By Topic

Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on

Date 16-19 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 196
  • 7th IEEE International Conference on Computer and Information Technology - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (350 KB)
    Freely Available from IEEE
  • 7th IEEE International Conference on Computer and Information Technology - Table of contents

    Publication Year: 2007, Page(s):v - xx
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Organization

    Publication Year: 2007, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Business Intelligence An Industrial Perspective

    Publication Year: 2007, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB)

    Information technology has long enabled enterprises to conduct business transactions efficiently. The advent of Web and the accompanying pervasive search, retrieval and mining technologies have opened up a new frontier for enterprises. Enterprises, private or public, are expected to capitalize on information of many sources and forms to detect events and respond to changes quickly for business adv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IUPS Physiome Project

    Publication Year: 2007, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    Summary form only given. The Physiome Project of the International Union of Physiological Sciences (IUPS) is attempting to provide a comprehensive framework for modelling the physiology of the human body using multi-scale computational methods which can incorporate the biochemistry, biophysics and anatomy of cells, tissues and organs. A major goal of the project is to use computational modelling t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large-scale Evaluation Infrastructure for Information Access Technologies Enhancement and Creativity

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB)

    This paper introduces the NTCIR (NII Test Collection for Information Retrieval and access technologies) Project and its evaluation workshop series called NTCIR Workshops, which are designed to enhance research in information access technologies, such as information retrieval, text summarization, question answering, text mining, and their cross-lingual efforts by providing infrastructure for large-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active XML Schema Containment Checking Based on Tree Automata Theory

    Publication Year: 2007, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    An active XML (AXMLfor short) document is an XML document where some of the data is given explicitly while other parts are defined only intentionally by means of embedded calls to Web services. When one of these calls is invoked, its results will be returned to enrich the original document. AXML schema defines the specification that AXML documents should conform. Containment checking for AXML sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Detection of Conflicting Updates in Valid XML

    Publication Year: 2007, Page(s):17 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    As soon as many users and applications work concurrently on valid XML documents, transaction management for valid XML becomes an important issue. A fundamental problem is the detection of conflicts between operations. The detection of conflicts between operations is very interesting in query optimization for a query compiler and concurrency for a transaction manager. In this paper, we studies the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Journey towards More Efficient Processing of XML Data in (O)RDBMS

    Publication Year: 2007, Page(s):23 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    As XML has become a standard for data representation, it is inevitable to propose and implement techniques for efficient managing of XML data. A natural alternative is to exploit features and functions of (object-)relational database systems, i.e. to rely on their long theoretical and practical history. The main concern of such techniques is the choice of an appropriate XML-to-relational mapping s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schema-Aware Keyword Search over XML Streams

    Publication Year: 2007, Page(s):29 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    In this paper, we present an approach to process XML stream based on keyword search. We define the keyword search semantic as Meaning Independent Smallest Lowest Common Ancestors (MISLCAs) and query results as Meaning Independent Minimum Connecting Trees (MIMCTs), provide a user-friendly query interface based on keywords and a little XML schema knowledge, refine keyword search to Query Graph based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SemFilter: A Simple and Efficient Semantic Filtering of XML Messages

    Publication Year: 2007, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Until now, most researches for XML message filtering have focused on the efficient and scalable path matching of a large number of XPath queries over a continuous XML data stream. However, we think there is another key problem of the semantic interoperability of subscribed XPath queries against heterogeneous data sources. Recent studies only assume that the filtering system maintains a single glob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensembles of Region Based Classifiers

    Publication Year: 2007, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    In machine learning, ensemble classifiers have been introduced for more accurate pattern classification than single classifiers. We propose a new ensemble learning method that employs a set of region based classifiers. Since the distribution of data can be different in different regions in the feature space, we split the data and generate classifiers based on each region and apply a weighted votin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural Network for Text Classification Based on Singular Value Decomposition

    Publication Year: 2007, Page(s):47 - 52
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    This paper proposed new text classification models based on artificial neural networks and Singular Value Decomposition (SVD). The neural networks are trained by Multi-Output Perceptron Learning algorithm (MOPL) and Back-Propagation Neural Network (BPNN). Most classic classification systems represent the contents of documents with a set of index terms, it has been known as vector space model (VSM)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Method of Genetic Algorithm for Text Clustering Based on Singular Value Decomposition

    Publication Year: 2007, Page(s):53 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    In this paper, we propose a method of genetic algorithm (GA) for text clustering based on singular value decomposition technique. The main difficulty in the application of GA to text clustering is its long string representation in high dimensional space. Because the most straightforward and popular approach represents texts with vector space model (VSM), that is, each unique term in the vocabulary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Coronary Artery Disease from Heart Rate Variability Using Classification and Statistical Analysis

    Publication Year: 2007, Page(s):59 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (785 KB) | HTML iconHTML

    HRV (heart rate variability) is one of the most promising quantitative indications of autonomic activity. In present study, our aim is to develop the multi-pararmetric feature including linear and nonlinear features of HRV. We also propose a suitable prediction model to enhance the reliability of medical examination for cardiovascular disease. This study analyzes the HRV for three recumbent positi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deputy Mechanism for OLAP over Imprecise Data and Composite Measure

    Publication Year: 2007, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Dealing with imprecise data and composite measure is widely recognized to be the important problem, respectively and has received increasing attention. However, the complexity of queries required to support OLAP applications makes it difficult to implement using standard relational database technoloty. Moreover, there is currently no data model for OLAP to handle both imprecise data and composite ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CTU-Mine: An Efficient High Utility Itemset Mining Algorithm Using the Pattern Growth Approach

    Publication Year: 2007, Page(s):71 - 76
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Frequent pattern mining discovers patterns in transaction databases based only on the relative frequency of occurrence of items without considering their utility. For many real world applications, however, utility of itemsets based on cost, profit or revenue is of importance. The utility mining problem is to find itemsets that have higher utility than a user specified minimum. Unlike itemset suppo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Experimental Study on Feature Subset Selection Methods

    Publication Year: 2007, Page(s):77 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (578 KB) | HTML iconHTML

    In the field of machine learning and pattern recognition, feature subset selection is an important area, where many approaches have been proposed. In this paper, we choose some feature selection algorithms and analyze their performance using various datasets from public domain. We measured the number of reduced features and the improvement of learning performance with chosen feature selection meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Two Feature Selection Methods in Intrusion Detection Systems

    Publication Year: 2007, Page(s):83 - 86
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    The quality of features directly affects the performance of classification. Many feature selection methods introduced to remove redundant and irrelevant features, because raw features may reduce accuracy or robustness of classification. In this paper we proposed a new method for feature selection based on Decision Dependent Correlation (DDC). We have used SVM classifier and the results on DARPA KD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic Component: A Generic Programming Approach

    Publication Year: 2007, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Generic programming (GP) is the evolvement of OO, and more general than OO. In a certain degree, it is requirement-oriented programming. This paper, firstly, addresses some insufficiencies of OO; secondly illustrates an overview of GP briefly, then compare it with OO; finally proposes generic component approach which helps in implementing safe, efficient, highly customizable, and reusable design e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Organization: A New Approach in IT

    Publication Year: 2007, Page(s):93 - 98
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Recently, advances in computer networks have affected marketing and business systems so that traditional business systems have been metamorphosed. The increasing demands for extended products and services along with advances in IT industry have motivated researchers to create Virtual Organizations (VOs) in order to better respond to business opportunities and produce qualitative services and produ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective Processing over Continuous Data Stream

    Publication Year: 2007, Page(s):99 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    Due to a late and out-of-order arrival of infinite, unbound and multiple input streams, processing continuous queries over them may lead to producing an inaccurate answer or delaying query execution. Particularly, to minimize this delay time, previous works have used timeout technique without considering the frequency of timeouts. It results in decreasing the accuracy of query execution results si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification Algorithm Based on Human Social Behavior

    Publication Year: 2007, Page(s):105 - 109
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    This paper proposes the new approach to deal with the classification problems by employing the sociological concept of "in-group " and "out-group. " The main idea of the concept is about the behavior of in-group members that try to unite with their own group as much as possible, and at the same time maintain social distance from the out-group members. The performance of the proposed model was comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Trajectory Search Algorithm Based on Spatio-temporal Similarity on Spatial Network

    Publication Year: 2007, Page(s):110 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    In this paper, we define a new measure to compute spatio-temporal similarity between two trajectories of moving objects on road networks, which is known as spatio-temporal distance (STDist). In addition, we propose a new spatio-temporal similar trajectory search algorithm to retrieve similar trajectories based on the spatio-temporal distance, a combination of both spatial and temporal properties w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.