By Topic

Web Intelligence and Intelligent Agent Technology Workshops, 2006. WI-IAT 2006 Workshops. 2006 IEEE/WIC/ACM International Conference on

Date 18-22 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 149
  • 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - TOC

    Publication Year: 2006, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Infrastructural Issues for Agent-Based Distributed Learning

    Publication Year: 2006, Page(s):3 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    The experience proved that integration of multi-agent and data mining technologies provides mutual enrichment of them both and leads to emergence of new design technologies and systems with better properties. However, this integration put forward novel problems of different kinds. The paper considers agent-based distributed design technology of distributed classification systems and presents basic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Tutoring Intelligence Using Knowledge Discovery Techniques

    Publication Year: 2006, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    In this paper, we present an approach to enhance tutoring knowledge using a promising approach of data and knowledge discovery based on pattern sequence recognition. We show how the approach is used to discover new meta knowledge and rules in a given domain which then extend domain knowledge and serve as problem space allowing the intelligent tutoring agent to guide learners in problem solving sit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiagent-Based Model Integration

    Publication Year: 2006, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    This paper presents a distributed data mining technique based on a multiagent environment, called SMAMDD (multiagent system for distributed data mining), which uses model integration. Model integration consists in the amalgamation of local models into a global, consistent one. In each subset, agents perform mining tasks locally and, afterwards, results are merged into a global model. In order to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-Based Pattern Mining of Discredited Activities in Public Services

    Publication Year: 2006, Page(s):15 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Along with the applications of computer and database techniques, a large even huge amount of data has been produced and collected in the field of public service. Many valuable regulations hide in the raw data. It is necessary that new technique is studied to help the manager make proper decision. We propose a data mining model which is based on multi-agent technique to mine the discredit activitie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Human-Friendly MAS for Mining Stock Data

    Publication Year: 2006, Page(s):19 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (134 KB) | HTML iconHTML

    Mining stock data can be beneficial to the participants and researchers in the stock market. However, it is very difficult for a normal trader or researcher to apply data mining techniques to the data on his own due to the complexity involved in the whole data mining process. In this paper, we present a multi-agent system that can help users easily deal with their data mining jobs on stock data. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Data Mining Techniques for Improving the Efficiency of a Supply Chain Management Agent

    Publication Year: 2006, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Supply chain management (SCM) environments are often dynamic markets providing a plethora of information, either complete or incomplete. It is, therefore, evident that such environments demand intelligent solutions, which can perceive variations and act in order to achieve maximum revenue. To do so, they must also provide some sophisticated mechanism for exploiting the full potential of the enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Multimodal Framework for Human Behavior Recognition

    Publication Year: 2006, Page(s):27 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    This paper proposes a framework of an interface that is capable of detecting and classifying human intentions and personality types. The framework relies on a conventional set of multimodal components, namely an eye-tracking system, a mouse and a keyboard, where a large number of real time data analysis will take place, in order to detect behavioral patterns. The system gradually learns from the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating Agent Strategies within a Complex Adaptive System of Purchasing Agents for Estimating Attribute Relevance

    Publication Year: 2006, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    The authors constructed a complex adaptive system of purchasing agents, and have used this software to estimate the relevance of attributes in a data set. The simulation supports the creation of arbitrarily complex and diverse agent strategies. The effect of altering the proportion of two different agent strategies is investigated and reported, and contrasted with two non-CAS strategies based on i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Informed Recommender Agent: Utilizing Consumer Product Reviews through Text Mining

    Publication Year: 2006, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Consumer reviews, opinions and shared experiences in the use of a product form a powerful source of information about consumer preferences that can be used for making recommendations. A novel framework, which utilizes this valuable information sources first time to create recommendations in recommender agents was recently developed by the authors. In this recommender agent, the most critical issue... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crime Pattern Detection Using Data Mining

    Publication Year: 2006, Page(s):41 - 44
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Adaptive Policies and Alert Filters

    Publication Year: 2006, Page(s):45 - 48
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    Intrusion detection systems are used to identify suspicious network traffic. However, a high percentage of alerts generated by such systems are liable to be false positives. Since these alerts typically require manual intervention from a network administrator, false positives create considerable administrative overheads. In order to reduce the number of false positives, we propose a new network pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management and Integration of Information in Intrusion Detection System: Data Integration System for IDS Based Multi-Agent Systems

    Publication Year: 2006, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    In this paper, we present a model, an architecture and an implementation of an information manager for an IDS (intrusion detection systems), using the technology of multi-agent systems and Web services. This manager has been integrated to NIDIA (network intrusion detection system based on intelligent agents), which is an IDS whose architecture consists of a group of cooperative agents. In our prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of an Intelligent Agent Intrusion Response System

    Publication Year: 2006, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Analysis of the properties and the quality of IDS, take a mathematical analysis of the alarm confidence level, the attack frequency, the risk assessment and the response cost of IDS. Analysis of the tactic of IRS. Based on these, analysis of an intelligent agent intrusion response system that is able to make automated response and adjust security policies according to the environmental variation d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Hybrid Classifier Based on Rough Sets and Neural Networks

    Publication Year: 2006, Page(s):57 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an ever-increased attention in the recent years. This paper describes a method developed for the automatic clustering of documents by using a hybrid classifier based on rough sets and neural networks, which we called as Rou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web User Access Pattern Mining Based on Kohonen Neural Network

    Publication Year: 2006, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    This paper provides a method for Web user access pattern mining based on kohonen neural network. User session vectors were first input to kohonen network, after training we found several clusters, compute the median of each cluster and characterize what the cluster represents with the URLs. When the online user requests URLs, a matching category is found according to the pages the user has accesse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trust Negotiations with Customizable Anonymity

    Publication Year: 2006, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosing digital credentials and policies. Credentials, exchanged during trust negotiations, often contain sensitive attributes that attest to the properties of the credential owner. Uncontrolled disclosure of such sensitive attr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bayesian Network Approach to Detecting Privacy Intrusion

    Publication Year: 2006, Page(s):73 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB) | HTML iconHTML

    Personal information privacy could be compromised during information collection, transmission, and handling. In information handling, privacy could be violated by both the inside and the outside intruders. Though, within an organization, private data are generally protected by the organization's privacy policies and the corresponding platforms for privacy practices, private data could still be mis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures

    Publication Year: 2006, Page(s):77 - 84
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    We provide a unified architecture, called SPACe, for secure, privacy-aware, and contextual multimedia systems in organizations. Many key and important architectural components already exist which contribute to a unified platform, including the classic data mining, security, and privacy-preserving components in conventional intelligent systems. After presenting an overview of our unified architectu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Access Control in Wireless Network

    Publication Year: 2006, Page(s):85 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algorithm which bases on artificial neural network (ANN). The algorithm reduces the data transmission using bit string to express roles and permissions. The algorithm employs set theory to repr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.