in a computer-interpretable and computer-executable format. Nowadays, the various guideline representation languages and related frameworks also need to address compatibility with healthcare information systems that aim to be interoperable on nation-wide and even international-levels. This paper presents a simulation framework and computational test-bed, called V.A.F. Framework, that makes use of health level seven (HL7) and takes advantages of both CommonKADS methodology and Semantic Web technologies (OWL, SWRL, and OWL-S) to express a wide-spectrum of medical guidelines in an executable form compatible with HL7 clinical document architecture (CDA). To validate the proposal, which goes beyond interoperability of eHealth services and explores how to open up new capabilities in areas such as decision support and patient safety alerts, the research has focused on medical guidelines related to womenpsilas health in general practice.
{"title":"Enabling smooth integration between HL7 CDA and medical guidelines on the web with an initial focus on women’s health in general practice","authors":"Mercedes Argüello Casteleiro, J. D. Diz, A. Thompson, H. Paniagua, Maria Jesus Fernandez Prieto, Rogelio Perez","doi":"10.1109/ICDIM.2008.4746784","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746784","url":null,"abstract":"Since the 1990s many researchers have proposed frameworks for modelling clinical guidelines and protocols in a computer-interpretable and computer-executable format. Nowadays, the various guideline representation languages and related frameworks also need to address compatibility with healthcare information systems that aim to be interoperable on nation-wide and even international-levels. This paper presents a simulation framework and computational test-bed, called V.A.F. Framework, that makes use of health level seven (HL7) and takes advantages of both CommonKADS methodology and Semantic Web technologies (OWL, SWRL, and OWL-S) to express a wide-spectrum of medical guidelines in an executable form compatible with HL7 clinical document architecture (CDA). To validate the proposal, which goes beyond interoperability of eHealth services and explores how to open up new capabilities in areas such as decision support and patient safety alerts, the research has focused on medical guidelines related to womenpsilas health in general practice.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746820
E. Ahmed, N. Bessis, Yong Yue, M. Sarfraz
Accessing integrated databases leads to the performance of searching and matching of data. Data can be redundant and found with different business contexts in different integrated databases. Usually, accessing data from integrated databases is accomplished by using each databasepsilas own catalogue or metadata schema. A generic strategy is adopted to consolidate distinct catalogue schemas of federated databases to access information seamlessly. This strategy involves matching of structure objects and data values across federated databases in a grid environment. In this paper, the concept of grid services is introduced to manage the importance of data search and matching within an OGSA-DAI (open grid services architecture - data access integration) environment.
{"title":"Matching multiple elements in grid databases: A practical approach","authors":"E. Ahmed, N. Bessis, Yong Yue, M. Sarfraz","doi":"10.1109/ICDIM.2008.4746820","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746820","url":null,"abstract":"Accessing integrated databases leads to the performance of searching and matching of data. Data can be redundant and found with different business contexts in different integrated databases. Usually, accessing data from integrated databases is accomplished by using each databasepsilas own catalogue or metadata schema. A generic strategy is adopted to consolidate distinct catalogue schemas of federated databases to access information seamlessly. This strategy involves matching of structure objects and data values across federated databases in a grid environment. In this paper, the concept of grid services is introduced to manage the importance of data search and matching within an OGSA-DAI (open grid services architecture - data access integration) environment.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-01DOI: 10.1109/ICDIM.2008.4746778
F. Corradini, F. D. Angelis, A. Polini, A. Polzonetti
Service oriented computing is an emerging discipline that promotes and make easier inter-organization integration of software systems. In such a context interoperability issues are considered a primary threat for a correct integration. Testing can be a fruitful approach helping to reduce interoperability mismatches. In this paper, considering the case of services to be integrated within an orchestration, we propose a testing derivation strategy based on a counter-example based technique. The state explosion phenomenon, caused by the presence of complex data sets, is handled by applying genetic algorithm strategies.
{"title":"A participant testing strategy for service orchestrations","authors":"F. Corradini, F. D. Angelis, A. Polini, A. Polzonetti","doi":"10.1109/ICDIM.2008.4746778","DOIUrl":"https://doi.org/10.1109/ICDIM.2008.4746778","url":null,"abstract":"Service oriented computing is an emerging discipline that promotes and make easier inter-organization integration of software systems. In such a context interoperability issues are considered a primary threat for a correct integration. Testing can be a fruitful approach helping to reduce interoperability mismatches. In this paper, considering the case of services to be integrated within an orchestration, we propose a testing derivation strategy based on a counter-example based technique. The state explosion phenomenon, caused by the presence of complex data sets, is handled by applying genetic algorithm strategies.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123015666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}