By Topic

Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05)

14-16 July 2005

Filter Results

Displaying Results 1 - 25 of 128
  • Proceedings. Fourth Annual ACIS International Conference on Computer and Information Science

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (296 KB)
    Freely Available from IEEE
  • Fourth Annual ACIS International Conference on Computer and Information Science - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Fourth Annual ACIS International Conference on Computer and Information Science - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Fourth Annual ACIS International Conference on Computer and Information Science - Table of contents

    Publication Year: 2005, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Message from the Conference Chairs

    Publication Year: 2005, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (22 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (24 KB) | HTML iconHTML
    Freely Available from IEEE
  • Software engineering - components, interfaces, behaviours

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (25 KB)

    Summary form only given. Software engineering has matured from heuristic practice to an engineering discipline. Over the years, software technology developed into a key qualification for mastering complex technical systems. Nowadays, software engineers can benefit from a solid stock of basic research addressing the specification, modelling, design and implementation of sequential, concurrent, dist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acquiring dominant compound terms to build Korean domain knowledge bases

    Publication Year: 2005, Page(s):2 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Compound terms should be well ranked to reduce laborious work for building domain knowledge bases such as term dictionary and thesaurus. Especially, dominant terms in recent years are valuable in the aspects of coverage and reference. We adopt linguistic filtering using a part-of-speech filter and four combination rules to extract Korean compound terms. Domain seed terms are used to obtain their r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Genetic algorithm implementation in Python

    Publication Year: 2005, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    This paper deals with genetic algorithm implementation in Python. Genetic algorithm is a probabilistic search algorithm based on the mechanics of natural selection and natural genetics. In genetic algorithms, a solution is represented by a list or a string. List or string processing in Python is more productive than in C/C++/Java. Genetic algorithms implementation in Python is quick and easy. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kernel based intrusion detection system

    Publication Year: 2005, Page(s):13 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Recently, applying artificial intelligence, machine learning and data mining techniques to intrusion detection system are increasing. But most of researches are focused on improving the performance of classifier. Selecting important features from input data lead to a simplification of the problem, faster and more accurate detection rates. Thus, selecting important features is an important issue in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective real time update rule for improving performances both the classification and regression problems in kernel methods

    Publication Year: 2005, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    It is general solution to get an answer from both classification and regression problem that information in real world matches matrices. This paper treats primary space as a real world, and dual space that primary spaces transfers to new matrices using kernel. In practical study, there are two kinds of problems, complete system which can get an answer using inverse matrix and ill-posed system or s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based compliance management systems - methodology and implementation

    Publication Year: 2005, Page(s):25 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    In recent times, a challenging problem for organisations worldwide has been the management of the growing number of rules, procedures, policies, and reporting requirements governing their businesses, operations, and industry. This paper considers the task of building automated knowledge-based compliance management systems. In this paper, we aim to highlight the common weaknesses found in complianc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of translator for stack-based codes from 3-address codes in CTOC

    Publication Year: 2005, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    We Present CTOC, a framework for optimizing Java bytecode. The framework supports two intermediate representations for representing Java bytecode: CTOC-B, a streamlined representation of bytecode which is simple to manipulate; CTOC-T, a typed 3-address intermediate representation suitable for optimization. We translate CTOC-T back to CTOC-B that translates a needless code. A needless code is redun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reflective practice of automated and manual code reviews for a studio project

    Publication Year: 2005, Page(s):37 - 42
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (77 KB) | HTML iconHTML

    In this paper, the target of code review is project management system (PMS), developed by a studio project in a software engineering master's program, and the focus is on finding defects not only in view of development standards, i.e., design rule and naming rule, but also in view of quality attributes of PMS, i.e., performance and security. From the review results, a few lessons are learned. Firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of UML based mobile integrated management system

    Publication Year: 2005, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Existing research expenses management task consists of budget planning, budget draw-up, and exact settlement of budget. Therefore, integrated management is needed keenly for certain security, efficient operation and clear execution of research expenses. To reflect these needs, Research Expenses Integrated Management (REIM) has been offered for the application used on mobile by reusing a business a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of forced unmount

    Publication Year: 2005, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    This paper describes a kernel function named FU (forced unmount) related to file system on Linux system. FU is a function to forcibly unmount file systems in despite of busy state of file systems. The current implementation was developed on Linux-2.6.8 and tested by tools, POSTMAR and LTP. This contains considerations of FU and a algorithm to solve problems during developing FU. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Development of embedded software with component integration based on ABCD architectures

    Publication Year: 2005, Page(s):54 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles

    "Development of Embedded Software with Component Integration Based on ABCD Architecture"
    by Haeng-Kon Kim, Roger Y. Lee, and Hae-Sool Yang
    in the Proceedings of the 4th Annual ACIS International Conference on Computing and Information Science (ICIS'05), 14-16 July 2005, pp. 54-60

    After careful and considered review of the conte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A review approach to detecting structural consistency violations in programs

    Publication Year: 2005, Page(s):61 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    The application of specification-based program verification techniques (e.g., testing, review, and proof) usually faces strong challenges in practice when the gap between the structure of a specification and that of its program is large. In this paper we describe an approach to detecting the violations of the structural consistency in programs based on their specifications by review. The approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining frequent pattern using item-transformation method

    Publication Year: 2005, Page(s):698 - 706
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Mining frequent patterns is a fundamental and crucial task in data-mining problems. This paper proposes a novel and simple approach, which does not belong to the candidate generation-and-test approach (for example, the a priori algorithm) and the pattern-growth approach (such as the FP-growth algorithm) two approaches. This approach treats the database as a stream of data and finds the frequent pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PRBAC: an extended role based access control for privacy preserving data mining

    Publication Year: 2005, Page(s):68 - 73
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    Issues about privacy-preserving data mining have emerged globally, but still the main problem is that non-sensitive information or unclassified data, one is able to infer sensitive information that is not supposed to be disclosed. This paper proposes an approach to PPDM based on an extended role based access control called privacy preserving data mining using an extended role based access control(... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RGSN model for database integration

    Publication Year: 2005, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Considering information integration, we have a careful look at many types of collisions based on heterogeneities. We propose a relational global semantic network (RGSN) to solve this problem This is based on the WordNet which defines the relationships among words. The main structure of RGSN is to derive connections among entities in each schema and finally provide a foundation to solve the heterog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient workcase classification method and tool in workflow mining

    Publication Year: 2005, Page(s):80 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    This paper conceives a workcase classification method and implements it as a tool so as to be used in workflow mining systems. The method is for resolving the workcase classification problem issued for mining an activity firing or execution sequence of a workcase from monitoring and audit logs. That is, it finally generates a workcase classification decision tree consisting of a minimal set of cri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equivalence of transforming non-linear DACG to linear concept tree

    Publication Year: 2005, Page(s):86 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    This paper introduces a strategy and its theory proof to transform non-linear concept graph: directed acyclic concept graph (DACG) into a linear concept tree. The transformation is divided into three steps: normalizing DACG into a linear concept tree, establishing a function on host attribute, and reorganizing the sequence of concept generalization. This study develops alternative approach to disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Palmprint identification algorithm using Hu invariant moments and Otsu binarization

    Publication Year: 2005, Page(s):94 - 99
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Recently, biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, the palmprint recognition method based on Hu invariant moment is proposed. And the low-resolution(75dpi) palmprint image(135×135 Pixel) is used for the small scale database of the effectual palmprint recognition system. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Natural image compression based on modified SPIHT

    Publication Year: 2005, Page(s):100 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1000 KB) | HTML iconHTML

    Due to the bandwidth and storage limitations, image must be compressed before transmission. The set partitioning in hierarchical trees (SPIHT) algorithm is an efficient method for lossy and lossless coding of image. This paper presents some modifications on the set partitioning in hierarchical trees (SPIHT) algorithm. It is based on the idea of insignificant correlation of wavelet coefficient amon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.